Malicious Software

Software designed to infiltrate or damage a computer system without the consent or consent of the owner. Such software typically penetrates the network during many operationally approved activities, resulting in the use of vulnerabilities in the system. Viruses, worms, Trojans, Trojan horses, spyware, adware and rootkits serve as examples.


Malicious Software

Software designed to infiltrate or damage a computer system without the consent or consent of the owner. Such software typically penetrates the network during many operationally approved activities, resulting in the use of vulnerabilities in the system. Viruses, worms, Trojans, Trojan horses, spyware, adware and rootkits serve as examples.

Used in methodology