Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Rootkit

Handbook of Research on Wireless Security
Rootkit is a kind of software to hide other programs. Mainly used by Trojans, they enable hidden applications to access local resources without user knowledge.
Published in Chapter:
Key Distribution and Management for Mobile Applications
György Kálmán (University Graduate Center – UniK, Norway) and Josef Noll (University Graduate Center – UniK, Norway)
Copyright: © 2008 |Pages: 13
DOI: 10.4018/978-1-59904-899-4.ch011
Abstract
This chapter deals with challenges raised by securing transport, service access, user privacy, and accounting in wireless environments. Key generation, delivery, and revocation possibilities are discussed and recent solutions are shown. Special focus is on efficiency and adaptation to the mobile environment. Device domains in personal area networks and home networks are introduced to provide personal digital rights management (DRM) solutions. The value of smart cards and other security tokens are shown and a secure and convenient transmission method is recommended based on the mobile phone and near-field communication technology.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
The Ethics of Deception in Cyberspace
Software that secretly permits a cyber-attacker to control a computer remotely.
Full Text Chapter Download: US $37.50 Add to Cart
IT Continuity in the Face of Mishaps
Software that introduces and hides running programs, either legitimate or illegitimate from the operating system and may take control of a computer. A rootkit is notoriously difficult to detect and remove (Poulsen, 2003).
Full Text Chapter Download: US $37.50 Add to Cart
Hackers, Hacking, and Eavesdropping
The primary purposes of a rootkit are to allow an attacker to maintain undetected access to a compromised system. The main technique used is to replace standard versions of system software with hacked version, and install backdoor process by replacing one or more of the files, such as ls, ps, netstat, and who.
Full Text Chapter Download: US $37.50 Add to Cart
Digital Ecosystem Security Issues for Organizations and Governments: Digital Ethics and Privacy
A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or its software that is not otherwise allowed (for example, to an unauthorized user) and often masks its existence or the existence of other software.
Full Text Chapter Download: US $37.50 Add to Cart
An Overview of Threats to Information Security
Software that enables an attacker to have administrator-level access (meaning complete control) to a computer or computer network.
Full Text Chapter Download: US $37.50 Add to Cart
Modern Blue Pills and Red Pills
Rootkit is malicious software that grants unauthorized user-persistent access to the victim computer resources. The rootkit is also designed to mask its existence such that the administrator will not be able to detect it.
Full Text Chapter Download: US $37.50 Add to Cart
Taxonomy of Cyber Threats to Application Security and Applicable Defenses
Malicious code that is designed to avoid detection by hiding itself by some means.
Full Text Chapter Download: US $37.50 Add to Cart
Malicious Software
Low-level software designed to avoid detection on a compromised host.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR