05.08.2013 Views

Trend Micro InterScan Gateway Security Appliance M-Series ...

Trend Micro InterScan Gateway Security Appliance M-Series ...

Trend Micro InterScan Gateway Security Appliance M-Series ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Trend</strong> <strong>Micro</strong> <strong>InterScan</strong> <strong>Gateway</strong> <strong>Security</strong> <strong>Appliance</strong> M-<strong>Series</strong> Administrator’s Guide<br />

The Range and Types of Internet Threats<br />

Over the years, as the Internet has developed, so too has the creation of a wide range<br />

of Internet threats, collectively known as “malware.” There are thousands of known<br />

viruses, and virus writers are creating more each day. In addition to viruses, new<br />

threats designed to exploit vulnerabilities in corporate email systems and Web sites<br />

continue to emerge. Typical types of malware include the following:<br />

3-2<br />

TABLE 3-1. Types of Internet threats<br />

Threat Type Characteristics<br />

Bot Bots are compressed executable files that are often designed to<br />

harm computer systems and networks. Bots, once executed, can<br />

replicate, compress, and distribute copies of themselves. Typical<br />

uses of malicious bots are Denial-of-Service attacks, which can<br />

overwhelm a Web site and make it unusable.<br />

Pharming Similar in nature to email phishing, pharming seeks to obtain personal<br />

or private information (usually financially related) through<br />

domain spoofing.<br />

Phishing Phishing is the use of unsolicited email to request user verification<br />

of private information, such as credit card or bank account<br />

numbers, with the intent to commit fraud.<br />

Spam Unsolicited, undesired bulk email messages that frequently use<br />

various tricks to bypass email filtering.<br />

Spyware Technology that aids in gathering information about a person or<br />

organization.<br />

Trojan Malware that performs unexpected or unauthorized—often malicious—actions.<br />

Trojans cause damage and unexpected system<br />

behavior and compromise system security, but unlike viruses,<br />

they do not replicate.<br />

Virus A program that carries a destructive payload and that replicates,<br />

spreading quickly to infect other systems. Viruses remain one of<br />

the most prevalent threats to computing.<br />

Worm A self-contained program or set of programs that is able to<br />

spread functional copies of itself or its segments to other computer<br />

systems, typically via network connections or email attachments.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!