文档介绍:TROJANS, WORMS, AND SPYWARE
This page intentionally left blank
TROJANS, WORMS, AND SPYWARE
puter Security Professional’s Guide
to Malicious Code
Michael Erbschloe
AMSTERDAM • BOSTON • HEIDELBERG • LONDON
NEW YORK • OXFORD • PARIS • SAN DIEGO
SAN FRANCISCO • SINGAPORE • SYDNEY • TOKYO
Elsevier Butterworth–Heinemann
200 Wheeler Road, Burlington, MA 01803, USA
Linacre House, Jordan Hill, Oxford OX2 8DP, UK
Copyright © 2005, Elsevier Inc. All rights reserved.
No part of this publication may be reproduced, stored in a retrieval system, or
transmitted in any form or by any means, electronic, mechanical, photocopying,
recording, or otherwise, without the prior written permission of the publisher.
Permissions may be sought directly from Elsevier’s Science & Technology Rights
Department in Oxford, UK: phone: (+44) 1865 843830, fax: (+44) 1865 853333,
e-mail: ******@.uk. You may plete your request on-line
via the Elsevier homepage (), by selecting “Customer Support”
and then “Obtaining Permissions.”
Recognizing the importance of preserving what has been written, Elsevier prints its
books on acid-free paper whenever possible.
Library of Congress Cataloging-in-Publication Data
Application submitted.
British Library Cataloguing-in-Publication Data
A catalogue record for this book is available from the British Library.
ISBN: 0-7506-7848-8
For information on all Butterworth–Heinemann publications
visit our website at http://books./security
03 04 05 06 07 08 09 10 9 8 7 6 5 4 3 2 1
Printed in the United States of America
To my mother
To my friends Blaster and Razer
Table of Contents
Preface xiii
Introduction xv
Inside This Book xvii
Acknowledgements xix
1 Malicious Code Overview 1
Why Malicious Code Attacks Are Dangerous 3
Impact of Malicious Code Attacks on
Corporate Security 6
Why Malicious Code Attacks Work 8
Action Steps bat Malicious Code Attacks 15
2 Types of Malicious Code 17
E-mail Viruses and Miscellan