14.11.2012 Views

CEHv6 Resource Guide.indd - Algebra

CEHv6 Resource Guide.indd - Algebra

CEHv6 Resource Guide.indd - Algebra

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

� How to Avoid a Trojan Infection<br />

Module 9: Viruses and Worms<br />

� Virus History<br />

� Characteristics of Virus<br />

� Working of Virus<br />

o Infection Phase<br />

o Attack Phase<br />

� Why people create Computer Viruses<br />

� Symptoms of a Virus-like Attack<br />

� Virus Hoaxes<br />

� Chain Letters<br />

� How is a Worm Different from a Virus<br />

� Indications of a Virus Attack<br />

� Hardware Threats<br />

� Software Threats<br />

� Virus Damage<br />

� Mode of Virus Infection<br />

� Stages of Virus Life<br />

� Virus Classifi cation<br />

� How Does a Virus Infect?<br />

� Storage Patterns of Virus<br />

o System Sector virus<br />

o Stealth Virus<br />

o Bootable CD-Rom Virus<br />

http://www.eccouncil.org<br />

EC-Council<br />

Page 43

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!