October 2019
Intermediate to advanced
374 pages
13h 10m
English
Protecting Microsoft Windows against Malware
INFORMATION SECURITY EFFORTS are often focused on protecting data from unauthorized people. While the concepts are generally stated in terms of users and not people, it is common to relate the two. What if an attacker is not a person? Programs can carry out attacks on behalf of people. It is important to consider controls to prevent programs from violating the confidentiality, integrity, and availability of data as well as just preventing human attacks.
In this chapter, you’ll learn about the different types of software that can violate the security of your information systems. Software ...
Read now
Unlock full access