From the course: CompTIA Security (SY0-701) Cert Prep: 2 Threats, Vulnerabilities, and Mitigations

Unlock the full course today

Join today to access over 23,200 courses taught by industry experts.

Understanding backdoors and logic bombs

Understanding backdoors and logic bombs

- [Lecturer] We've already talked about quite a few types of malware. Viruses, worms, Trojan horses, adware, spyware, and ransomware all have one thing in common. They are independent programs written by malware developers to deliver a malicious payload. Some malware, however, doesn't fit this pattern. Instead of being independent programs, they are pieces of code inserted into other applications with malicious intent. Let's talk about two types of malware that fit in this category, backdoors and logic bombs. A backdoor occurs when a programmer provides a means to grant themselves or others future access to a system. They usually do this with benevolent purposes. They might simply be trying to make programming easier so that they don't have to keep logging in with user credentials, or they might be providing a mechanism to allow access later if a customer locks themselves out of their own system. But these backdoors can have…

Contents