Outline for November 12, 2025

Reading: text, §24.2.11, 23.1–23.4
Assignments: Homework 4, due November 21; Completed Project, due December 9

  1. Greetings and Felicitations!

  2. Penetration testing debate

  3. What is malware?

  4. Trojan horse
    1. Rootkits
    2. Propagating Trojan horses

  5. Computer virus
    1. Brief history
    2. Structure of a computer virus
    3. Infection vectors: boot sector, executable, multipartite, macro
    4. Concealment: TSR, stealth, encrypted, polymorphic, metamorphic

  6. Computer worms

UC Davis sigil
Matt Bishop
Office: 2209 Watershed Sciences
Phone: +1 (530) 752-8060
Email: mabishop@ucdavis.edu
ECS 235A, Computer and Information Security
Version of November 13, 2025 at 4:16PM

You can also obtain a PDF version of this.

Valid HTML 4.01 Transitional Built with BBEdit Built on a Macintosh