O'Reilly logo

Effective Incident Response Team, The by Brian Moeller, Julie Lucas

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Malicious Logic

Malicious logic—viruses, worms, Trojan horses, and logic bombs—robs its victims of productivity and jeopardizes every organization's information security and infrastructure. These computer programs, which are written with spiteful intent, perform unauthorized routines to damage and destroy data or to degrade system performance. Although the level and type of damage varies, the impact can be enormous, with the greatest costs usually tallied in the form of person-hours expended on recovery. There is virtually no way to keep an organization completely free from malicious logic, but there are steps everyone can take to proactively address the problem. First, one must understand the types of codes and recommended courses of action. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required