Capture.PNG
Document Details
Uploaded by jlopez59#
Tags
Full Transcript
# What Are We Up Against? (2 of 6) ## Trojans * Does not need a host program to work * Substitutes itself for a legitimate program * Often downloaded from a web site or a user is tricked into opening an email attachment ## Rootkits * Loads itself before the OS boot is complete * Can hide in boot...
# What Are We Up Against? (2 of 6) ## Trojans * Does not need a host program to work * Substitutes itself for a legitimate program * Often downloaded from a web site or a user is tricked into opening an email attachment ## Rootkits * Loads itself before the OS boot is complete * Can hide in boot managers, boot loader programs, or kernel mode device drivers * Can hide folders that contain software it has installed * Can hijack internal Windows components so it masks information Windows provides to user mode utilities ## Ransomware * Holds your computer system hostage until you pay money