1 Part 2: Attacks and Countermeasures u Vulnerabilities u System Attacks Virus, Trojan, Worm Buffer overflow Rootkit Zombies Web based attacks.