4.3. Real-World Example of an Unintentional Threat

Now that we have put the unintentional threat into context, let's look at how an actual exploit can take place. Let's also look at how a NAC solution could prevent this from happening. Since everyone I talk to mentions that their biggest concern with letting outsiders onto their LAN is infection, let's use that example.

There are two main ways in which unintentional malware infection can take place on a LAN:

  • Network worms

  • Viruses

When talking about malware, many people generically call everything viruses. In reality, there are many different types of malware, such as viruses, worms, Trojans, spyware, and so on. While technically calling all of these things viruses is wrong, it's a fairly common thing to do. Purists may try to correct you from time to time, but it really doesn't matter. That notwithstanding, it is important to realize the difference between the different pieces of malware. Here are three really quick definitions on some of the major pieces of malware that will be important to understand for the purposes of this real-world example:

  • Viruses — Malware that spreads by human interaction, such as opening a file

  • Worms — Malware that spreads without human interaction

  • Trojans — Malware that is installed covertly during the execution of a host file

NOTE

Malware can also be a mix of different types of malware. For example, a piece of malicious code could be transferred from one machine to another by sharing files via a USB drive. ...

Get Implementing NAP and NAC Security Technologies: The Complete Guide to Network Access Control now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.