Threats defined

Virus — Viruses attach to another object to replicate. Some viruses attach to files and become active when the file opens, while others reside in memory and infect files as the computer opens, modifies or creates files.

Worm — Various worms exist, but recent examples such as Sasser penetrate systems

via remotely exploitable vulnerabilities.

This form does not require user action to

activate.

Trojan — A Trojan program causes damage or unwanted system behavior but does not replicate.

Bot software — Bot software searches for vulnerabilities to infect a computer and then allows the infected systems to be remotely controlled. Bots have worm and Trojan characteristics.

Spyware — A spyware program monitors system activity, typically without a user's consent and knowledge. More malicious types may uncover passwords or personal information.

Blended/hybrid threat — These attacks combine the hallmarks of different threats, such as Trojans, viruses and worms.

Malware — Malware is a catchall term for programs with bad intentions.

Sources: Computer Associates International Inc., F-Secure Corp.,

Network Associates Technology Inc. and Symantec Corp.

The Fed 100

Read the profiles of all this year's winners.

Featured

  • Shutterstock image (by wk1003mike): cloud system fracture.

    Does the IRS have a cloud strategy?

    Congress and watchdog agencies have dinged the IRS for lacking an enterprise cloud strategy seven years after it became the official policy of the U.S. government.

  • Shutterstock image: illuminated connections between devices.

    Who won what in EIS

    The General Services Administration posted detailed data on how the $50 billion Enterprise Infrastructure Solutions contract might be divvied up.

  • Wikimedia Image: U.S. Cyber Command logo.

    Trump elevates CyberCom to combatant command status

    The White House announced a long-planned move to elevate Cyber Command to the status of a full combatant command.

  • Photo credit: John Roman Images / Shutterstock.com

    Verizon plans FirstNet rival

    Verizon says it will carve a dedicated network out of its extensive national 4G LTE network for first responders, in competition with FirstNet.

  • AI concept art

    Can AI tools replace feds?

    The Heritage Foundation is recommending that hundreds of thousands of federal jobs be replaced by automation as part of a larger government reorganization strategy.

  • DOD Common Access Cards

    DOD pushes toward CAC replacement

    Defense officials hope the Common Access Card's days are numbered as they continue to test new identity management solutions.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group