<s>
Regarding	O
computer	O
security	O
,	O
a	O
mixed	B-Protocol
threat	I-Protocol
attack	I-Protocol
is	O
an	O
attack	O
that	O
uses	O
several	O
different	O
tactics	O
to	O
infiltrate	O
a	O
computer	O
user	O
's	O
environment	O
.	O
</s>
<s>
A	O
mixed	B-Protocol
threat	I-Protocol
attack	I-Protocol
might	O
include	O
an	O
infected	O
file	O
that	O
comes	O
in	O
by	O
way	O
of	O
spam	O
or	O
can	O
be	O
received	O
by	O
an	O
Internet	O
download	O
.	O
</s>
<s>
Mixed	B-Protocol
threat	I-Protocol
attacks	I-Protocol
try	O
to	O
exploit	O
multiple	O
vulnerabilities	O
to	O
get	O
into	O
a	O
system	O
.	O
</s>
<s>
Firewalls	B-Application
can	O
help	O
with	O
these	O
types	O
of	O
attacks	O
;	O
if	O
configured	O
correctly	O
,	O
they	O
are	O
somewhat	O
effective	O
against	O
this	O
type	O
of	O
attack	O
.	O
</s>
<s>
These	O
types	O
of	O
techniques	O
need	O
to	O
be	O
employed	O
on	O
the	O
host	O
machine	O
because	O
sometimes	O
the	O
firewall	B-Application
or	O
Intrusion	O
Detection	O
System	O
is	O
not	O
able	O
to	O
detect	O
the	O
attack	O
.	O
</s>
<s>
Nimda	O
and	O
Code	O
Red	O
are	O
examples	O
of	O
computer	O
worms	O
that	O
utilized	O
mixed	B-Protocol
threat	I-Protocol
attacks	I-Protocol
.	O
</s>
