Page 3 - D:\Lori\Documents\CyberSMR24Aug2020\
P. 3

Click on each of the following boxes to learn more about the more common malware   In summary
                                                     Our clients are hit daily by thousands of cyber-attacks; while most are dealt
                                                     with automatically by various technology solutions and supporting processes
                                                     (e.g., anti-virus software), some attacks are ultimately successful and must be
                                                     investigated by our clients and the audit team to determine whether the
  Worms                                              incident could have a material impact on the financial statements or Internal
                                                     Controls Over Financial Reporting. Recognition of the more common malware
  Rootkit                                            types will enable you work more effectively with the individuals performing

                                                     the investigation.
  Backdoors


  Spyware

  Adware


  Logic Bombs

  Trojan Horse


  Remote Access Trojans (RATs)


  Crimeware-as-a-Service (CaaS)

  Botnets
   1   2   3   4   5   6