The IT Law Wiki

Penetration attack

32,284pages on
this wiki
Add New Page
Talk0 Share

Definition Edit

A penetration attack involve the use of a delivery mechanism to transport a malicious payload to the target host in the form of a Trojan horse or remote control program.

Overview Edit

These malicious payloads can be delivered either through some input medium (e.g., floppy or CD-ROM), download, or e-mail; or by exploiting existing bugs and security flaws in such programs as Internet browsers. Activation need not be intentional (e.g., double-clicking an icon), but can also occur by executing compromised code that users intentionally download from the Internet (e.g., device drivers, browser plug-ins, and applications) or unknowingly download (e.g., ActiveX controls associated with Web pages they visit). Even the simple viewing of a message in the preview screen of an e-mail client has, in some cases, proved sufficient to trigger execution of its attachment.

See also Edit

Ad blocker interference detected!

Wikia is a free-to-use site that makes money from advertising. We have a modified experience for viewers using ad blockers

Wikia is not accessible if you’ve made further modifications. Remove the custom ad blocker rule(s) and the page will load as expected.

Also on Fandom

Random Wiki