Virus structure ports
MITP
The function is performed
Execution phase
The virus is activated to perform the function
Triggering phase
The virus places an identical copy
Propagation phase
The virus is idle
Dormant phase
Virus phases
DPTE
Cracker program that searches out other program
Viruses
Secretly takes over another internet
Zombie
Performs some unwanted or harmful function
Trojan horse
Disguise as something benign
Trojan horses
Code embedded in some legitimate programs
Logic bombs
Another name for a trap door
Back door
Secret entry point
Trap door
Programs that cannot exist independently
Need host program
Are self-contained program that can be scheduled
Independent
Types of malicious code(all)
Performs unauthorized functions causing normal operations to be abnormal
Malicious code
According to them malicious code is bla bla
SPECTRIA InfoSec Services
Security of applications is critical due to the reasons:
SNR
Types of application
Mobile application
Web based application
What an organization does to protect its critical data
Application security
System flaw or weakness in an application
Application vulnerability
ERP stands for?
CRM stands for?