Examples of these malicious tasks include deleting or corrupting files or databasesĪnd executing a specific instruction after certain system conditions are met. An attacker can program a logic bomb to delete itself from the disk after it performs the malicious tasks on the system. * Logic bomb: A type of malicious code that is injected into a legitimate application. the Happy99 worm), which sends a copy of itself every time the user sends a new message. Examples of mass-mailer worms are and (a.k.a. Mailer or mass-mailer worm: A type of worm that sends itself in an email message. In most cases, a worm executes malicious instructions on a remote system without user interaction. * Worm: A virus that replicates itself over the network, infecting numerous vulnerable systems. In numerous cases, these viruses multiply again to form new generations of themselves. * Computer virus: Malicious software that infects a host file or system area to produce an undesirable outcome such as erasing data, stealing information, or corrupting the integrity of the system. The following are the most common types of malicious software (malware):
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |