![]() ![]() Software vendors develop signatures to detect specific malicious software. ![]() Signature-based malware detection uses a set of known software components and their digital signatures to identify new malicious software. How antimalware worksĪntimalware software uses three strategies to protect systems from malicious software: signature-based detection, behavior-based detection and sandboxing. A Trojan horse appears to be something benign, such as a game or a screen saver, but it actually contains code that causes damage to the computer or enables the author to access the user's data. A worm is similar to a virus, except that it doesn't need to infect other programs on a computer to spread. A virus is a piece of software that duplicates itself and spreads from one computer to another. The three most common types of malware mentioned above are viruses, worms and Trojan horses.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |