CHAPTER 6Malicious Code and Activity
In this chapter, you will learn about
• Different types of viruses
• Differences among viruses, worms, Trojan horses, and logic bombs
• Rootkits, trapdoors, backdoors, and spyware
• Differences between signature-based detection and heuristics-based detection for antiviruses
• The importance of keeping antivirus signature definitions up to date
• The use of spam filters and content-filtering appliances
• The principle of least privilege and how it can help prevent infections
• The education of users about safe computing practices
• The Common Vulnerabilities and Exposures list
Get SSCP Systems Security Certified Practitioner All-in-One Exam Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.