Page 284 - CISSO_Prep_ Guide
P. 284

deleted, that user may still retain access as of
                   login-time rather than the current time.
               •   Executable content / mobile code = web
                   applets (javascript), dynamic e-mail.
               •  Virus = malicious code that replicates by
                   attaching itself to other programs or files.
               •  Worms = malicious and continuous process that
                   reproduces and hogs up resources.  This often
                   does not involve the user.
               •  Multipartite virus = hybrid of different virus
                   types
               •  Trojan horse = malicious code that pretends to
                   be something fun or useful.
               •  Logic bomb = malicious code that is often
                   planted by insiders and waits for a condition or
                   time.
               •  Data diddlers = malicious code that corrupts
                   programs or data a tiny bit at a time, so it
                   doesn't go detected.  Backups will not protect
                   you against this.
               •  Maintenance hook = back door, a hidden
                   mechanism that bypasses controls.
               •  RAT = remote administration tool (good),
                   remote access Trojan (bad).
               •  Rootkits = a series of Trojan horse programs
                   that can replace critical system files or interfere
                   with kernel functions.
               •  Easter eggs = a hidden surprise function in a
                   program
   279   280   281   282   283   284   285   286   287   288   289