Podcast
Questions and Answers
What is a Backdoor and how can it be used by attackers?
What is a Backdoor and how can it be used by attackers?
A Backdoor gives access to a computer, program, or service that circumvents normal security protections. A backdoor installed on a computer allows the attacker to return later and bypass security settings. Some software developers create a legitimate backdoor to be removed when the app is finalized. If forgotten, attackers can use it to access illegally.
What is a Logic Bomb and how is it triggered?
What is a Logic Bomb and how is it triggered?
A Logic Bomb is computer code that is typically added to a legitimate program but lies dormant and evades detection until a specific event triggers it. It then performs its malicious activity (e.g., delete files). It could be implanted by a mad employee.
What is a Rootkit and how does it hide on a computer?
What is a Rootkit and how does it hide on a computer?
A Rootkit can hide its presence and the presence of other malware on the computer. It does this by accessing 'lower layers' of the OS to make alterations.