Page 3 - D:\Lori\Documents\CyberSMR24Aug2020\
P. 3
Click on each of the following boxes to learn more about the more common malware In summary
Our clients are hit daily by thousands of cyber-attacks; while most are dealt
with automatically by various technology solutions and supporting processes
(e.g., anti-virus software), some attacks are ultimately successful and must be
investigated by our clients and the audit team to determine whether the
Worms incident could have a material impact on the financial statements or Internal
Controls Over Financial Reporting. Recognition of the more common malware
Rootkit types will enable you work more effectively with the individuals performing
the investigation.
Backdoors
Spyware
Adware
Logic Bombs
Trojan Horse
Remote Access Trojans (RATs)
Crimeware-as-a-Service (CaaS)
Botnets