Read Time:22 Second
Description
Non-replicating malicious code only resides on the target system or software that is attacked; it does not attempt to spread to other systems.
Modes of Introduction:
– Implementation
Related Weaknesses
Consequences
Confidentiality, Integrity, Availability: Execute Unauthorized Code or Commands
Potential Mitigations
Phase: Operation
Description:
Antivirus software can help mitigate known malicious code.
Phase: Installation
Description:
Verify the integrity of the software that is being installed.