Please enable JavaScript.
Coggle requires JavaScript to display documents.
1 - Malware - Coggle Diagram
1 - Malware
Virus
Two main functions
Propagation techniques
-
-
Companion virus
Self-contained files that escape detection by using a filename similar to, but slightly different from, a legitimate operating system file
-
-
-
Virus technologies
Multipartite viruses
Use more than one propagation technique in an attempt to penetrate systems that defend against only one method or the other
Stealth viruses
Hide themselves by actually tampering with the OS to fool antivirus packages into thinking that everything is functioning normally.
-
-
Trojan horses
A software program that appears benevolent but carries a malicious, behind-the-scenes payload that has the potential to wreak havoc on a system or network
-
-
Logic bombs
Malicious code objects that infect a system and lie dormant until they are triggered by the occurrence of one or more conditions such as time, program launch, website logon, certain keystrokes, and so on
-
-
-
-