Home > Articles > Certification > Other IT

  • Print
  • + Share This
This chapter is from the book


Unlike security risks, threats can be much more malicious and widely distributed. Based on the manner in which a threat spreads and how it acts after infecting a new host, it is referred to as a virus, worm, Trojan horse, or blended threat.

  • + Share This
  • 🔖 Save To Your Account