Cisco Cisco Web Security Appliance S360 Guía Del Usuario
19-19
Cisco IronPort AsyncOS 7.7.5 for Web User Guide
Chapter 19 Configuring Security Services
Malware Category Descriptions
Trojan Horse
A trojan horse is a destructive program that masquerades as a benign
application. Unlike viruses, Trojan horses do not replicate themselves.
application. Unlike viruses, Trojan horses do not replicate themselves.
Trojan Phisher
A trojan phisher may sit on an infected computer waiting for a specific web page
to be visited or may scan the infected machine looking for user names and
passwords for bank sites, auction sites, or online payment sites.
to be visited or may scan the infected machine looking for user names and
passwords for bank sites, auction sites, or online payment sites.
Virus
A virus is a program or piece of code that is loaded onto your computer without
your knowledge and runs against your wishes.
your knowledge and runs against your wishes.
Worm
A worm is program or algorithm that replicates itself over a computer network
and usually performs malicious actions.
and usually performs malicious actions.
Table 19-9
Malware Category Descriptions (continued)
Malware Type
Description