Full Transcript

# What Are We Up Against? (2 of 6) ## Trojans * Does not need a host program to work * Substitutes itself for a legitimate program * Often downloaded from a web site or a user is tricked into opening an email attachment ## Rootkits * Loads itself before the OS boot is complete * Can hide in boot...

# What Are We Up Against? (2 of 6) ## Trojans * Does not need a host program to work * Substitutes itself for a legitimate program * Often downloaded from a web site or a user is tricked into opening an email attachment ## Rootkits * Loads itself before the OS boot is complete * Can hide in boot managers, boot loader programs, or kernel mode device drivers * Can hide folders that contain software it has installed * Can hijack internal Windows components so it masks information Windows provides to user mode utilities ## Ransomware * Holds your computer system hostage until you pay money

Use Quizgecko on...
Browser
Browser