Trojans, Worms, & Spyware | A Computer Security Professional's Guide

Introduction

One of the biggest headaches that come along with networked and Internet-connected computers is the absolute requirement of dealing with malicious code attacks. There is no choice; if your systems are not equipped in some way with antivirus protection, sooner or later some bug will eat them. There is also very little to be gained by whining about how vulnerable computer systems are to malicious code attacks. The unfortunate circumstances that wired societies face can be depicted in the following manner:

• Organizations and individuals want computing and communications
resources and they want them as cheaply as possible.

• Software and hardware manufacturers work synergistically to meet
market demands for cheap but highly functional computing and communications resources.

• The corporate interests that drive cooperation between software and
hardware manufacturers have resulted in a marketplace that is dominated by very few companies.

• Market dominance by very few companies has created a computing
and communications technology ecology with very few species.

• The antithesis to the social forces that drive the dominant companies
to cooperate in controlling the marketplace is a counterculture of malicious code writers that revels in embarrassing the corporate giants on
their lack of technical prowess.

• The small number of species in the technology ecology makes it easy
for the malicious code writers to find vulnerabilities and launch attacks
that can spread around the world in a very short time.

Go To Base64 & Decode:

aHR0cHM6Ly9tZWdhLm56L2ZpbGUvcmZSSDFDd0IjeXJXcGJkdmhHYkhfOUFxVEdxaDFHSlhvY0x3SlFka01JbjRIb3lIWG01VQ==

Happy learning!

4 Likes