Please enable JavaScript.
Coggle requires JavaScript to display documents.
Chapter 8: Malicious Software and Attack Vectors - Coggle Diagram
Chapter 8: Malicious Software and Attack Vectors
Characteristics, Architecture, and Operations of Malicious Software
The Main Types of Malware
Viruses
Master Boot Record and System Infectors
File (Program) Infectors
Boot Record Infectors
Macro (Data File) Infectors
Other Virus Classifications
Multipartite Viruses
Cross-Platform Viruses
Retro Viruses
Slow Viruses
Stealth Viruses
Polymorphic Viruses
Rootkits
Ransomware
Spam
Worms
Trojan Horses
Logic Bombs
Active Content Vulnerabilities
Malicious Add-Ons
Injection
Cross-site Scripting (XSS)
Extensible Markup Language (XML) Injection
Lightweight Directory Access Protocol (LDAP) Injection
Command Injection
SQL Injection
Botnets
Denial of Service Attacks
SYN Flood Attacks
Smurf Attacks
Spyware
Adware
Phishing
Spear Phishing
Pharming
Keystroke Loggers
Hoaxes and Myths
Are there detailed explanations or technical terminology in the alert?
Does the alert follow the generic format of a chain letter?
Is there a request to forward the alert to others?
Did a legitimate entity (e.g., computer security expert or vendor) send the alert?
Homepage Hijacking
Exploiting a browser vulnerability to reset the homepage
Covertly installing a browser helper object (BHO) Trojan program
Webpage Defacements
A Brief History of Malicious Code Threats
1990s: Early PC Viruses
Mid-1990s: Smart Applications and the Internet
1980s: Early PC Viruses
2000 to the Present
1970s and Early 1980s: Academic Research and UNIX
Threats to Business Organizations
Types of Threats
Attacks against availability of services and resources
Attacks against productivity and performance
Attacks against data integrity
Attacks that create legal liability
Attacks against confidentiality and privacy
Attacks that damage reputation
Internal Threats from Employees
Anatomy of an Attack
What Motivates Attackers?
The Purpose of an Attack
Data Modification
Data export (exfiltration)
Launch point
Denial of availability
Types of Attacks
Unstructured Attacks
Structured Attacks
Direct Attacks
Indirect Attacks
Phases of an Attack
Reconnaissance and Probing
Access and Privilege Escalation
Covering Traces of the Attack
Attack Prevention Tools and Techniques
Application Defenses
Operating System Defenses
Network Infrastructure Defenses
Safe Recovery Techniques and Practices
Implementing Effective Software Best Practices
Intrusion Detection Tools and Techniques
Network Monitors and Analyzers
Cpmtemt/Context Filtering and Logging Software
Antivirus Scanning Software
Honeypots and Honeynets