Time
33 hours 23 minutes
Difficulty
Beginner
CEU/CPE
33

Video Transcription

00:00
Hello and welcome in this. I bury 2019 cop T A security plus certification preparation course
00:10
beginning a brand new model, which is martyr one and the top of discussion will be domain one. Threats, attacks and vulnerabilities.
00:18
Here, again is a very first objective, which encompasses domain one, which is titled Giving a Scenario. Analyze indicators of compromise and determine the type of mayor Well,
00:29
before we get going here, let's first all begin by engaging in a pre assessment quiz,
00:35
and it reads as follows. A user complaints that every time they open their Internet browser, it no longer goes to their preferred home. Page and Iverson pop up in the dollar boxes that they have to close. What is the likely cause? Isn't a spyware
00:52
be Children?
00:54
C Virus or D isn't a worm.
00:59
In this case, if you selected a, you're absolutely correct. Because spyware is most often used to monitor a users in an activity and also often also
01:10
adware.
01:11
Let's turn our attention toward again the objective again, which is given a scenario. Analyze in the kid is a compromise and determine the type of mayor where here again of the objectives which encompasses this particular line objective. We could begin by taking a look at viruses
01:27
crypto mayor, where worm chosen route kit
01:32
key logger and adware.
01:34
Additional topics will be larger bomb as well as back door.
01:42
So the very first Adam Arjuna is a C. I try it.
01:46
The CIA try. It is an important security concept because all security controls, mechanism and safeguards the eminent provide one arm or these protection types
01:57
all risk threats and monomers emergent for their potential capacity to compromise one or all of the C I A. Triad principles. This try it is the basis for creating a holistic security plan to protect all of your organization critical and sensitive assets. So when we look at company Jallet,
02:19
if the principal company galley
02:21
revolves around the principle of lease privilege, this privilege or principle states that access to information assets, in other words, should be granted oil on a need to know basis so that the information was just only available to some should not be accessible by everyone.
02:38
Then we have integrity. That principle integrity asserts that the information is not tamper with whenever it travels from source to destination or even store at rest and lastly, availability. The principal availability asserts that the information is assessable, went and where it's needed.
03:00
Then we come to mail where
03:04
now merah could be any form of worm viruses, Children, spyware, adware and rocket, which still protected information. It also delete documents or at software not approved by the user.
03:20
So basically, it's any software intention designed to cause the damage to your computer server client or computer network.
03:28
A mayor was a set of instructions that run on your computer and makes your sister do something that an attacker wants it to do.
03:38
The first thing I want to take a look at in regards to these different types of issues. We have worms, Children and viruses. So when you think about a worm,
03:47
they are self replicating pieces of coal that attempt to penetrate your networks and computer system.
03:54
Once a Pinterest and current, the warren would create a new copy of itself on the penetrated system.
04:01
Our Children, horses, a piece of software that appears to do one thing, and it may in fact, actually that but height, some other type of functionality.
04:14
Lastly, a warm is a piece of malicious coal that replicates by attaching itself to another piece of execute herbal code.
04:24
Continue on discussion. Taking a look at crypto male wear.
04:29
Now this is the type of ransomware that encrypts your user files and demands. A ransom,
04:34
sophisticated criminal male where uses advanced and Christian method so files could not be decrypted without unique key.
04:46
Then we have a back door. And when you think about a backdoor refers to a program that attacked installs after they gained unauthorized access to a system to show that they can continue to have unrestricted access to the system even if their initial access method is discovered or block.
05:05
A root kit is a program on more often a collection of software tools that gives a threat active remote access to and control over computer or other system.
05:18
Ah, larger bomb or malicious cold objects that infects a system and lie dormant until they're triggered by the occurrence of one or more conditions, such as time
05:29
program launched website, log on and so on.
05:33
This brings us to our post assessment quiz,
05:36
and it reads as follows. A Blank is a type of marijuana that provides a secret way to gain access to a computer.
05:44
Is it a a Trojan?
05:46
Be a virus, See a worm or that d A backdoor?
05:54
In this case, if you select the D, you're absolutely correct because of Back Door is a type of Manuel that provides a secret way to gain access to a computer.
06:03
For example, suppose a webpage requires you authenticate
06:08
a backdoor might provide a way to bypass the dedication by manipulating the Auriol other words, a universal resource locator or by performance series of clicks in the right place.
06:20
Let's take a look at the key takeaways.
06:23
During this particular video presentation, the BOLO list of topics were highlighted as follows viruses.
06:30
Criminal Mayor, where
06:31
Worm chosen route kit,
06:34
Logic, bomb as well as your back door.
06:40
In our upcoming video, we continue our discussion off the main one,
06:45
given a scenario. Analyzed indicators of compromise and determine the type of mayor Where and again I look forward to seeing you in the very next video

Up Next

CompTIA Security+

Interested in the cybersecurity industry? The CompTIA Security+ is the gold standard for those looking to enter the cybersecurity industry. Join thousands of professionals who have gained this certification through this course and launched their careers in information security.

Instructed By

Instructor Profile Image
Jim Hollis
Independent Contractor
Instructor