November 2018
Intermediate to advanced
1440 pages
48h 29m
English
TITUS ANDRONICUS: Ah! wherefore dost thou urge the name of hands?To bid Aeneas tell the tale twice o’er, How Troy was burnt and he made miserable?
— The Tragedy of Titus Andronicus, III, ii, 26–28.
Trojan horses, computer viruses, and spyware are effective tools with which to attack computer systems. They assume an authorized user’s identity. Thus, access control methods based upon identity or role are ineffective. This chapter presents several types of malicious logic, and discusses defenses.