Term
|
Definition
A software program that delivers advertising content in a manner that is unexpected and unwanted by the user. |
|
|
Term
|
Definition
A virus that goes to great lengths in order to avoid detection. |
|
|
Term
|
Definition
An attacker who controls a botnet. |
|
|
Term
|
Definition
A logical computer network of zombies under the control of an attacker. |
|
|
Term
Command and Control (C&C or C2) |
|
Definition
The structure by which a bot herder gives instructions to zombies in a botnet. |
|
|
Term
|
Definition
Malicious computer code that, like its biological counterpart, reproduces itself on the same computer. |
|
|
Term
|
Definition
The act of digging through trash receptacles to find information that can be useful in an attack. |
|
|
Term
|
Definition
A false warning designed to trick users into changing security settings on their computer. |
|
|
Term
|
Definition
A social engineering attack that involves masquerading as a real or fictitious character and then playing out the role of that person on a victim. |
|
|
Term
|
Definition
Software or a hardware device that captures and stores each keystroke that a user types on the computer’s keyboard. |
|
|
Term
|
Definition
Computer code that lies dormant until it is triggered by a specific logical event. |
|
|
Term
|
Definition
A series of instructions that can be grouped together as a single command, often used to automate a complex set of tasks or a repeated series of tasks. |
|
|
Term
|
Definition
A computer virus that is written in a script known as a macro. |
|
|
Term
|
Definition
Software that enters a computer system without the user’s knowledge or consent and then performs an unwanted and usually harmful action. |
|
|
Term
|
Definition
Malware that rewrites its own code and thus appears different each time it is executed. |
|
|
Term
|
Definition
Malware that changes its internal code to one of a set number of predefined mutations whenever it is executed. |
|
|
Term
|
Definition
A phishing attack that automatically redirects the user to a fake site |
|
|
Term
|
Definition
Sending an email or displaying a web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information. |
|
|
Term
|
Definition
Malware code that completely changes from its original form whenever it is executed. |
|
|
Term
|
Definition
A computer virus that infects executable program files. |
|
|
Term
|
Definition
Malware that prevents a user’s device from properly operating until a fee is paid. |
|
|
Term
|
Definition
A set of software tools used by an attacker to hide the actions or presence of other types of malicious software. |
|
|
Term
|
Definition
Watching an authorized user enter a security code on a keypad |
|
|
Term
|
Definition
A means of gathering information for an attack by relying on the weaknesses of individuals. |
|
|
Term
|
Definition
|
|
Term
|
Definition
A phishing attack that targets only specific users. |
|
|
Term
|
Definition
A variation of spam, which targets instant messaging users instead of email users. |
|
|
Term
|
Definition
A general term used to describe software that spies on users by gathering information without consent |
|
|
Term
|
Definition
When an unauthorized individual enters a restricted-access building by following an authorized user |
|
|
Term
|
Definition
An executable program that is advertised as performing one activity but which actually performs a malicious activity. |
|
|
Term
|
Definition
Redirecting a user to a fictitious website based on a misspelling of the URL. Also called URL hijacking. |
|
|
Term
|
Definition
Redirecting a user to a fictitious website based on a misspelling of the URL. Also called typo squatting. |
|
|
Term
|
Definition
A phishing attack uses telephone calls instead of emails. |
|
|
Term
|
Definition
A malicious attack that is directed toward a small group of specific individuals who visit the same website. |
|
|
Term
|
Definition
A phishing attack that targets only wealthy individuals. |
|
|
Term
|
Definition
A malicious program designed to enter a computer via a network to take advantage of a vulnerability in an application or an operating system |
|
|
Term
|
Definition
An infected computer that is under the remote control of an attacker. |
|
|