TY - JOUR AU - Stevanoski, Goce AU - Kacurova, Monika AU - Bogatinov, Dimitar PY - 2021/10/22 Y2 - 2024/03/28 TI - ROOTKITS – CYBER SECURITY CHALLENGES AND MECHANISMS FOR PROTECTION JF - ETIMA JA - etima VL - 1 IS - 1 SE - Articles DO - UR - https://js.ugd.edu.mk/index.php/etima/article/view/4506 SP - 174-181 AB - АbstractA rootkit is a collection of computer software, typically malicious, that has the intention to infiltrate the operatingsystem (OS) or database, avoiding detection, resist removal and maintain privileged access to the system. Manyrootkits are designed to attack the "root", or kernel, of the OS and therefore work without disclosing their presenceto the computer owner.A rootkit is one of the most dangerous malware programs because it allows any program to gain access to differentlevels of the operating system. Rootkit’s detection is difficult because a rootkit may be able to subvert the softwarethat is intended to find it, and usually the only effective way to remove it is to perform a clean reinstallation of theoperating system. Because rootkits can hijack or subvert security software, making it likely that this type ofmalware could live on your computer for a long time causing significant damage, with that positioning as one ofthe biggest concerns for IT administrators.This paper aims to review the types of rootkits, their attack methods, as well as to describe the detection andprevention methods against this type of malware.Key words: Rootkit, Backdoor, prevention, security ER -