Assessment Flashcards
Phishing
Malware
Malware is typically delivered to a system through email attachments, malicious links, or drive-by downloads.
Once a system is infected with malware, the attacker may use it to gain access to sensitive information, spread the malware to other systems, or launch other types of attacks.
As a SOC analyst, you will need to be able to identify and respond to malware attacks in order to protect your organization and its customers.
This can include monitoring network traffic for signs of malware, analyzing system logs and event data to identify suspicious activity, and performing malware analysis to determine the type of malware and how it is being used.
In the event of a malware attack, it is important to act quickly to contain the spread of the malware and prevent further damage.
This may involve isolating infected systems, removing the malware, and reporting the attack to law enforcement.
In addition, it is important to have robust security protocols in place, such as anti-virus software, firewalls, and intrusion detection systems, to help prevent malware attacks and other cyber threats.
Denial-of-service (DoS) and DDoS
SQL injection
Cross-site scripting (XSS)
Insider
Advanced persistent threats (APTs)