Malicious software

Cards (7)

  • A worm is a standalone program that doesn't require a user to run in order to spread. They exploit vulnerabilities in the destination system.
  • Trojans can hide malicious code inside seemingly safe files. They cannot self-replicate and often are used as a backdoor to the system
  • Phising is using email to manipulate users to visit a fake website and give away personal information
  • SQL injection is where a user enters SQL commands via online database forms to change the database.
  • Buffer overflow is when a program accidentally writes to an area of memory that is too small to store the data
  • A measure to reduce the risk of malware is to improve code quality and implement monitoring tools.
  • Monitoring could detect packet sniffers, or user access logs could be used