So infected media was a common vector for attacking systems with malicious logic .
In addition, they also are subject to wider ranges of malicious logic that can traverse the network from one machine to the next and therefore, are vulnerable to:
Our experience ranges from mission and technical support to network security analysis, intrusion detection/prevention, malicious logic
analysis, forensics analysis, training and standardization/evaluation in support of the Air Force's cyber operations mission.
pdf describes how the malicious logic
Over the past decade, SecureInfo has provided both Federal Government agencies and commercial clients with comprehensive information security solutions that have assisted them in avoiding such malicious logic
as NIMDA, Code Red, SQL Slammer and more recently MS Blaster.