Create an account
How are Integrity and Availability compromised?
Security - breaches, natural disasters, malicious intruders, power flaws, human error
Replication program intent to infect more (through network connections, exchange storage devices)
What are destructive programs often called?
Virus - do not meet strict criteria of a virus .. ex: trojan horse
Types of Malware
Categories based on location and propagation: boot sector viruses, macro virus, file-infector virus, worm, trojan horse, network virus, bot
Making malware harder to detect and eliminate ex. encryption, stealth, polymorphism, time dependence
- can have more than one characteristic
change characteristics every time they transfer to new system; use complicated algorithms, incorporate nonsensical commands
programmed to activate on particular date; can remain dormant, harmless until date arrives; logic bombs: programs designed to start when certain conditions are met
Not just installing any virus-scanning program or anti-malware software
Requires: choose appropriate anti-malware program, monitoring network, continually updating anti-malware program, education users
User viewable malware symptoms
unexplained file size increases
significant, unexplained system performance
unusual error messages
significant, unexpected system memory loss
periodic, unexpected rebooting
display quality fluctuations
Minimal Anti-Malware Functions
Detect malware through signature scanning (comparing file's content with known malware signatures)
Detect malware through integrity checking (comparing current file characteristics against archived version)
Detect malware by monitoring unexpected file changes
Receive regular updates and modifications
Consistently report only valid instances of malware (heuristic scanning: find malware-like behavior)
Please allow access to your computer’s microphone to use Voice Recording.
Having trouble? Click here for help.
We can’t access your microphone!
Click the icon above to update your browser permissions and try again
Reload the page to try again!Reload
Press Cmd-0 to reset your zoom
Press Ctrl-0 to reset your zoom
It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.
Please upgrade Flash or install Chrome
to use Voice Recording.
For more help, see our troubleshooting page.
Your microphone is muted
For help fixing this issue, see this FAQ.
Star this term
You can study starred terms together