What are some of the distribution vectors used by recent Trojan attacks?

What will be an ideal response?


Recent Trojan attacks have used several distribution vectors:* E-mail attachments, either sent by a friend (who might have thought the attached program was useful or interesting), or sent by a worm that was propagating itself on vulnerable unpatched machines* Scripts in HTML e-mails allowed to run automatically. If you have your e-mail set to show HTML, it will also run JavaScript code in the e-mail automatically* Files on FTP servers (FTP servers are relatively easy to hack, so even legitimate sites are potential sources for Trojans)* Scripts on spoofed Web sites* Scripts on hacked legitimate Web sites* Download opportunities on Web sites* Files offered on bulletin boards and forums* Social engineering, such as calling a network administrator as a legitimate user and talking him or her into loading a file of the caller's choosing

Computer Science & Information Technology

You might also like to view...

Which of the following are valid identifiers?

i. R3D3 ii. per-capita iii. phone# iv. ice_cream v. 92_aardvarks a. i, ii, iv, v b. i, iv c. i, ii d. ii, iv, v e. All are valid.

Computer Science & Information Technology

When you create a dump file, you'll need a(n) ____ tool to open and read the file.

A. sector editing B. application development C. debugging D. translating

Computer Science & Information Technology

Use the ____________________ to quickly create labels based on uniquely identified label templates.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Function __________ compares up to n characters of its first argument with its second argument.

a) nstrcmp b) strncmp c) strcmpn d) strcmp

Computer Science & Information Technology