Lecture Data security and encryption - Lecture 27: Malicious Software
Lecture Data security and encryption - Lecture 27: Malicious Software
The contents of this chapter include all of the following: problem of intrusion, behavior and techniques; intrusion detection (statistical & rule-based); password management; various malicious programs; trapdoor, logic bomb, trojan horse, zombie; viruses; worms; distributed denial of service attacks.