1/18
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Malware
Any software that is designed to infiltrate a computer system without the user’s knowledge
Malware needs
A threat vector and an attack vector
Threat Vector
Specific method used by an attacker to infiltrate a victim’s machine
Threat Vector Examples
Unpatched software
Installing code
Phishing campaign
Other vulnerabilities
Attack Vector
A means by which an attacker gains access to a computer to infect the system with malware; Essentially how a vulnerability is actually exploited
Indications of Malware Attacks
Account Lockouts
Concurrent session utilization
Blocked content
Impossible travel
Resource consumption
Resource inaccessibility
Out-of-cycle logging
Missing logs
Published or documented attacks