Skip to Main Content
Cyber Power
book

Cyber Power

by Solange Ghernaouti-Helie
April 2016
Intermediate to advanced content levelIntermediate to advanced
220 pages
15h 17m
English
EPFL Press
Content preview from Cyber Power
The Cybercriminal’s Toolkits 225
A worm can corrupt documents frequently used by users, businesses,
and governments on all hard drives connected to an infected PC. It can even
affect external data storage devices. Worms are propagated through e-mails –
often when attached to messages attracting recipients with subject lines such
as “hot movie” or “Crazy Illegal sex.” Once the recipient opens the attach-
ment, a program disabling the anti-virus software can be launched. The mali-
cious code may not necessarily aim to install backdoor or keystroke loggers.
Instead, it may simply aim to destroy all important les on the computer. In
order to accomplish this feat, the worm injects le deletion instructions onto
servers.
A Trojan horse presents ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Cyber Warfare

Cyber Warfare

Jason Andress, Steve Winterfeld
Cyber Minds

Cyber Minds

Shira Rubinoff
Cybercrime

Cybercrime

Todd Wade

Publisher Resources

ISBN: 9781466573048