Mixed Threat Attack
   HOME

TheInfoList



OR:

Regarding
computer security Computer security (also cybersecurity, digital security, or information technology (IT) security) is a subdiscipline within the field of information security. It consists of the protection of computer software, systems and computer network, n ...
, a mixed threat attack is an attack that uses several different tactics to infiltrate a
computer A computer is a machine that can be Computer programming, programmed to automatically Execution (computing), carry out sequences of arithmetic or logical operations (''computation''). Modern digital electronic computers can perform generic set ...
user's environment. A mixed
threat A threat is a communication of intent to inflict harm or loss on another person. Intimidation is a tactic used between conflicting parties to make the other timid or psychologically insecure for coercion or control. The act of intimidation f ...
attack might include an infected file that comes in by way of
spam Spam most often refers to: * Spam (food), a consumer brand product of canned processed pork of the Hormel Foods Corporation * Spamming, unsolicited or undesired electronic messages ** Email spam, unsolicited, undesired, or illegal email messages ...
or can be received by an
Internet The Internet (or internet) is the Global network, global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a internetworking, network of networks ...
download. Mixed threat attacks try to exploit multiple vulnerabilities to get into a system. By launching multiple diverse attacks in parallel, the attacker can exploit more entry points than with just a single attack. Because these threats are based on multiple single-attacks, they are much harder to detect. Firewalls can help with these types of attacks; if configured correctly, they are somewhat effective against this type of attack. However, if the attack is embedded inside an application, it is no longer able to prevent it. Typical techniques employed are to define the multiple access threat with a signature that can represent identification for the virus removal software. These types of techniques need to be employed on the host machine because sometimes the firewall or
Intrusion Detection System An intrusion detection system (IDS) is a device or software application that monitors a network or systems for malicious activity or policy violations. Any intrusion activity or violation is typically either reported to an administrator or collec ...
is not able to detect the attack.
Nimda The Nimda virus is a malicious file-infecting computer worm. The first released advisory about this threat (worm) was released on September 18, 2001. Nimda affected both user workstations ( clients) running Windows 95, 98, NT, 2000, or XP an ...
and Code Red are examples of computer worms that utilized mixed threat attacks.


See also

*
Computer Security Computer security (also cybersecurity, digital security, or information technology (IT) security) is a subdiscipline within the field of information security. It consists of the protection of computer software, systems and computer network, n ...


References

Computer security exploits {{Compu-network-stub