Home arrow Security arrow Page 6 - Whatís behind the curtain? Part I

Backdoors - Security

It's no secret that any computer connected to the Internet faces a wide array of security threats. These days, however, a business needs to be connected to the Internet just to do business. What can you do? Keep reading to learn more about risks you take, and what you can do to protect yourself and your company.

TABLE OF CONTENTS:
  1. Whatís behind the curtain? Part I
  2. Types of attackers
  3. Anatomy of an attack
  4. Targets
  5. Malicious Code
  6. Backdoors
By: Eliana Stavrou
Rating: starstarstarstarstar / 9
February 21, 2005

print this article
SEARCH DEV SHED

TOOLS YOU CAN USE

advertisement

Backdoors are used to provide access to a system after the attacker has defeated the security mechanisms and gained control of the system. When the programmer writes the code for an application, he deliberately installs the backdoor. In some circumstances the programmer installs the backdoor for administrative purposes; however, attackers can detect these backdoors or install their own backdoor. A backdoor is a way of retaining the illegal entrance to the system for further exploiting the system. In addition, by using a backdoor, the compromised system can be used for launching denial of service attacks to other systems.

Logic bomb

A logic bomb (or slag code) is special programming code attached to other files that is triggered only after a predefined period of time has passed, on a specific date, or when a specific even occurs. For example, a virus can be considered a logic bomb if it is activated at a certain time. Logic bombs can be set to alter your file, format your hard drive or execute any other undesirable action.

Mobile code

The need for dynamic content has lead to the adoption of mobile code like Java Applets and Active X. Malicious code written in these languages can be executed when executing the associated Web page; their target is usually to steal data or disable the systems.

Conclusions

In this article I listed the threats associated with malicious code and specifically Iíve talked about six threats that are under the malicious code umbrella. As I said in the introduction of this article the list of threats is endless; more threats will be discussed on the next part of this article. 



 
 
>>> More Security Articles          >>> More By Eliana Stavrou
 

blog comments powered by Disqus
escort Bursa Bursa escort Antalya eskort
   

SECURITY ARTICLES

- Secure Your Business for Data Privacy Day
- Google Testing Security Fob Password Alterna...
- Security News Highlights Concerns
- Going to Extremes for Data Security
- Skipfish Website Vulnerability Scanner
- Critical Microsoft Visual Studio Security Pa...
- US Faces Tech Security Expert Deficit
- LAN Reconnaissance
- An Epilogue to Cryptography
- A Sequel to Cryptography
- An Introduction to Cryptography
- Security Overview
- Network Security Assessment
- Firewalls
- Whatís behind the curtain? Part II

Developer Shed Affiliates

 


Dev Shed Tutorial Topics: