Setting the Stage: Different Layers of Malware
To set the stage for our discussion of deeper and combo malware threats, let's start out by looking at the different layers of our computer systems that malware can infest. Table 9.1 displays six different levels of malware infiltration, summarizing the malware type, the layer it impacts, example tools in the category, and the chapter in this book where we originally discuss that type.
Malware Type | Layer of the Victim Machine Impacted | Actions | Analogy | Example Tools in This Category | Covered in Chapter |
---|---|---|---|---|---|
Backdoor | Application layer | Offers the attacker access, bypassing normal security controls. | Barbarian invaders move into the village, punching ... |
Get Malware: Fighting Malicious Code now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.