Cisco Cisco Web Security Appliance S390 Guida Utente
19-3
Cisco IronPort AsyncOS 7.0 for Web User Guide
OL-23079-01
Chapter 19 Anti-Malware Services
Anti-Malware Overview
Phishing URL
A phishing URL is displayed in the browser address bar.
In some cases, it involves the use of domain names and
resembles those of legitimate domains. Phishing is a form
of online identity theft that employs both social
engineering and technical subterfuge to steal personal
identity data and financial account credentials.
In some cases, it involves the use of domain names and
resembles those of legitimate domains. Phishing is a form
of online identity theft that employs both social
engineering and technical subterfuge to steal personal
identity data and financial account credentials.
PUA
Potentially Unwanted Application. A PUA is an
application that is not malicious, but which may be
considered to be undesirable.
application that is not malicious, but which may be
considered to be undesirable.
System Monitor
A system monitor encompasses any software that
performs one of the following actions:
performs one of the following actions:
•
Overtly or covertly records system processes and/or
user action.
user action.
•
Makes those records available for retrieval and
review at a later time.
review at a later time.
Trojan Downloader
A trojan downloader is a Trojan that, after installation,
contacts a remote host/site and installs packages or
affiliates from the remote host. These installations
usually occur without the user’s knowledge. Additionally,
a Trojan Downloader’s payload may differ from
installation to installation since it obtains downloading
instructions from the remote host/site.
contacts a remote host/site and installs packages or
affiliates from the remote host. These installations
usually occur without the user’s knowledge. Additionally,
a Trojan Downloader’s payload may differ from
installation to installation since it obtains downloading
instructions from the remote host/site.
Trojan Horse
A trojan horse is a destructive program that masquerades
as a benign application. Unlike viruses, Trojan horses do
not replicate themselves.
as a benign application. Unlike viruses, Trojan horses do
not replicate themselves.
Trojan Phisher
A trojan phisher may sit on an infected computer waiting
for a specific web page to be visited or may scan the
infected machine looking for user names and passwords
for bank sites, auction sites, or online payment sites.
for a specific web page to be visited or may scan the
infected machine looking for user names and passwords
for bank sites, auction sites, or online payment sites.
Table 19-1
Malware Category Descriptions (continued)
Malware Type
Description