| < Free Open Study > |
|
VeriSign, Inc., 173
Views, databases, 265-266, 292, 300
Virtual LAN (VLAN), 103-104
Virtual Private Networks (VPNs), 123-128, 136
Viruses, 253-254, 291, 331-333, 352-353, 356-357
anti-virus solutions, 344-346
Backdoor.Subseven virus, 340, 353
blended threats, 336-337, 352, 357
boot or system infectors, 335, 352
Chernobyl virus, 341, 353
defined and described, 19-20, 333-334
dropper files, 339
e-mail security and, 61-62, 83
encryption and, 339
file infectors, 254, 335
ILOVEYOU worm, 342, 353
macro viruses, 335-336, 352
Melissa virus, 342, 353
payloads of, 338, 352
polymorphic viruses, 254, 336, 353
retroviruses, 337
space filler viruses, 341
stealth viruses, 254, 336, 353
terminology, 339
threat ratings, 338, 352
triggers for, 338
variants, 337, 352
'wild' viruses, 337, 352, 356-357
zoo viruses, 338, 352
see also Trojan Horses
VLAN (Virtual LAN), 103-104
VoIP (Voice over IP), 137
VPNs (Virtual Private Networks), 123-128
VUE registration site, 13
Vulnerabilities, 19, 44
CGI and, 74-75
covert channels in databases, 272
FTP and, 79, 259-260
Instant Messaging and, 66-67, 83, 87-88
LDAP and, 77, 90, 261
| < Free Open Study > |
|