Capture.PNG
Document Details
Uploaded by jlopez59#
Tags
Full Transcript
## Chapter Summary (2 of 3) - Malware includes: - Viruses - Spyware - Keyloggers - Worms - Trojans - Rootkits - Ransomware - Zero-day attacks - Man-in-the-middle attacks - DoS attacks - DDoS attacks - Zombies - Botnets - Dictionary attacks - M...
## Chapter Summary (2 of 3) - Malware includes: - Viruses - Spyware - Keyloggers - Worms - Trojans - Rootkits - Ransomware - Zero-day attacks - Man-in-the-middle attacks - DoS attacks - DDoS attacks - Zombies - Botnets - Dictionary attacks - Malware symptoms include: - Pop-up ads - Slow performance - Error messages and logs - File errors - Email problems - Invalid digital certificates - To clean up an infected system: 1. Know how to identify common malware symptoms 2. Quarantine the infected system 3. Disable System Restore 4. Remediate the system 5. Protect the system with scheduled scans and updates 6. Enable System Protection and create a restore point. 7. Educate the end user - Types of security documentation include: - Ticketing software to document customer service - Knowledge base - Acceptable use policies - Password policies - Inventory management - Network topology diagrams - Documentation needed for change management