O'Reilly logo

Security Strategies in Windows Platforms and Applications by Michael G. Solomon

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 5. Protecting Microsoft Windows Against Malware

THE PREVIOUS TWO CHAPTERS FOCUSED on protecting data from unauthorized people. While the concepts are generally stated in terms of users and not people, it is common to relate the two. What if an attacker is not a person? Programs can carry out attacks. It is important to consider controls to prevent programs from violating the integrity, confidentiality, and availability of data as well as just preventing human attackers.

In this chapter you'll learn about the different types of software that can violate the security of your information systems. Software designed to infiltrate a target computer and carry out the attacker's instructions is referred to as malicious software. Malicious software ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required