System information

Threats to computer security 29
TYPE
NAME
DESCRIPTION
Email-
Flooders
Programs for
flooding e-mail e-
mail addresses
These programs send numerous messages
to e-mail addresses (flood them). Due to
the large flow of messages, users are
unable to view incoming messages which
are not spam.
IM-Flooders
Programs used for
flooding IM
programs
These programs send numerous messages
to Instant Messaging (IM) client users, such
as ICQ, MSN Messenger, AOL Instant
Messenger, Yahoo Pager or Skype. Due to
the large flow of messages, users are
unable to view incoming messages which
are not spam.
SMS-
Flooders
Programs used for
flooding with SMS
text messages
These programs send numerous SMS
messages to mobile phones.
POTENTIALY UNWANTED PROGRAMS
Potentially unwanted programs, unlike malware programs, are not intended
solely to inflict damage. However they can be used to breach the computer's
security.
Potentially unwanted programs include adware, pornware and other potentially
unwanted programs.
Adware programs (see page 30) display advertising information to the user.
Pornware programs (see page 30) display pornographic information to the user.
Other Riskware (see page 31) are frequently useful programs used by many
computer users. However, if an intruder obtains access to these programs or
installs them on the user's computer, the intruder can use them to breach the
computer’s security.
Potentially unwanted programs are installed using one of the following methods:
They are installed by the user, individually or together with another
program. For example, software developers include adware programs
into freeware or shareware programs.