In this chapter, you will learn about
• Different types of viruses
• Differences among viruses, worms, Trojan horses, and logic bombs
• Rootkits, trapdoors, backdoors, and spyware
• Differences between signature-based detection and heuristics-based detection for antiviruses
• The importance of keeping antivirus signature definitions up to date
• The use of spam filters and content-filtering appliances
• The principle of least privilege and how it can help prevent infections
• The education of users about safe computing practices
• The Common Vulnerabilities and Exposures list
3.16.79.147