Setting the Stage: Different Layers of Malware

To set the stage for our discussion of deeper and combo malware threats, let's start out by looking at the different layers of our computer systems that malware can infest. Table 9.1 displays six different levels of malware infiltration, summarizing the malware type, the layer it impacts, example tools in the category, and the chapter in this book where we originally discuss that type.

Table 9.1. Malware Operating at Different Layers of a Victim Computer
Malware TypeLayer of the Victim Machine ImpactedActionsAnalogyExample Tools in This CategoryCovered in Chapter
BackdoorApplication layerOffers the attacker access, bypassing normal security controls.Barbarian invaders move into the village, punching ...

Get Malware: Fighting Malicious Code now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.