Explain rootkits and how they can be used to attack your systems.

label Computer Science
account_circle Unassigned
schedule 1 Day
account_balance_wallet $5

Explain rootkits and how they can be used to attack your systems.

Mar 27th, 2015

rootkit is a stealthy type of software, typically malicious, designed to hide the existence of certain processes or programs from normal methods of detection and enable continued privileged access to a computer

A rootkit often allows the installation of hidden files, processes, hidden user accounts, and more in the systems OS. Rootkits are able to intercept data from terminals,network connections, and the keyboard.

Mar 27th, 2015

Did you know? You can earn $20 for every friend you invite to Studypool!
Click here to
Refer a Friend
...
Mar 27th, 2015
...
Mar 27th, 2015
Sep 25th, 2017
check_circle
Mark as Final Answer
check_circle
Unmark as Final Answer
check_circle
Final Answer

Secure Information

Content will be erased after question is completed.

check_circle
Final Answer