Conclusions

In this chapter, we've seen how bad guys can exploit a series of typical mistakes to completely undermine a target's computer systems using various forms of malware. It's important to note that each of these mistakes is commonplace in computer systems around the world today. However, all is not lost. By carefully applying the lessons learned in this chapter, together with the recommendations we've covered throughout the book, we can mount a credible defense against these types of attacks.

Also, if you enjoy scenarios like these, please feel free to look at my Web site, www.counterhack.net. Each month, I write a new scenario that highlights a particular type of computer attack and defense and make it freely available on my Web site. ...

Get Malware: Fighting Malicious Code now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.