Malicious Code:
Hardware, software, or firmware that is intentionally included in a system for an unauthorised purpose.
Hardware, software, or firmware that is intentionally included in a system for an unauthorised purpose.
Malware
Software designed to infiltrate or damage a computer system without the owner’s informed consent.
Software designed to infiltrate or damage a computer system without the owner’s informed consent.
Pharming
A hacker’s attack aiming to redirect a website’s traffic to another, bogus website.
A hacker’s attack aiming to redirect a website’s traffic to another, bogus website.
Phishing
Is the fraudulent process of attempting to acquire sensitive information such as user names, passwords and credit card details by masquerading as a trustworthy entity. Usually used as part of stealing someone’s identity (see identity theft).
Is the fraudulent process of attempting to acquire sensitive information such as user names, passwords and credit card details by masquerading as a trustworthy entity. Usually used as part of stealing someone’s identity (see identity theft).
Spam
Unwanted/unsolicited email, often advertisements, which can also include viruses or other malware.
Unwanted/unsolicited email, often advertisements, which can also include viruses or other malware.
Spyware
Computer software that is installed surreptitiously on a personal computer to intercept or take partial control over the user’s interaction with the computer, without the user’s informed consent.
Computer software that is installed surreptitiously on a personal computer to intercept or take partial control over the user’s interaction with the computer, without the user’s informed consent.
Trojan horse
A program that neither replicates or copies itself but does damage or compromises the security of the computer. Typically, it relies on someone emailing it to a user – it does not email itself. It may arrive in the form of a joke program or software of some kind.
A program that neither replicates or copies itself but does damage or compromises the security of the computer. Typically, it relies on someone emailing it to a user – it does not email itself. It may arrive in the form of a joke program or software of some kind.
Virus
A program or code that replicates – that is, infects another program or document – by inserting itself or attaching itself. Most viruses just replicate; many also inflict damage.
A program or code that replicates – that is, infects another program or document – by inserting itself or attaching itself. Most viruses just replicate; many also inflict damage.
Worm
A program that makes copies of itself – from one PC to another, for example or by copying itself using email or some other mechanism. It may do damage and compromise the security of the computer. It may arrive in the form of a joke program or software of some kind.
A program that makes copies of itself – from one PC to another, for example or by copying itself using email or some other mechanism. It may do damage and compromise the security of the computer. It may arrive in the form of a joke program or software of some kind.
Zombie
A zombie is a computer system/terminal that has been attacked and taken over by a hacker. The hacker then uses this system to support further attacks or as a storage location for a hacker’s information and files.
A zombie is a computer system/terminal that has been attacked and taken over by a hacker. The hacker then uses this system to support further attacks or as a storage location for a hacker’s information and files.
No comments:
Post a Comment