Skip to Main Content
Computer Security Art and Science, 2nd Edition
book

Computer Security Art and Science, 2nd Edition

by Matt Bishop
November 2018
Intermediate to advanced content levelIntermediate to advanced
1440 pages
48h 29m
English
Addison-Wesley Professional
Content preview from Computer Security Art and Science, 2nd Edition

Chapter 23

Malware

TITUS ANDRONICUS: Ah! wherefore dost thou urge the name of hands?To bid Aeneas tell the tale twice o’er, How Troy was burnt and he made miserable?

The Tragedy of Titus Andronicus, III, ii, 26–28.

Trojan horses, computer viruses, and spyware are effective tools with which to attack computer systems. They assume an authorized user’s identity. Thus, access control methods based upon identity or role are ineffective. This chapter presents several types of malicious logic, and discusses defenses.

23.1 Introduction

Odysseus, of Trojan War fame, found the most effective way to breach a hitherto-impregnable fortress was to have people inside bring him in without knowing they were doing so [919, 1936]. The same approach works for ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Security Engineering, 3rd Edition

Security Engineering, 3rd Edition

Ross Anderson
Defensive Security Handbook, 2nd Edition

Defensive Security Handbook, 2nd Edition

Lee Brotherston, Amanda Berlin, William F. Reyor

Publisher Resources

ISBN: 9780134097145