Cybersecurity Fundamentals — Hard
Key points
- Rootkits hide at a low system level to evade detection
- They intercept and modify OS calls to security tools
- Rootkits are difficult to remove once embedded in the system
Ready to go further?
Related questions
