O'Reilly logo

SSCP Systems Security Certified Practitioner All-in-One Exam Guide, Second Edition, 2nd Edition by Darril Gibson

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 6

Malicious Code and Activity

In this chapter, you will learn about

•  Different types of malicious code

•  Common ways malware infects systems

•  How attackers use remote access tools

•  Stages of complex malware infections

•  Differences between signature-based and heuristics-based antivirus software

•  The importance of keeping antivirus signature definitions up to date

•  The use of spam filters and content-filtering appliances

•  How the principle of least privilege helps minimize infections

•  Software security practices such as input validation and code signing

•  Educating users about safe computing practices to reduce infections

•  The Common Vulnerabilities and Exposures list

Identifying Malicious Code

Malicious code, or malicious ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required