< Day Day Up > |
Viruses, Trojans, and backdoor applications are a nightmare for anyone working in the information technology (IT) field. A Trend Micro Computer World article estimated that PC viruses cost businesses approximately $55 billion in damages in 2003. Viruses and Trojans such as Chernobyl, I Love You, Melissa, and others wreak havoc on businesses that rely on technology to operate. This chapter explores the world of Trojans, viruses, and backdoor applications. You will learn about some of the more notorious viruses and about Trojan and backdoor utilities that malicious hackers and penetration testers use. This chapter concludes with a discussion of how to detect whether you are under attack by these malware applications and the preventative steps to take to safeguard your network from these types of attacks. |
< Day Day Up > |