Apedia

Obtained Object Executed User Security Types Malware Virus

Front Security: 2 types of malware
Back Virus:
Obtained object is explicitly executed by the user (e.g., e-mail attachment)

Worm:
Obtained object is looped through security gaps and automatically executed without user interaction

Learn with these flashcards. Click next, previous, or up to navigate to more flashcards for this subject.

Next card: Security d)dos distributed denial service resources made inaccessible

Previous card: Flooding security dos types vulnerability attack bandwidth connection

Up to card list: Computer Networks TopDownApproach -ENGLISH