Chapter 5. Protecting Microsoft Windows Against Malware

THE PREVIOUS TWO CHAPTERS FOCUSED on protecting data from unauthorized people. While the concepts are generally stated in terms of users and not people, it is common to relate the two. What if an attacker is not a person? Programs can carry out attacks. It is important to consider controls to prevent programs from violating the integrity, confidentiality, and availability of data as well as just preventing human attackers.

In this chapter you'll learn about the different types of software that can violate the security of your information systems. Software designed to infiltrate a target computer and carry out the attacker's instructions is referred to as malicious software. Malicious software ...

Get Security Strategies in Windows Platforms and Applications now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.