Cisco Cisco Web Security Appliance S690 User Guide

Page of 430
 
12-15
Cisco AsyncOS 8.0.6 for Web User Guide
 
Chapter 12      Configuring Security Services
  Malware Category Descriptions
Malware Category Descriptions
Malware Type
Description
Adware
Adware encompasses all software executables and plug-ins that direct users 
towards products for sale. These programs may also change security settings 
making it impossible for users to make changes to their system settings. 
Browser Helper Object A browser helper object is a browser plug-in that may perform a variety of 
functions related to serving advertisements or hijacking user settings.
Commercial System 
Monitor
A commercial system monitor is a piece of software with system monitor 
characteristics that can be obtained with a legitimate license through legal 
means.
Dialer
A dialer is a program that utilizes your modem or another type of Internet 
access to connect you to a phone line or a site that causes you to accrue long 
distance charges to which you did not provide your full consent.
Generic Spyware
Spyware is a type of malware installed on computers that collects small pieces 
of information about users without their knowledge.
Hijacker
A hijacker modifies system settings or any unwanted changes to a user’s 
system that may direct them to a website or run a program without a users 
consent.
Other Malware
This category is used to catch all other malware and suspicious behavior that 
does not exactly fit in one of the other defined categories.
Phishing URL
A phishing URL is displayed in the browser address bar. In some cases, it 
involves the use of domain names and resembles those of legitimate domains. 
PUA
Potentially Unwanted Application. A PUA is an application that is not 
malicious, but may be considered to be undesirable.
System Monitor
A system monitor encompasses any software that performs one of the 
following: 
Overtly or covertly records system processes and/or user action.
Makes those records available for retrieval and review at a later time.
Trojan Downloader
A trojan downloader is a Trojan that, after installation, contacts a remote 
host/site and installs packages or affiliates from the remote host.
Trojan Horse
A trojan horse is a destructive program that masquerades as a benign 
application. Unlike viruses, Trojan horses do not replicate themselves.
Trojan Phisher
A trojan phisher may sit on an infected computer waiting for a specific web 
page to be visited or may scan the infected machine looking for user names and 
passwords.
Virus
A virus is a program or piece of code that is loaded onto your computer without 
your knowledge.
Worm
A worm is program or algorithm that replicates itself over a computer network 
and performs malicious actions.