Read Time:22 Second
Description
Replicating malicious code, including viruses and worms, will attempt to attack other systems once it has successfully compromised the target system or software.
Modes of Introduction:
– Implementation
Related Weaknesses
Consequences
Confidentiality, Integrity, Availability: Execute Unauthorized Code or Commands
Potential Mitigations
Phase: Operation
Description:
Antivirus software scans for viruses or worms.
Phase: Installation
Description:
Always verify the integrity of the software that is being installed.