6.1.6.2.3. Network connections between the host and unknown remote systems
6.1.6.2. Observed Network Activity
6.1.6.2.3. Network connections between the host and unknown remote systems
6.1.6.2.3.1. Network Service Worm
6.1.6.2.3.2. Trojan Horse
6.1.6.2.3.3. Malicious Mobile Code
6.1.6.2.3.4. Backdoor
6.1.6.2.3.5. Keystroke Logger
6.1.6.2.3.6. Rootkit
6.1.6.2.3.7. Malicious Browser Plug-Ins
6.1.6.2.3.8. E-mail Generators
6.1.6.2.1. Significantly increased network usage
6.1.6.2.2. Port scans and failed connection attempts targeted at the
By
Efrain Ortiz