Page 284 - CISSO_Prep_ Guide
P. 284
deleted, that user may still retain access as of
login-time rather than the current time.
• Executable content / mobile code = web
applets (javascript), dynamic e-mail.
• Virus = malicious code that replicates by
attaching itself to other programs or files.
• Worms = malicious and continuous process that
reproduces and hogs up resources. This often
does not involve the user.
• Multipartite virus = hybrid of different virus
types
• Trojan horse = malicious code that pretends to
be something fun or useful.
• Logic bomb = malicious code that is often
planted by insiders and waits for a condition or
time.
• Data diddlers = malicious code that corrupts
programs or data a tiny bit at a time, so it
doesn't go detected. Backups will not protect
you against this.
• Maintenance hook = back door, a hidden
mechanism that bypasses controls.
• RAT = remote administration tool (good),
remote access Trojan (bad).
• Rootkits = a series of Trojan horse programs
that can replace critical system files or interfere
with kernel functions.
• Easter eggs = a hidden surprise function in a
program