Month: September 2017

What is malicious code (software) and how can it be overcame?

(Part One – Serie 5 of 5) What is malicious code (software) and how can it be overcame

Control Methods To Malicious Codes – Software – Attacks In this section as we conclude our part one series, we look at three types of controls: developmental, operating system, and administrative as we look at protecting our systems from malicious code, worms or attackers . We discuss each in turn. Developmental Controls Software development is often considered …

(Part One – Serie 5 of 5) What is malicious code (software) and how can it be overcame Read More »

What is malicious code (software) and how can it be overcame?

(Part One – Serie 4 of 5) What is malicious code (software) and how can it be overcame

Viruses as a type of malicious code (software) A virus a program that can spread the malicious code to other non malicious programs by modifying them. This virus is similar to biological virus because it affects the other healthy file by attaching itself to the program and either destroying it or coexisting with it. Because …

(Part One – Serie 4 of 5) What is malicious code (software) and how can it be overcame Read More »

What is malicious code (software) and how can it be overcame?

(Part One – Serie 3 of 5) What is malicious code (software) and how can it be overcame

Introduction to data, programs and malicious code By themselves, programs are seldom security threats. The programs operate on data, taking action only when data and state changes trigger it. Much of the work done by a program is invisible to users, so they are not likely to be aware of any malicious code activity. For instance, …

(Part One – Serie 3 of 5) What is malicious code (software) and how can it be overcame Read More »