Professional Documents
Culture Documents
Malicious Code
Malicious Code
Malicious Code
Information and
Assurance Security
CSPC 15
Threats and
Vulnerabilities
Wesleyan University-Philippines
“Building People, Transforming Lives”
Malicious Code
Malicious code refers to viruses, Trojan horses, worms, logic bombs, and
any other software created for the purpose of attacking a platform.
3
Wesleyan University-Philippines
“Building People, Transforming Lives”
Virus
4
Wesleyan University-Philippines
“Building People, Transforming Lives”
5
Wesleyan University-Philippines
“Building People, Transforming Lives”
Trojan Horse
A program that performs a desired task, but that also includes unexpected
and undesirable functions. For example, consider an editing program for a
multiuser system. This program could be modified to randomly and unexpectedly
delete a user’s files each time they perform a useful function (e.g., editing).
6
Wesleyan University-Philippines
“Building People, Transforming Lives”
Worm
7
Wesleyan University-Philippines
“Building People, Transforming Lives”
Logic Bomb
8
Wesleyan University-Philippines
“Building People, Transforming Lives”
Ransomware