Malware

Vulnerabilities



Data
Methods of infiltration
Protection
100

This is a type of malware that replicates itself in order to spread from one computer to another.

Worms

100

This vulnerability describes a situation where the output of an event depends on ordered or timed outputs

Race Condition

100

the process of converting information into a form in which unauthorized parties cannot read it.

Encryption

100

the manipulation of people into performing actions or divulging confidential information

Social engineering

100

You should use at least one type, to protect your device from unauthorized access on a router.

 software firewall or a hardware firewall

200

This type of malware is used to gain unauthorized access by bypassing the normal authentication procedures to access a system.

Backdoor

200

A vulnerability occurs when data is written beyond the limits

Buffer Overflow

200

may prevent the loss of irreplaceable data

Having a backup

200

This technique attempts to gain access to a system by using a few commonly used passwords across a large number of accounts

Password Spraying

200

All of your computing devices, including PCs, laptops, tablets and smartphones, should be?

password protected

300

Designed to track and spy on you

Spyware

300

an emerging threat that hides on a user’s computer, mobile phone, tablet, laptop or server, using that machine’s resources to 'mine’

Cryptojacking

300

A legally binding contract that governs the rules of the relationship between you, the service provider and others who use the service

Terms of Service agreement.

300

Goal to increase traffic to malicious sites that may host malware.

SEO poisoning

300

 this should not be considered adequate security for a wireless network.

don't broadcast the SSID

400

Malware that holds a computer system captive until a payment is made to the attacker

Ransomware

400

Usually introduced by errors in the operating system or application code.

Software vulnerabilities

400

This is an entry-level security certification that meets the U.S. Department of Defense Directive 8570.01

CompTIA Security+

400

On your way into the office, a person whom you have never seen before asks you to hold the door — they forgot their access card

Social engineering

400

This service gives you secure access to the Internet

VPN

500

Regardless of the type of malware a system has been infected with, there are some common symptoms to look out for.

-An increase in CPU usage

-Freezing or crashing

- Decrease in Speed

-Problems with network connection

-Deleted files

500

Two hardware vulnerabilities that affect almost all central processing units (CPUs) released since 1995 within desktops, laptops, servers, smartphones, smart devices and cloud services.

Meltdown and Spector

500

refers to behavior or actions that go against established moral principles

Unethical

500

a multi-phase, long term, stealthy and advanced operation against a specific target

advanced persistent threats

500

these guidelines aim to place responsibility for user verification on service providers and ensure a better experience for users overall.

Password Guidelines