Free Essay

I.T. 240 Threat Categorization

In:

Submitted By brando0530
Words 490
Pages 2
Threat Categorization

I.T. 240

Threat Categorization The boot sector is an area of the hard disk that has the startup information stored on it, it is also used to keep other key features on the disk working. A file is used in much the same way on a computer as in a physical setting. A file stores data that is used for whatever reason on the PC. Multipartite is a type of hybrid virus that combines more than one type of infection, they move fast and can infect the boot sector and program files at the same time, with that said we can picture the destruction that a multipartite can have on a system. The virus spreads throughout the system multiple times making even the simplest functions inoperable. A macro is a piece of code (information) data that is attached to a file, mainly word processors, such as Microsoft word, and Excel. Trojan horse in computers are programs that allow the execution of harmful actions that can delete data, block data, modify data, and disrupt networks. Trojan horses are like dormant cells that wait for the right time to make their appearance, they lay in wait most of the time in harmless programs. Email worms are spread through emails, they usually spread via attachment. These type of worms need to be opened before they can do anything. Worms can take up much needed memory and cause computers, web servers, and network servers to stop responding. Instant messaging worms are spread through instant messages, and their main purpose is to replicate themselves and infect users. This type of worm can cause a network to shut down or allows hackers to gain control of the user’s device. IRC worms or Internet Relay Chat worms are similar to email worms, they have to be accepted, usually via attachment, usually through a copy of a URL that has a copy of the worm embedded in it. This type of worm has to be opened to actually work. File sharing network worms are a type of worm that will copy itself to downloaded files and then spread to other devices each time the file is downloaded. This type of worm can allow the theft of personal information. Internet worms are a type of worm that are spread through a network by replication and copies itself, most of the time the user has no idea. This worm can cause the user to be essentially cut from their device, or shut down traffic for a network.

The Trojan, PWS-TravNet-FBKB!D9E9A7ABF524! I researched in week 7-DQ1 is part of the malware category, which is the category Trojans fall into. This type of threat is considered a password stealer and can give information obtained through key logging to hackers. The risk level is low with this Trojan. Malware is in the higher spectrum of the threat category, because of the harm they can cause.

Similar Documents

Premium Essay

Leadership

...Page 1 of 9 Original Research Transformational leadership in the South African public service after the April 2009 national elections Authors: Manasseh M. Mokgolo1 Patricia Mokgolo2 Mike Modiba3 Affiliations: 1 Department of Human Resources Management, University of South Africa, South Africa Learning and Development Unit, Tromso Management Consultants CC, Boyne, South Africa 2 Orientation: The implementation of transformational leadership in public services after national elections has been well recorded in other parts of the world. However, this is not the case in South Africa. Research purpose: The purpose of the study is to determine whether transformational leadership has a beneficial relationship with subordinate leadership acceptance, job performance and job satisfaction. Motivation for the study: Leadership is a critical issue that the public sector needs to address in order to survive and succeed in today’s unstable environment. According to Groenewald and Ashfield (2008), transformational leadership could reduce the effects of uncertainty and change that comes with new leaders and help employees to achieve their objectives. Research design, approach and method: The sample comprised 1050 full-time employees in the public sector based in head offices. The measuring instruments included the Multifactor Leadership Questionnaire (MLQ), the Leadership Acceptance Scale (LAS), the Job Satisfaction Survey (JSS) and the Job Performance Survey (JPS). Main findings: Transformational...

Words: 7811 - Pages: 32

Premium Essay

Canhan

...4 TH EDITION Managing and Using Information Systems A Strategic Approach KERI E. PEARLSON KP Partners CAROL S. SAUNDERS University of Central Florida JOHN WILEY & SONS, INC. To Yale & Hana To Rusty, Russell &Kristin VICE PRESIDENT & EXECUTIVE PUBLISHER EXECUTIVE EDITOR EDITORIAL ASSISTANT MARKETING MANAGER DESIGN DIRECTOR SENIOR DESIGNER SENIOR PRODUCTION EDITOR SENIOR MEDIA EDITOR PRODUCTION MANAGEMENT SERVICES This book is printed on acid-free paper. Don Fowley Beth Lang Golub Lyle Curry Carly DeCandia Harry Nolan Kevin Murphy Patricia McFadden Lauren Sapira Pine Tree Composition Copyright  2010 John Wiley & Sons, Inc. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc. 222 Rosewood Drive, Danvers, MA 01923, website www.copyright.com. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030-5774, (201) 748-6011, fax (201) 748-6008, website www.wiley.com/go/permissions. To order books or for customer service please, call 1-800-CALL WILEY (225-5945)...

Words: 175164 - Pages: 701

Premium Essay

Business and Management

...4 TH EDITION Managing and Using Information Systems A Strategic Approach KERI E. PEARLSON KP Partners CAROL S. SAUNDERS University of Central Florida JOHN WILEY & SONS, INC. To Yale & Hana To Rusty, Russell &Kristin VICE PRESIDENT & EXECUTIVE PUBLISHER EXECUTIVE EDITOR EDITORIAL ASSISTANT MARKETING MANAGER DESIGN DIRECTOR SENIOR DESIGNER SENIOR PRODUCTION EDITOR SENIOR MEDIA EDITOR PRODUCTION MANAGEMENT SERVICES This book is printed on acid-free paper. Don Fowley Beth Lang Golub Lyle Curry Carly DeCandia Harry Nolan Kevin Murphy Patricia McFadden Lauren Sapira Pine Tree Composition Copyright  2010 John Wiley & Sons, Inc. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc. 222 Rosewood Drive, Danvers, MA 01923, website www.copyright.com. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030-5774, (201) 748-6011, fax (201) 748-6008, website www.wiley.com/go/permissions. To order books or for customer service please, call 1-800-CALL WILEY (225-5945)...

Words: 175164 - Pages: 701

Premium Essay

Mis Book

...4 TH EDITION Managing and Using Information Systems A Strategic Approach KERI E. PEARLSON KP Partners CAROL S. SAUNDERS University of Central Florida JOHN WILEY & SONS, INC. To Yale & Hana To Rusty, Russell &Kristin VICE PRESIDENT & EXECUTIVE PUBLISHER EXECUTIVE EDITOR EDITORIAL ASSISTANT MARKETING MANAGER DESIGN DIRECTOR SENIOR DESIGNER SENIOR PRODUCTION EDITOR SENIOR MEDIA EDITOR PRODUCTION MANAGEMENT SERVICES Don Fowley Beth Lang Golub Lyle Curry Carly DeCandia Harry Nolan Kevin Murphy Patricia McFadden Lauren Sapira Pine Tree Composition This book is printed on acid-free paper. Copyright  2010 John Wiley & Sons, Inc. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc. 222 Rosewood Drive, Danvers, MA 01923, website www.copyright.com. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030-5774, (201) 748-6011, fax (201) 748-6008, website www.wiley.com/go/permissions. To order books or for customer service please...

Words: 175167 - Pages: 701

Premium Essay

Marketing

...Review of Marketing Research Review of Marketing Research VOLUME 1 Naresh K. Malhotra Editor M.E.Sharpe Armonk, New York London, England 4 AUTHOR Copyright © 2005 by M.E.Sharpe, Inc. All rights reserved. No part of this book may be reproduced in any form without written permission from the publisher, M.E. Sharpe, Inc., 80 Business Park Drive, Armonk, New York 10504. Library of Congress ISSN: 1548-6435 ISBN 0-7656-1304-2 (hardcover) Printed in the United States of America The paper used in this publication meets the minimum requirements of American National Standard for Information Sciences Permanence of Paper for Printed Library Materials, ANSI Z 39.48-1984. ~ MV (c) 10 9 8 7 6 5 4 3 2 1 CHAPTER TITLE 5 REVIEW OF MARKETING RESEARCH EDITOR: NARESH K. MALHOTRA, GEORGIA INSTITUTE OF TECHNOLOGY Editorial Board Rick P. Bagozzi, Rice University Ruth Bolton, Arizona State University George Day, University of Pennsylvania Morris B. Holbrook, Columbia University Michael Houston, University of Minnesota Shelby Hunt, Texas Tech University Dawn Iacobucci, Northwestern University Arun K. Jain, University at Buffalo, State University of New York Barbara Kahn, University of Pennsylvania Wagner Kamakura, Duke University Donald Lehmann, Columbia University Robert F. Lusch, University of Arizona Kent B. Monroe, University of Illinois, Urbana A. Parasuraman, University of Miami William Perreault, University of North Carolina Robert A. Peterson, University...

Words: 167068 - Pages: 669

Premium Essay

The Secret of Language Leadership

...—Carol Pearson, director, James MacGregor Burns Academy of Leadership, University of Maryland, and coauthor, The Hero and the Outlaw “The Secret Language of Leadership is not only the best analysis I have seen of how and why leaders succeed or fail, it’s highly readable, as well as downright practical. It should be mandatory reading for anyone interested in engaging a company with big ideas who understands that leaders live and die by the quality of what they say.” —Richard Stone, story analytics master, i.d.e.a.s “A primary role of leaders is to create and maintain meaning for their organizations. Denning clearly demonstrates that meaningmaking comes from stories well told.” —Thomas Davenport, President’s Distinguished Professor of I.T. and Management, Babson College, and author, The Attention Economy “Steve Denning is one of the leading thinkers on the power of narrative in business settings. His latest book is a smart, useful guide that can help leaders of every kind add value to their organizations and add meaning to their own journeys.” —Daniel H. Pink, author, A Whole New Mind SECRET LANGUAGE of • HOW LEADERS INSPIRE ACTION THROUGH NARRATIVE The LEADERSHIP STEPHEN DENNING...

Words: 100587 - Pages: 403