CHAPTER 6
Malicious Code and Activity


In this chapter, you will learn about

• Different types of viruses

• Differences among viruses, worms, Trojan horses, and logic bombs

• Rootkits, trapdoors, backdoors, and spyware

• Differences between signature-based detection and heuristics-based detection for antiviruses

• The importance of keeping antivirus signature definitions up to date

• The use of spam filters and content-filtering appliances

• The principle of least privilege and how it can help prevent infections

• The education of users about safe computing practices

• The Common Vulnerabilities and Exposures list


..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.129.148.210