Static & Dynamic Code -- Rootkits Static Essay

Static & Dynamic Code -- Rootkits Static & Dynamic Code - Rootkits

Static and Dynamic Code

Static code is stationary or fixed (Rouse, 2005). It does not have the capacity to return information that is not preformatted. Static code is useful for webpages for information only. Programmers must declare the type of variable before compiling code. It is less flexible and less error prone. Static code has the advantages of finding weaknesses in code at the exact location, can be conducted by trained software assurance developers who understand the code, allows for quicker turnaround to fixes, is relatively fast if automated tools are used, automated code can scan the entire code base, automated tools can provide mitigation recommendations, reducing research, and permits weaknesses to be found earlier, reducing fixing costs (Jackson, 2009).

Dynamic code is capable of change. The user can make requests and information will be returned from a database. It is useful for accounting software or pages with databases of information or input. Dynamic programming language can create variables without specifying...

...

The advantages are identifying runtime environment vulnerabilities, automated tools provide flexibility on what to scan for, allows for analysis of applications with no access code, identifies vulnerabilities that may have been false negatives in static code, permits validation of static code findings, and can be conducted against any applications.
The usefulness of either code would depend on the purpose of it being used. If it is on web server software, it may require the variables to be identified for security reasons depending on the level of security needed. If the code is used only inside the company, it can be more flexible in the design, such as the accounting software. Legislation would also make a difference in which code and how it is written in order to follow the requirements of the legislation.

Rootkit Evolution

"Rootkits are programs (or toolsets) designed to infect the core processes of an operating system and prevent their own detection on the infected system" (Beegle, 2007). The first rootkits were written…

Sources Used in Documents:

Bibliography

Beegle, L. (2007). Rootkits and Their Effects on Information Security. Information Systems Security, 16(3), 164-176.

Jackson, W. (2009, Feb 09). Static vs. dynamic code analysis; advantages and disadvantages. Retrieved from GCN: http://gcn.com/articles/2009/02/09/static-vs.-dynamic-code-analysis.aspx

Rouse, M. (2005, Sep). Dynamic and static. Retrieved from Search Networking: http://searchnetworking.techtarget.co/definition/dynamic-and-static

Schultz, E.E. (2008). Rootkits: The Ultimate Malware Threat. Retrieved from Information Systems Security: http://www.infosectoday.com/Articles/Rootkits.htm


Cite this Document:

"Static & Dynamic Code -- Rootkits Static" (2012, July 17) Retrieved April 19, 2024, from
https://www.paperdue.com/essay/static-amp-dynamic-code-rootkits-static-81138

"Static & Dynamic Code -- Rootkits Static" 17 July 2012. Web.19 April. 2024. <
https://www.paperdue.com/essay/static-amp-dynamic-code-rootkits-static-81138>

"Static & Dynamic Code -- Rootkits Static", 17 July 2012, Accessed.19 April. 2024,
https://www.paperdue.com/essay/static-amp-dynamic-code-rootkits-static-81138

Related Documents
Copyright Basics
PAGES 6 WORDS 1888

Copyright Basics Copyright law is designed and enacted to protect artists and other creators. Just as an inventor deserves to patent an invention, an artist deserves the right to own created material including but not limited to film, photography, music, and writing. Although copyright law in many cases ignores the rights of consumers to do as they please with materials they legally purchased, American federal and state statutes do the best

Copyright Law in Hong Kong Internationally, Hong Kong has been obligated to protect copyright pursuant to various international as well as domestic copyright conventions which apply to Hong Kong. Amongst the importance of intellectual property right, copyright as well has been recognized under Article 15(1) of the International Covenant on Economic, Social and cultural rights (ICESCR) specifying that "The States Parties to the present Covenant recognize the right of everyone… to

Copyright Law and the Music
PAGES 25 WORDS 9076

As technology and the capability of removing artifacts from recordings improve this area of the law will be likely to be revisited in the future. This last revision to copyright law raised more questions than it answered. For instance, was it acceptable to colorize black and white movies? Did this alter them from the original work, or was this an acceptable? Was it OK to alter pieces of work to

Copyright Laws vs. Peer-to-Peer File Transfer This paper presents a detailed examination of copyright laws, with a comparison to peer-to-peer file transfer. The author will take the reader on an exploratory journey, in which the details and outcomes of several well-known cases will be scrutinized. The author will also discuss the importance of copyright laws, and the elements of various cases that caused the rulings to go the way they did.

The student enters an illustration contest, and wins first place. The first place prize is a $5,000 check. The student is sued for copyright infringement. In this case, the use of the illustration was done as a commercial venture, yet was also done as a criticism, something quite obviously protected by Section 107. The use of the copyrighted material may have damaged the market in which the tuna company operated,

In order to take refugee from these invalid assertions, she made a fair use claim for all the material that had copyrights. The video was only twenty nine seconds long and the music was near to being audible for only twenty seconds. If these fair use claim wouldn't have been made an innocent women and her family would have been sued for doing something that they didn't do intentionally.