dc.contributor.author |
Decloedt, HE
|
|
dc.contributor.author |
Van Heerden, Renier P
|
|
dc.date.accessioned |
2010-12-20T13:42:39Z |
|
dc.date.available |
2010-12-20T13:42:39Z |
|
dc.date.issued |
2010-10 |
|
dc.identifier.citation |
Decloedt, HE and van Heerden, R. 2010. Rootkits, Trojans, backdoors and new developments. Proceedings of the Workshop on ICT Uses in Warfare and the Safeguarding of Peace 2010 Forever Resort, Bela Bela 11 October 2010, pp 4-11 |
en |
dc.identifier.isbn |
978-0-620-47586-0 |
|
dc.identifier.uri |
http://hdl.handle.net/10204/4689
|
|
dc.description |
Proceedings of the Workshop on ICT Uses in Warfare and the Safeguarding of Peace 2010 Forever Resort, Bela Bela 11 October 2010 |
en |
dc.description.abstract |
This paper gives an overview of the history and new developments with Rootkits, Trojans and backdoors. The paper also looks at the different types of rootkits that exist, how to use a rootkit, and methods for detecting rootkits. Backdoors, Trojans and detection methods are investigated. Methods for detecting and removing malicious software are also looked at. Current and future developments in rootkits, Trojans and backdoors are evaluated |
en |
dc.language.iso |
en |
en |
dc.publisher |
CSIR. Defence Peace Safety and Security |
en |
dc.relation.ispartofseries |
Conference Paper |
en |
dc.subject |
Cyber threat |
en |
dc.subject |
Cyber trend |
en |
dc.subject |
Information security |
en |
dc.subject |
ICT Uses |
en |
dc.subject |
Proceedings of the Workshop on ICT Uses in Warfare and the Safeguarding of Peace 2010 |
en |
dc.title |
Rootkits, Trojans, backdoors and new developments |
en |
dc.type |
Conference Presentation |
en |
dc.identifier.apacitation |
Decloedt, H., & Van Heerden, R. P. (2010). Rootkits, Trojans, backdoors and new developments. CSIR. Defence Peace Safety and Security. http://hdl.handle.net/10204/4689 |
en_ZA |
dc.identifier.chicagocitation |
Decloedt, HE, and Renier P Van Heerden. "Rootkits, Trojans, backdoors and new developments." (2010): http://hdl.handle.net/10204/4689 |
en_ZA |
dc.identifier.vancouvercitation |
Decloedt H, Van Heerden RP, Rootkits, Trojans, backdoors and new developments; CSIR. Defence Peace Safety and Security; 2010. http://hdl.handle.net/10204/4689 . |
en_ZA |
dc.identifier.ris |
TY - Conference Presentation
AU - Decloedt, HE
AU - Van Heerden, Renier P
AB - This paper gives an overview of the history and new developments with Rootkits, Trojans and backdoors. The paper also looks at the different types of rootkits that exist, how to use a rootkit, and methods for detecting rootkits. Backdoors, Trojans and detection methods are investigated. Methods for detecting and removing malicious software are also looked at. Current and future developments in rootkits, Trojans and backdoors are evaluated
DA - 2010-10
DB - ResearchSpace
DP - CSIR
KW - Cyber threat
KW - Cyber trend
KW - Information security
KW - ICT Uses
KW - Proceedings of the Workshop on ICT Uses in Warfare and the Safeguarding of Peace 2010
LK - https://researchspace.csir.co.za
PY - 2010
SM - 978-0-620-47586-0
T1 - Rootkits, Trojans, backdoors and new developments
TI - Rootkits, Trojans, backdoors and new developments
UR - http://hdl.handle.net/10204/4689
ER -
|
en_ZA |