From the course: ISACA Certified Information Systems Auditor (CISA) Cert Prep

Unlock this course with a free trial

Join today to access over 24,900 courses taught by industry experts.

Indicators of attacks, part 1

Indicators of attacks, part 1

- [Kelly] Okay, let's go ahead and talk about some indicators that will help us figure out what type of attack is in progress. So the first thing that we want to talk about, we want to talk about threat vectors. So how is this malicious code? How is it distributed? How is it spread? Well, there are different types of code, there are different types of distribution methods. So let's go ahead and look at these. Okay, so the first type of malware to look at: viruses. And that's the term that most people, I think, associate with malicious code, but in reality, it's just one type. So when we talk about a virus, the thing about a virus is, first of all, it requires a host file. So when we get these email attachments that are, you know, Word documents or Excel documents or whatever that actually contain VB script in them, that's a virus. So if you don't have Word or Excel, which is the host for the virus, then you're not going to get infected with the virus. Now, the second thing about a…

Contents