Save
...
Hewitt
The Internet
Malicious software
Save
Share
Learn
Content
Leaderboard
Learn
Created by
Zak Whitaker
Visit profile
Cards (7)
A
worm
is a
standalone program
that doesn't require a user to run in order to spread. They
exploit vulnerabilities
in the
destination
system.
Trojans can hide
malicious code
inside seemingly safe
files.
They cannot
self-replicate
and often are used as a
backdoor
to the system
Phising is using
email
to manipulate users to visit a
fake
website and give away
personal
information
SQL injection
is where a user enters
SQL
commands via
online database forms
to change the
database.
Buffer overflow
is when a program accidentally
writes
to an area of
memory
that is too
small
to
store
the data
A measure to reduce the risk of malware is to improve
code quality
and implement
monitoring
tools.
Monitoring could detect packet
sniffers
, or
user access logs
could be used