Part VII
Special Topics
Part VII explores five topics that play important roles in computer security. They underlie the security of modern systems and networks.
Chapter 23, “Malware,” discusses programs set up by attackers to perform actions that violate the site’s security policy. The programs act with the privileges of an authorized user but execute without that user’s knowledge.
Chapter 24, “Vulnerability Analysis,” describes penetration testing. Although important as a standard a posteriori testing technique, penetration testing models the way attackers analyze a system when determining how best to attack it. The insight gained from this mode of thinking is invaluable to defenders. This chapter also discusses models of vulnerabilities to ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access