Please enable JavaScript.
Coggle requires JavaScript to display documents.
CompTIA Security+ Chapter 6 (Malware (Viruses, Worms, Logic Bombs,…
CompTIA Security+ Chapter 6
Threat Actors
Open-source Intelligence
Script kiddie
Hacktivist
Advanced Persistent Threats (APTs)
DoS & DDoS
resource exhaustion
Malware
Viruses
Worms
Logic Bombs
Backdoors
Trojans
Drive-by download
rogueware
Remote Access Trojan
Ransomware / crypto-malware
Keylogger
Spyware & Adware
Bots / Botnets
Common Attacks
Social Engineering
Impersonation
Shoulder Surfing
Hoaxes
Tailgating
Dumpster Diving
Watering Hole Attacks
Email & Phone attacks
Spam
Phishing
Phishing from 'friends'
Beacon (image verify email)
Spear Phishing
Whaling
Blocking Malware and Attacks
Protecting Systems from Malware
Antivirus & Anti-Malware
Signature-based detection
Heuristic-based detection
Spam filters on mail gateways
Anti-Malware on mail gateways
Anti-Malware on Host computers
Firewalls, Boundaries - e.g. UTM
Checking file integrity
Microsoft File Checksum Integrity Verifier (fciv.exe)
Data execution prevention (DEP)
Advanced Malware Tools
Cisco Advanced Malware Protection (AMP)
Spam Filter
Educating Users
New Viruses
Phishing Attacks
Zero day
Social Engineering Principles
Authority -> impersonation, whaling, vishing
Intimidation -> impersonation, vishing
Consensus -> trojans, hoaxes
Scarcity -> phishing, trojans
Urgency -> randsomware, phishing, vishing, whaling, hoaxes
Familiarity -> shoulder surfing, tailgating
Trust -> vishing