Network Security: An MPE/iX Overview

page 167/22/2008
HP presentation template user tutorial
GENERAL NETWORKING
Specific types of Network attacks and solutions
Worms
Particular to networked computer systems
Gains access to resources that point to other computers
Replicates itself to multiple systems
Rarely dangerous, mostly annoying
Trojan Horses
Code that imbeds itself into something useful
Collects information and sends to known site on the network
Also can allow external takeover of your system (Back Orifice)