Please enable JavaScript.
Coggle requires JavaScript to display documents.
Malicious Code - Coggle Diagram
Malicious Code
malware
embeds itself in host program
trap doors
logic bombs
trojan horse
virus
dormant, propagation, triggering, execution
types
parasitic
memory-resident
macro
boot sector
polymorphic
browser extension
interacts with system as independent programs
worms
network connections
botnets
APTs
defense
4 generations of antivirus software
simple scanner
virus signature
heuristic scanner
checksum
activity traps
knowledge of malware activities
full-featured analysis