O'Reilly logo

Fundamentals of Information Systems Security, 3rd Edition by Kim

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 11: Malicious Code and Activity

MALICIOUS CODE OR SOFTWARE IS a threat to any Internet-connected device. In this chapter, you’ll learn how malicious code operates and how you can combat it. Simply put, malicious software is any program that carries out actions that you, as the computer user, do not intend. Often the goal of malicious software is to cause harm to your system. Malicious software moves through the Internet much as a snake slithers through grass. Attackers use malicious software, or malware, to steal passwords, steal confidential information, delete information from your system (or encrypt it), or even reformat hard drives. Unfortunately, you cannot control malicious code with antivirus software alone. That’s because ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required