Malicious Code

2.0 Threats, Vulnerabilities, and Mitigations 22%

2.4 Given a scenario, analyze indicators of malicious activity

Survey

Think about what could be included. Read the introduction / summary. Glance over the different titles and sub-titles, turn them into questions. View visual aids and read their captions.

Questions

While doing all of these steps, add questions. Ensure to answer on a separate page from the original questions.

How is malware defined in Comptia Security+ What are the different types of types of malware? What are the attributes that help distinguish between types of malware? What are the different IoCs for each malware type? What is IRC? What are the different mitigation methods for malware? How do the different mitigations achieve their goal? What is the difference between spyware and bloatware? And how are they similar? What are the two components of viruses? What are the different virus variates? Why are fileless viruses dangeours? How could malware run on you systems?

Read

Focus on answering the questions, come up with more as necessary.

Write

Annotate thoughts and ideas Answer questions

Recite

Go back over appropriate sections

Reflect

How does this currently fit with what you know? How would you teach this to someone else?