Cisco Cisco Content Security Management Appliance M1070 Mode D'Emploi
Chapter 4 Using Centralized Web Reporting
4-50
Cisco IronPort AsyncOS 7.2.0 for Security Management User Guide
OL-21768-01
Malware Category Descriptions
Table 4-11 describes the different categories of malware the Security
Management appliance and Web Security appliance can block
Management appliance and Web Security appliance can block
Table 4-11
Malware Category Descriptions
Malware Type
Description
Adware
Adware encompasses all software executables and plug-ins that direct users
towards products for sale. Some adware applications have separate processes
that run concurrently and monitor each other, ensuring that the modifications
are permanent. Some variants enable themselves to run each time the machine
is started. These programs may also change security settings making it
impossible for users to make changes to their browser search options, desktop,
and other system settings.
towards products for sale. Some adware applications have separate processes
that run concurrently and monitor each other, ensuring that the modifications
are permanent. Some variants enable themselves to run each time the machine
is started. These programs may also change security settings making it
impossible for users to make changes to their browser search options, desktop,
and other system settings.
Browser Helper Object
A browser helper object is browser plug-in that may perform a variety of
functions related to serving advertisements or hijacking user settings.
functions related to serving advertisements or hijacking user settings.
Commercial System
Monitor
Monitor
A commercial system monitor is a piece of software with system monitor
characteristics that can be obtained with a legitimate license through legal
means.
characteristics that can be obtained with a legitimate license through legal
means.
Dialer
A dialer is a program that utilizes your modem or another type of Internet
access to connect you to a phone line or a site that causes you to accrue long
distance charges to which you did not provide your full, meaningful, and
informed consent.
access to connect you to a phone line or a site that causes you to accrue long
distance charges to which you did not provide your full, meaningful, and
informed consent.
Hijacker
A hijacker modifies system settings or any unwanted changes to a user’s system
that may direct them to a website or run a program without a user’s full,
meaningful, and informed consent.
that may direct them to a website or run a program without a user’s full,
meaningful, and informed consent.
Phishing URL
A phishing URL is displayed in the browser address bar. In some cases, it
involves the use of domain names and resembles those of legitimate domains.
Phishing is a form of online identity theft that employs both social engineering
and technical subterfuge to steal personal identity data and financial account
credentials.
involves the use of domain names and resembles those of legitimate domains.
Phishing is a form of online identity theft that employs both social engineering
and technical subterfuge to steal personal identity data and financial account
credentials.
PUA
Potentially Unwanted Application. A PUA is an application that is not
malicious, but which may be considered to be undesirable.
malicious, but which may be considered to be undesirable.