Decision Mechanics

Insight. Applied.

  • Services
    • Decision analysis
    • Big data analysis
    • Software development
  • Articles
  • Blog
  • Privacy
  • Hire us

CIA’s malware development guidelines

March 8, 2017 By editor

computer commands

I thought the CIA’s “best practices” for coding malware were interesting.

It’s basically a list of things you have to consider when dealing with a sophisticated attacker. Basic audit features aren’t enough if your data and systems present an attractive target.

Print Friendly, PDF & Email

Share this:

  • Email a link to a friend (Opens in new window) Email
  • Share on X (Opens in new window) X
  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Facebook (Opens in new window) Facebook

Filed Under: Software Tagged With: encryption, hacking, security, software

Search

Subscribe to blog via e-mail

Subscribe via RSS

Recent posts

  • Data Wrangler
  • The Trolley Problem
  • Counting votes using Excel
  • Accuracy vs precision
  • It’s not because we have insufficient data…

Copyright © 2026 · Decision Mechanics Limited · info@decisionmechanics.com