CHAPTER 6

Malicious Code and Activity

In this chapter, you will learn about

•  Different types of malicious code

•  Common ways malware infects systems

•  How attackers use remote access tools

•  Stages of complex malware infections

•  Differences between signature-based and heuristics-based antivirus software

•  The importance of keeping antivirus signature definitions up to date

•  The use of spam filters and content-filtering appliances

•  How the principle of least privilege helps minimize infections

•  Software security practices such as input validation and code signing

•  Educating users about safe computing practices to reduce infections

•  The Common Vulnerabilities and Exposures list

Identifying Malicious Code

Malicious code, or malicious ...

Get SSCP Systems Security Certified Practitioner All-in-One Exam Guide, Second Edition, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.