Page 9 - Security+ (635 notes by Nikkhah)
P. 9

access to a system.
            104- Trojan horses and rootkits are known to use the back door process to exploit a system.

            105- A symmetric back door application allows anyone to use it.

            106- An asymmetric back door application is used only by its creator.






            Types of malicious code
            107- Malicious code, or malware, is an application used to gain access to a system without the

            user’s knowledge or permission.
            108- Malware  includes  viruses,  Trojan  horses,  worms,  and  applications  such  as adware,

            spyware, botnets, or loggers.



            Virus

            109- A virus is a self-replicating application.
            110- It inserts into an executable and spreads when the file is run.

            111- A bootstrap virus infects the boot sector of the hard disk.
            112- A parasitic virus resides in an executable file.



            Worm

            113- A worm resides in the active memory of the computer and is usually not noticeable.

            114- It keeps scanning the network for vulnerabilities.
            115- It spreads itself on to other computers in the network.




            Trojan horse
            116- A Trojan horse is malicious code embedded inside a legitimate application.

            117- It appears as a very useful application to the user.
            118- It is used to collect personal information about the user.

            119- Most spyware, adware, and pop-up windows fall into this category.



            Logic bombs and Time bombs

            120- A logic bomb is malicious code that waits for some condition to be met before it executes.
            121- It can also execute when some event happens.

            122- A time bomb is another type of malicious code that waits for a particular time to execute.


                   www.hrnikkhah.com                        by :  Hamid  Reza  Nikkhah                 Page 7
   4   5   6   7   8   9   10   11   12   13   14