05.08.2013 Views

Trend Micro InterScan Gateway Security Appliance M-Series ...

Trend Micro InterScan Gateway Security Appliance M-Series ...

Trend Micro InterScan Gateway Security Appliance M-Series ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Terminology<br />

Mass-Mailing Attacks<br />

Email-aware viruses have the ability to spread by email by automating the infected<br />

computer's email client. Mass-mailing behavior describes a situation when an infection<br />

spreads rapidly between clients and servers in an email environment. <strong>Trend</strong><br />

<strong>Micro</strong> has designed the scan engine in <strong>InterScan</strong> <strong>Gateway</strong> <strong>Security</strong> <strong>Appliance</strong> to<br />

detect behaviors that mass-mailing attacks usually demonstrate. The behaviors are<br />

recorded in the virus pattern file that is updated using the <strong>Trend</strong> Labs ActiveUpdate<br />

servers. The action set for mass-mailing behavior takes precedence over all other<br />

actions, and the recommended action against mass-mailing attacks is that such email<br />

be deleted.<br />

Network Viruses<br />

A virus spreading over a network is not, strictly speaking, a network virus. Only some<br />

of the threats mentioned in this section, such as worms, qualify as network viruses.<br />

Specifically, network viruses use network protocols, such as TCP, FTP, UDP, HTTP,<br />

and email protocols such as SMTP and POP3 to replicate. <strong>InterScan</strong> <strong>Gateway</strong> <strong>Security</strong><br />

<strong>Appliance</strong> works with a network virus pattern file to identify and block network<br />

viruses.<br />

Pharming<br />

Similar in nature to email phishing, pharming seeks to obtain personal or private (usually<br />

financial related) information through domain spoofing. Rather than being<br />

spammed with malicious and mischievous email requests for you to visit spoofed<br />

Web sites that appear legitimate, pharming "poisons" a DNS server by infusing it with<br />

false information, resulting in your request's being redirected elsewhere. However,<br />

your browser will indicate that you are at the correct Web site, which makes pharming<br />

a bit more serious and more difficult to detect. Phishing attempts to defraud people<br />

one at a time with an email, whereas pharming allows the scammers to target large<br />

groups of people at one time through domain spoofing.<br />

A-3

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!