2007
DOI: 10.1080/10658980701402049
|View full text |Cite
|
Sign up to set email alerts
|

Rootkits and Their Effects on Information Security

Abstract: A rootkit is cloaked software that infiltrates an operating system or a database with the intention to escape detection, resist removal, and perform a specific operation. Many rootkits are designed to invade the "root," or kernel, of the program, and therefore operate without announcing their presence to the owner of the computer. Although some rootkits are written with noble intentions (e.g., to strengthen an anti-virus package), true rootkits have a malicious purpose. A rootkit infection can render a comprom… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2011
2011
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(1 citation statement)
references
References 6 publications
0
1
0
Order By: Relevance
“…Defined as a set of software tools or programs that can be used by an intruder after gaining access to a computer system, rootkits are designed to allow an intruder to maintain access to the system without the user's awareness or knowledge (Beegle, 2007). It is created to infiltrate operating systems or databases with the vicious intention to escape detection, resist removal, and perform a specific operation.…”
Section: Rootkits Penetrationmentioning
confidence: 99%
“…Defined as a set of software tools or programs that can be used by an intruder after gaining access to a computer system, rootkits are designed to allow an intruder to maintain access to the system without the user's awareness or knowledge (Beegle, 2007). It is created to infiltrate operating systems or databases with the vicious intention to escape detection, resist removal, and perform a specific operation.…”
Section: Rootkits Penetrationmentioning
confidence: 99%