2 cissp ® Official Study Guide Eighth Edition



Download 19,3 Mb.
Pdf ko'rish
bet857/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   853   854   855   856   857   858   859   860   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

Encrypted Viruses Encrypted viruses
use cryptographic techniques, such as those 
described in Chapter 6, to avoid detection. In their outward appearance, they are actually 
quite similar to polymorphic viruses—each infected system has a virus with a different 
signature. However, they do not generate these modified signatures by changing their code; 
instead, they alter the way they are stored on the disk. Encrypted viruses use a very short 
segment of code, known as the 
virus decryption routine
, which contains the cryptographic 
information necessary to load and decrypt the main virus code stored elsewhere on the 
disk. Each infection utilizes a different cryptographic key, causing the main code to appear 
completely different on each system. However, the virus decryption routines often contain 
telltale signatures that render them vulnerable to updated antivirus software packages.
Hoaxes
No discussion of viruses is complete without mentioning the nuisance and wasted resources 
caused by virus 
hoaxes
. Almost every email user has, at one time or another, received a 
message forwarded by a friend or relative that warns of the latest virus threat roaming the 
internet. Invariably, this purported “virus” is the most destructive virus ever unleashed, 
and no antivirus package is able to detect and/or eradicate it. One famous example of such 
a hoax is the Good Times virus warning that first surfaced on the internet in 1994 and still 
circulates today.
Changes in the social media landscape have simply changed the way these hoaxes circu-
late. In addition to email messages, malware hoaxes now circulate via Facebook, Twitter, 
WhatsApp, Snapchat, and other social media and messaging platforms.
For more information on this topic, the myth-tracking website Snopes maintains a virus 
hoax list at 
https://www.snopes.com/tag/virus-hoaxes-realities/
.

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   853   854   855   856   857   858   859   860   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish