Summary


Recap

  • Viruses come in different forms.

  • Some are mere nuisances some come with devastating consequences.

  • E-mail worms are self replicating and clog the networks with unwanted traffic.

  • Virus codes are not necessarily complex.

  • It is necessary to scan the systems/ networks for infections on a periodic basis for protection against viruses.

  • Antidotes to new virus releases are promptly made available by security companies and this forms the major counter measure. [1]

[1] (Acknowledgement: http://www.pchell.com )




Staf of EC-Council - Ethical Hacking Student Courseware. Certidied Ethical Hacker-Exam 312-50 (EC-Council E-Business Certification Series)
Staf of EC-Council - Ethical Hacking Student Courseware. Certidied Ethical Hacker-Exam 312-50 (EC-Council E-Business Certification Series)
ISBN: N/A
EAN: N/A
Year: 2003
Pages: 109

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net