Term
|
Definition
testing code that you added to a patch |
|
|
Term
|
Definition
commonly known as computer viruses, a deliberate design to cause problems. |
|
|
Term
usually malicious software is inadvertently introduced by ___ |
|
Definition
an unwitting authorized user |
|
|
Term
2 types of malicious software |
|
Definition
1 - prrogram fragments that need a "host" program on the system to be "infected" 2 - independent programs that need only a platform on which to execute |
|
|
Term
|
Definition
is a computer program function that allows a knowledgeable user to bypass the normal security measures |
|
|
Term
|
Definition
a condition(or a set of related conditions) build into a program to cause some adverse action when the condition(s) are met |
|
|
Term
|
Definition
is a logic bomb, activated by the system clock passing a certain date-time |
|
|
Term
|
Definition
a program fragment(or an independent program) that appears to be interesting or useful to a user, but includes malicious functionality |
|
|
Term
well-known software bacterium |
|
Definition
|
|
Term
|
Definition
malicious program that is designed to spread form system to system |
|
|
Term
|
Definition
a program fragment that is inserted into the files of a host operating system, application program or other software |
|
|
Term
|
Definition
a variation that exploits the macro functionality in certain common applications |
|
|
Term
|
Definition
manages a allocation of storage units to files |
|
|