Chapter 23
Malware
TITUS ANDRONICUS: Ah! wherefore dost thou urge the name of hands?To bid Aeneas tell the tale twice o’er, How Troy was burnt and he made miserable?
— The Tragedy of Titus Andronicus, III, ii, 26–28.
Trojan horses, computer viruses, and spyware are effective tools with which to attack computer systems. They assume an authorized user’s identity. Thus, access control methods based upon identity or role are ineffective. This chapter presents several types of malicious logic, and discusses defenses.
Get Computer Security Art and Science, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.