Cisco Cisco Web Security Appliance S360 User Guide
M A L W A R E C A T E G O R Y D E S C R I P T I O N S
C H A P T E R 1 5 : A N T I - M A L W A R E S E R V I C E S
321
Phishing URL
A phishing URL is displayed in the browser address bar. In some cases, it
involves the use of domain names and resembles those of legitimate
domains. Phishing is a form of online identity theft that employs both
social engineering and technical subterfuge to steal personal identity data
and financial account credentials.
involves the use of domain names and resembles those of legitimate
domains. Phishing is a form of online identity theft that employs both
social engineering and technical subterfuge to steal personal identity data
and financial account credentials.
System Monitor
A system monitor encompasses any software that performs one of the
following actions:
• Overtly or covertly records system processes and/or user action.
• Makes those records available for retrieval and review at a later time.
following actions:
• Overtly or covertly records system processes and/or user action.
• Makes those records available for retrieval and review at a later time.
Trojan Downloader
A trojan downloader is a Trojan that, after installation, contacts a remote
host/site and installs packages or affiliates from the remote host. These
installations usually occur without the user’s knowledge. Additionally, a
Trojan Downloader’s payload may differ from installation to installation
since it obtains downloading instructions from the remote host/site.
host/site and installs packages or affiliates from the remote host. These
installations usually occur without the user’s knowledge. Additionally, a
Trojan Downloader’s payload may differ from installation to installation
since it obtains downloading instructions from the remote host/site.
Trojan Horse
A trojan horse is a destructive program that masquerades as a benign
application. Unlike viruses, Trojan horses do not replicate themselves.
application. Unlike viruses, Trojan horses do not replicate themselves.
Trojan Phisher
A trojan phisher may sit on an infected computer waiting for a specific
web page to be visited or may scan the infected machine looking for user
names and passwords for bank sites, auction sites, or online payment
sites.
web page to be visited or may scan the infected machine looking for user
names and passwords for bank sites, auction sites, or online payment
sites.
Virus
A virus is a program or piece of code that is loaded onto your computer
without your knowledge and runs against your wishes.
without your knowledge and runs against your wishes.
Worm
A worm is program or algorithm that replicates itself over a computer
network and usually performs malicious actions.
network and usually performs malicious actions.
Table 15-1 Malware Category Descriptions (Continued)
Malware Type
Description