CHAPTER 6Malicious Code and Activity

In this chapter, you will learn about

• Different types of viruses

• Differences among viruses, worms, Trojan horses, and logic bombs

• Rootkits, trapdoors, backdoors, and spyware

• Differences between signature-based detection and heuristics-based detection for antiviruses

• The importance of keeping antivirus signature definitions up to date

• The use of spam filters and content-filtering appliances

• The principle of least privilege and how it can help prevent infections

• The education of users about safe computing practices

• The Common Vulnerabilities and Exposures list

Get SSCP Systems Security Certified Practitioner All-in-One Exam Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.