What happens after infection, how does the malware spread and what does it do? Things have changed a lot since the early days of computing and quite often the goal for malware today is to run a smoothly as it can to act as a cyber espionage tool, to steal credentials and banking information or install ransomware
- [Tutor] What happens after infection?…How does malware spread and what does it do?…Things have changed a lot since the early days of computing…and quite often, the goal for malware today…is to run as smoothly and quietly as it can…to act as a cyber espionage tool…to steal credentials and banking information…or install ransomware.…In this lesson, we'll discuss the risks of malware,…both from a personal and corporate perspective.…There are many different risks,…that malware poses to an individual or an organization,…the risk is only limited by the features of the malware…and the exposure of sensitive information…or critical infrastructure.…
In an enterprise environment,…dealing with risk is often referred to a risk management,…for individuals, the same concepts apply…and essentially reduce down to assuming…that you or your device or company…are already compromised or will be…and focusing on limiting exposure,…detection and prevention mechanisms.…What happens after a machine has been infected…depends almost entirely on the type of malware.…
This course was created and produced by Mentor Source, Inc. We are honored to host this training in our library.
- What is malware?
- How does malware work?
- Risks of malware
- Malware examples
- Malware protection