{"title":"Cybercrime","authors":"T. Tropina","doi":"10.4324/9781351038904-14","DOIUrl":null,"url":null,"abstract":" A botnet (short for robot network) is made up of computers communicating with each other over the internet. A command and control centre uses them to send spam, mount distributed denial-of-service (DDoS) attacks (see below) and commit other crimes. A rootkit is a collection of programmes that enable administrator-level access to a computer or computer network, thus allowing the attacker to gain root or privileged access to the computer and possibly other machines on the same network. A worm replicates itself over a computer network and performs malicious actions without guidance. A trojan poses as, or is embedded within, a legitimate programme, but it is designed for malicious purposes, such as spying, stealing data, deleting files, expanding a botnet, and performing DDoS attacks. A file infector infects executable files (such as .exe) by overwriting them or inserting infected code that disables them.","PeriodicalId":199819,"journal":{"name":"Routledge Handbook of International Cybersecurity","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Routledge Handbook of International Cybersecurity","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4324/9781351038904-14","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
A botnet (short for robot network) is made up of computers communicating with each other over the internet. A command and control centre uses them to send spam, mount distributed denial-of-service (DDoS) attacks (see below) and commit other crimes. A rootkit is a collection of programmes that enable administrator-level access to a computer or computer network, thus allowing the attacker to gain root or privileged access to the computer and possibly other machines on the same network. A worm replicates itself over a computer network and performs malicious actions without guidance. A trojan poses as, or is embedded within, a legitimate programme, but it is designed for malicious purposes, such as spying, stealing data, deleting files, expanding a botnet, and performing DDoS attacks. A file infector infects executable files (such as .exe) by overwriting them or inserting infected code that disables them.