LRK, See Linux Rootkit (LRK)
LSA, See Local Security Authority (LSA)
Lsat, 91
LSU packet, See Link state update (LSU) packet
L2TP, See Layer 2 Tunneling Protocol (L2TP)
Lu, H. J., 82
Lundqvist, A., 83
Lynis, 91
Lyon, Gordon, 385
M
Machanavajjhala, A., 479
MacOS, See Macintosh operating system (MacOS)
Macro viruses, 684
Malicious software
bots, 57
keyloggers, 57
RAT, 57
rootkits, 57
spyware, 57
stealth, 56–57
web based attacks, 57–58
Malicious threat, instant messaging (IM), 458–459
Malloc(), 69
Malware, 229. See also Malicious software
infection, 294–295
Malwarebytes’ Anti-Malware, 782
Manager’s responsibility, IT security management, ...
Get Computer and Information Security Handbook now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.