Setting the Stage: Different Layers of Malware

To set the stage for our discussion of deeper and combo malware threats, let's start out by looking at the different layers of our computer systems that malware can infest. Table 9.1 displays six different levels of malware infiltration, summarizing the malware type, the layer it impacts, example tools in the category, and the chapter in this book where we originally discuss that type.

Table 9.1. Malware Operating at Different Layers of a Victim Computer
Malware TypeLayer of the Victim Machine ImpactedActionsAnalogyExample Tools in This CategoryCovered in Chapter
BackdoorApplication layerOffers the attacker access, bypassing normal security controls.Barbarian invaders move into the village, punching ...

Get Malware: Fighting Malicious Code now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.