Cisco Cisco Web Security Appliance S680 Guía Del Usuario
12-15
AsyncOS 8.5 for Cisco Web Security Appliances User Guide
Chapter 12 Configuring Security Services
Malware Category Descriptions
Malware Category Descriptions
Malware Type
Description
Adware
Adware encompasses all software executables and plug-ins that direct users
towards products for sale. These programs may also change security settings
making it impossible for users to make changes to their system settings.
towards products for sale. These programs may also change security settings
making it impossible for users to make changes to their system settings.
Browser Helper Object A browser helper object is a browser plug-in that may perform a variety of
functions related to serving advertisements or hijacking user settings.
Commercial System
Monitor
Monitor
A commercial system monitor is a piece of software with system monitor
characteristics that can be obtained with a legitimate license through legal
means.
characteristics that can be obtained with a legitimate license through legal
means.
Dialer
A dialer is a program that utilizes your modem or another type of Internet
access to connect you to a phone line or a site that causes you to accrue long
distance charges to which you did not provide your full consent.
access to connect you to a phone line or a site that causes you to accrue long
distance charges to which you did not provide your full consent.
Generic Spyware
Spyware is a type of malware installed on computers that collects small pieces
of information about users without their knowledge.
of information about users without their knowledge.
Hijacker
A hijacker modifies system settings or any unwanted changes to a user’s
system that may direct them to a website or run a program without a users
consent.
system that may direct them to a website or run a program without a users
consent.
Known Malicious and
High-Risk Files
High-Risk Files
These are files that were identified as threats by the Advanced Malware
Protection file reputation service.
Protection file reputation service.
Other Malware
This category is used to catch all other malware and suspicious behavior that
does not exactly fit in one of the other defined categories.
does not exactly fit in one of the other defined categories.
Phishing URL
A phishing URL is displayed in the browser address bar. In some cases, it
involves the use of domain names and resembles those of legitimate domains.
involves the use of domain names and resembles those of legitimate domains.
PUA
Potentially Unwanted Application. A PUA is an application that is not
malicious, but may be considered to be undesirable.
malicious, but may be considered to be undesirable.
System Monitor
A system monitor encompasses any software that performs one of the
following:
following:
•
Overtly or covertly records system processes and/or user action.
•
Makes those records available for retrieval and review at a later time.
Trojan Downloader
A trojan downloader is a Trojan that, after installation, contacts a remote
host/site and installs packages or affiliates from the remote host.
host/site and installs packages or affiliates from the remote host.
Trojan Horse
A trojan horse is a destructive program that masquerades as a benign
application. Unlike viruses, Trojan horses do not replicate themselves.
application. Unlike viruses, Trojan horses do not replicate themselves.
Trojan Phisher
A trojan phisher may sit on an infected computer waiting for a specific web
page to be visited or may scan the infected machine looking for user names and
passwords.
page to be visited or may scan the infected machine looking for user names and
passwords.
Virus
A virus is a program or piece of code that is loaded onto your computer without
your knowledge.
your knowledge.
Worm
A worm is program or algorithm that replicates itself over a computer network
and performs malicious actions.
and performs malicious actions.