My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
2023/12/13 Council Agenda Packet
>
Council Agenda Packets
>
2023
>
2023/12/13 Council Agenda Packet
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
12/14/2023 8:51:43 AM
Creation date
12/13/2023 5:03:11 PM
Metadata
Fields
Template:
Council Agenda Packet
Date
12/13/2023
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
165
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
Download electronic document
View images
View plain text
What Is a Rootkit? How to Defend and Stop Them? I Fortinet https://www.fortinet.com/resources/cyberglossary/rootkit#:-•:text=... <br />vulnerabilities and use exploit code to attack a machine, then install a rootkit and other <br />components that give them remote access. <br />Another common rootkit installation method is through infected universal serial bus (USB) <br />drives that attackers leave in public places in the hope that unwitting victims will pick them up <br />and plug them into a machine. The malware hidden on a USB drive will then install as part of an <br />application or file that appears to be legitimate. <br />However, rootkits are not only used for malicious purposes. They are also used by organizations <br />and law enforcement to monitor employees, which enable them to investigate machines and <br />counter possible cyber threats. <br />There are several rootkit virus types that give attackers different routes into computers and <br />enable them to steal data from users. <br />A firmware rootkit, also known as a hardware rootkit, typically aims to infect a computer's hard <br />drive and basic input/output system (BIOS), the software installed onto a small memory chip in <br />the motherboard. Some firmware rootkits can be used to infect a user's router, as well as <br />intercept data written on hard disks. <br />tI * t '` . rt <br />A bootloader is an important element of any computer and is central to a machine booting up. <br />The special OS software Toads in the memory of a computer after it starts up and is typically <br />launched by a compact disc (CD) or digital versatile disc (DVD), hard drive, or USB stick, which <br />tells the BIOS where the bootloader is. A bootloader toolkit attacks this system by replacing a <br />machine's bootloader with a hacked version. <br />A bootloader rootkit infects the master boot record or volume boot record, which means it does <br />not show up in users' standard file systems. This makes it extremely difficult for the rootkit to <br />be detected by anti-rootkit and antivirus software. It may also modify boot records, which could <br />damage a machine when removed. <br />2 of 11 19/1717M't t• 1 R PM <br />
The URL can be used to link to this page
Your browser does not support the video tag.