My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
2023/12/13 Council Agenda Packet
>
Council Agenda Packets
>
2023
>
2023/12/13 Council Agenda Packet
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
12/14/2023 8:51:43 AM
Creation date
12/13/2023 5:03:11 PM
Metadata
Fields
Template:
Council Agenda Packet
Date
12/13/2023
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
165
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
Download electronic document
View images
View plain text
What Is a Rootkit? How to Defend and Stop Them? I Fortinet <br />https:I/www.fortinetcom/resources/cyberglossary/rootkit#:—:text - ... <br />A memory rootkit hides in a machine's random access memory (RAM), the hardware that <br />enables data to be received and stored on a computer. These rootkits only have short lifespans, <br />but they can carry out extremely harmful activity in the background of a machine. <br />Memory rootkits live in a machine's RAM and typically disappear when the system is rebooted, <br />but they can sometimes require additional work to be removed. They reduce the performance <br />of a machine's RAM by eating up resources with their malicious processes. <br />(® ®• '••t <br />it <br />An application rootkit replaces the files on a computer with malicious rootkit files, which <br />changes the performance of standard applications like Notepad, Paint, or Word. Every time a <br />user runs these applications, they give the hacker access to their computer. The infected <br />programs run as usual, which can make it difficult to detect that a rootkit is present, but they <br />should be discovered with good anti-rootkit or antivirus programs. <br />• <br />• <br />• <br />Kernel mode rootkits are pieces of advanced, complex malware that target a machine's OS. <br />They give an attacker simple access to a machine, enabling them to steal data and modify how <br />the OS works by adding, deleting, or replacing its code. <br />Creating a kernel mode rootkit requires significant technical knowledge, which means if it has <br />bugs or glitches, then it could have a huge impact on the infected machine's performance. <br />However, a kernel rootkit laden with bugs is easier to detect as it leaves a trail for anti-rootkit or <br />antivirus software. <br />These rootkit types have been used to create devastating attacks, including: <br />1. NTRootkit: One of the first malicious rootkits created, which targeted the Windows OS. <br />2. Machiavelli: The first rootkit to target the Mac OS. The 2009 Machiavelli rootkit attack <br />• <br />3of11 <br />1911 919091 F • 1 R PM <br />
The URL can be used to link to this page
Your browser does not support the video tag.