05.08.2013 Views

Trend Micro InterScan Gateway Security Appliance M-Series ...

Trend Micro InterScan Gateway Security Appliance M-Series ...

Trend Micro InterScan Gateway Security Appliance M-Series ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Trend</strong> <strong>Micro</strong> <strong>InterScan</strong> <strong>Gateway</strong> <strong>Security</strong> <strong>Appliance</strong> M-<strong>Series</strong> Administrator’s Guide<br />

Phishing<br />

A phish is an email message that falsely claims to be from an established or legitimate<br />

enterprise. The message encourages recipients to click on a link that will redirect their<br />

browsers to a fraudulent Web site. Once there, the user is asked to update personal<br />

information such as passwords, social security numbers, and credit card numbers,<br />

which will be used for identity theft. <strong>InterScan</strong> <strong>Gateway</strong> <strong>Security</strong> <strong>Appliance</strong> provides<br />

tools for handling known phishing sites and for adding others to a list of offenders.<br />

Spam<br />

Spamming is the misuse of electronic communications media to send unsolicited bulk<br />

messages. The most common form of spam is delivered in email as a form of commercial<br />

advertising. In practice, however, people use spam for many purposes other<br />

than commercial ones and in many media other than email, including instant messaging,<br />

Usenet newsgroups, Web search engines, Web logs, and mobile phone messaging.<br />

<strong>InterScan</strong> <strong>Gateway</strong> <strong>Security</strong> <strong>Appliance</strong> protects you against unwanted spam in<br />

email and on the Web using a database of known spammers and content filters.<br />

Spyware<br />

Spyware refers to that broad category of malicious software designed to intercept or<br />

take partial control of a computer's operation without the informed consent of its<br />

owner or user. While the term suggests software that secretly monitors the user, it<br />

more broadly refers to software that subverts the computer's operation for the benefit<br />

of a third party, usually for commercial gain. Typical uses of spyware include the<br />

delivery of unsolicited pop-up advertisements, the theft of personal information<br />

(including financial information such as credit card numbers), the monitoring of<br />

Web-browsing activity for marketing purposes, and the routing of HTTP requests to<br />

advertising sites.<br />

Trojans<br />

A Trojan is a malicious program that masquerades as a harmless application. Unlike<br />

viruses, Trojans do not replicate, but they can be just as destructive. An application<br />

that claims to rid your computer of viruses when it actually introduces viruses onto<br />

your computer is an example of a Trojan. Trojans do not infect files; therefore, they<br />

A-4

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!