CHAPTER 1
Malware and Indicators of Compromise
In this chapter, you will
• Examine the types of malware
• Understand the different types of malicious software that exist, including viruses, worms, Trojan horses, logic bombs, and rootkits
• Learn how artifacts called indicators of compromise can tell you if a system has been attacked
There are various forms of malicious software, software that is designed to compromise an end system, leaving it vulnerable to attack. In this chapter we examine the various types of malware (malicious software) and indicators of compromise that demonstrate a system has been attacked.
Certification Objective This chapter covers CompTIA Security+ exam objective 1.1, Given a scenario, analyze indicators of compromise ...
Get CompTIA Security+ All-in-One Exam Guide, Fifth Edition (Exam SY0-501), 5th Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.