Malware infographic Halloween Edition sm - WatchGuard · Halloween Edition Malware is an...

1
Halloween Edition Malware is an abbreviated term meaning “malicious software.” This is software that is specifically designed to gain access or damage a computer without the knowledge of the owner. 5 4 (also known as a zombie army) Botnet 5 4 (Remote Access Trojan) RAT 5 4 (also known as “Man in the browser”) Browser-based Malware 5 4 Ransomware (malware that restricts access to your computer while demanding you pay a ransom to get access back) $ 5 4 POS Malware (a malicious software expressly written to steal customer payment data) $ $ $ 1 2 3 4 5 TOP 5 LEAST WANTED MALWARE 1 Awareness Offline Backups Provide Peace of Mind • Simplify - Create global share for important stuff - Create a data partition - Use OS “Documents” directory • Keep offline backups • Encrypt backups • Automate Backups Basic Backup Tips: Ransomware Requires Defense in Depth Advanced threats, by definition, leverage multiple vectors of attack. No single defense will protect you completely from computer attacks. APT Protection Firewall Reputation Ser vices AntiSpam AntiVirus Intrusion Prevention System Firewall The more layers of security you have, the greater chance an additional protection might catch an advanced threat that other layers might miss. Remote Access Trojan or RAT A malware program that includes a back door for administrative control over the target computer. RATs are usually downloaded invisibly with a user-requested program – such as a game – or sent as an email attachment. 1 Botnet (also known as a zombie army) is a number of Internet computers that, although their owners are unaware of it, have been set up to forward transmissions (including spam or viruses) to other computers on the Internet. Browser-based malware (also known as “Man in the browser”) is a security attack where the perpetrator installs a trojan horse on a victim's computer that's capable of modifying that user's web transactions as they occur in real time. 3 4 Ransomware A form of computer malware that restricts access to your computer or its information, while demanding you pay a ransom to get access back. $ Backup Defense in Depth 3 FOR A FREE TRIAL, VISIT WATCHGUARD.COM/EVAL POS malware A malicious software expressly written to steal customer payment data – especially credit card data – from retail checkout. $ $ $ HOW TO STOP MALWARE IN ITS TRACKS WHAT IS MALWARE?

Transcript of Malware infographic Halloween Edition sm - WatchGuard · Halloween Edition Malware is an...

Page 1: Malware infographic Halloween Edition sm - WatchGuard · Halloween Edition Malware is an abbreviated term meaning “malicious software.” This is software that is speci˜cally designed

Halloween Edition

Malware is an abbreviated term meaning “malicious software.” This is software that is speci�cally designed to gain access or damage a computer without the knowledge of the owner.

5

4

(also known as a zombie army)

Botnet

5

4

(Remote Access Trojan)

RAT

5

4

(also known as “Man in the browser”)

Browser-based Malware 5

4

Ransomware

(malware that restricts access

to your computer while

demanding you pay a ransom

to get access back)

$

5

4

POS Malware

(a malicious software expressly written to steal customer payment data)

$ $

$

12 3

4 5

TOP 5 LEAST WANTED MALWARE

1 Awareness

Offline Backups Provide Peace of Mind

• Simplify - Create global share for important stu� - Create a data partition - Use OS “Documents” directory• Keep o�ine backups• Encrypt backups• Automate Backups

Basic Backup Tips:

Ransomware Requires Defense in Depth

Advanced threats, by de�nition, leverage multiple vectors of attack. No single defense will protect you completely from computer attacks.

APT Protection

Firewall

Reputation Services

AntiSpam

AntiVirus

Intrusion Prevention System

Firewall

The more layers of security you have, the greater chance an additional protection might catch an advanced threat that other layers might miss.

Remote Access Trojan or RATA malware program that includes a back door for administrative control over the target computer. RATs are usually downloaded invisibly with a user-requested program – such as a game – or sent as an email attachment.

1

Botnet(also known as a zombie army) is a number of Internet computers that, although their owners are unaware of it, have been set up to forward transmissions (including spam or viruses) to other computers on the Internet.

Browser-based malware(also known as “Man in the browser”) is a security attack where the perpetrator installs a trojan horse on a victim's computer that's capable of modifying that user's web transactions as they occur in real time.

3

4RansomwareA form of computer malware that restricts access to your computer or its information, while demanding you pay a ransom to get access back.

$

Backup

Defense in Depth3

FOR A FREE TRIAL, VISIT WATCHGUARD.COM/EVAL

POS malwareA malicious software expressly written to steal customer payment data – especially credit card data – from retail checkout.

$ $

$

HOW TO STOP MALWARE IN ITS TRACKS

WHAT IS MALWARE?