With the widespread popularity of mobile smart terminals,
malicious code has been rapidly developed on mobile platforms in recent years, which has caused huge harm to users. So what is the malicious code? Let's take a look with the editor of Baibai Safety Net. .
Malicious code refers to code that has no effect but brings danger. A safest definition is to treat all unnecessary code as malicious. Unnecessary code has a broader meaning than malicious code, including all possible Software that conflicts with an organization’s security policies.
Definition 1: Malicious code is also called malware. These softwares may also be called adware (adware), spyware (spyware), and malicious shareware (malicious shareware). It refers to the software that infringes the legal rights and interests of the user without installing the user's computer or other terminal without explicitly prompting the user or without the user's permission. Unlike viruses or worms, many of these softwares are not secretly written and distributed by small groups or individuals. Instead, many well-known enterprises and groups are suspected of such software. Sometimes called rogue software.
Definition 2: Malicious code refers to computer code that is deliberately prepared or set up to pose a threat or potential threat to the network or system. The most common malicious codes are computer viruses (viruses for short), Trojan horses (trojans for short), computer worms (worms for short), backdoors, and logic bombs.
What are the common characteristics of
malicious code
(1) Malicious purpose
(2) It is a computer program
(3) Take effect through execution
Some prank programs or game programs cannot be regarded as malicious code. There are many literatures discussing the characteristics of filtered viruses. Despite their large number, the mechanism is relatively similar. Within the scope of protection of antivirus programs, it is more notable that non-filtered viruses.
The above is the introduction of what malicious code is. If you want to know more about malicious code, please continue to pay attention to the information security knowledge column of Baibai Safety Net.