From the course: ISACA Certified Information Systems Auditor (CISA) Cert Prep
Unlock this course with a free trial
Join today to access over 24,900 courses taught by industry experts.
Indicators of attacks, part 1
From the course: ISACA Certified Information Systems Auditor (CISA) Cert Prep
Indicators of attacks, part 1
- [Kelly] Okay, let's go ahead and talk about some indicators that will help us figure out what type of attack is in progress. So the first thing that we want to talk about, we want to talk about threat vectors. So how is this malicious code? How is it distributed? How is it spread? Well, there are different types of code, there are different types of distribution methods. So let's go ahead and look at these. Okay, so the first type of malware to look at: viruses. And that's the term that most people, I think, associate with malicious code, but in reality, it's just one type. So when we talk about a virus, the thing about a virus is, first of all, it requires a host file. So when we get these email attachments that are, you know, Word documents or Excel documents or whatever that actually contain VB script in them, that's a virus. So if you don't have Word or Excel, which is the host for the virus, then you're not going to get infected with the virus. Now, the second thing about a…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
-
(Locked)
Introduction and privacy principles5m 40s
-
(Locked)
Physical and environmental controls3m 1s
-
(Locked)
Identity and access management5m 21s
-
(Locked)
SOCs and SLAs2m 48s
-
(Locked)
Networking basics11m 34s
-
(Locked)
The OSI and TCP reference models7m 9s
-
(Locked)
OSI Layers 1 and 215m 11s
-
(Locked)
OSI Layers 3–7 and TCP model15m 54s
-
(Locked)
Network devices10m 36s
-
(Locked)
NAT and PAT5m 38s
-
(Locked)
Firewalls10m 38s
-
(Locked)
Additional security devices, part 110m 23s
-
(Locked)
Additional security devices, part 26m 4s
-
(Locked)
Cryptography basics2m 23s
-
(Locked)
Symmetric cryptography9m 1s
-
(Locked)
Asymmetric cryptography18m 13s
-
(Locked)
Hybrid cryptography5m 21s
-
(Locked)
Integrity4m 45s
-
(Locked)
PKI and wrap-up6m 4s
-
(Locked)
Wireless security5m 6s
-
(Locked)
Indicators of attacks, part 114m 9s
-
(Locked)
Indicators of attacks, part 213m 13s
-
(Locked)
Indicators for application attacks7m 15s
-
(Locked)
Cross-site attacks9m 3s
-
(Locked)
Timing attacks6m 6s
-
(Locked)
Memory issues2m 20s
-
(Locked)
Network-based attacks18m 49s
-
(Locked)
Threat actors and vectors8m 17s
-
(Locked)