Page 1455 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1455

Malicious Code


               Malicious code objects include a broad range of programmed
               computer security threats that exploit various network, operating
               system, software, and physical security vulnerabilities to spread

               malicious payloads to computer systems. Some malicious code objects,
               such as computer viruses and Trojan horses, depend on irresponsible
               computer use by humans in order to spread from system to system
               with any success. Other objects, such as worms, spread rapidly among
               vulnerable systems under their own power.

               All information security practitioners must be familiar with the risks
               posed by the various types of malicious code objects so they can

               develop adequate countermeasures to protect the systems under their
               care as well as implement appropriate responses if their systems are
               compromised.


               Sources of Malicious Code


               Where does malicious code come from? In the early days of computer
               security, malicious code writers were extremely skilled (albeit
               misguided) software developers who took pride in carefully crafting
               innovative malicious code techniques. Indeed, they actually served a
               somewhat useful function by exposing security holes in popular
               software packages and operating systems, raising the security

               awareness of the computing community. For an example of this type of
               code writer, see the sidebar “RTM and the Internet Worm” later in this
               chapter.

               Modern times have given rise to the script kiddie—the malicious
               individual who doesn’t understand the technology behind security
               vulnerabilities but downloads ready-to-use software (or scripts) from
               the internet and uses them to launch attacks against remote systems.

               This trend gave birth to a new breed of virus-creation software that
               allows anyone with a minimal level of technical expertise to create a
               virus and unleash it upon the internet. This is reflected in the large
               number of viruses documented by antivirus experts to date. The
   1450   1451   1452   1453   1454   1455   1456   1457   1458   1459   1460