Term
|
Definition
Software designed to infiltrate a computer system and possibly damage it without the user’s knowledge or consent. |
|
|
Term
|
Definition
Code that runs on a computer without the user’s knowledge; it infects the computer when the code is accessed and executed. |
|
|
Term
|
Definition
Code that runs on a computer without the user’s knowledge; they self-replicate, whereas a virus does not. |
|
|
Term
|
Definition
Applications that appear to perform desired functions but are actually performing malicious functions behind the scenes. |
|
|
Term
|
Definition
A type of malicious software either downloaded unwittingly from a website or installed along with some other third-party software. |
|
|
Term
|
Definition
Type of spyware that pops up advertisements based on what it has learned about the user. |
|
|
Term
|
Definition
A general term used to describe applications that are behaving improperly but without serious consequences; often describes types of spyware. |
|
|
Term
|
Definition
A type of software designed to gain administrator-level control over a computer system without being detected. |
|
|
Term
|
Definition
Code that has, in some way, been inserted into software; it is meant to initiate some type of malicious function when specific criteria are met. |
|
|
Term
|
Definition
A platonic extra added to an OS or application as a sort of joke; the harmless cousin of the logic bomb. |
|
|
Term
|
Definition
Trojans set off on a certain date. |
|
|
Term
|
Definition
A group of compromised computers used to distribute malware across the Internet; the members are usually zombies. |
|
|
Term
|
Definition
The individual compromised computers in a botnet. |
|
|
Term
|
Definition
The abuse of electronic messaging systems such as e-mail, broadcast media, and instant messaging. |
|
|
Term
|
Definition
Also known as active inception in the CompTIA 2008 Security+ objectives; normally includes a computer placed between the sender and the receiver in an effort to capture and possibly modify information. |
|
|
Term
|
Definition
Also known as an SMTP open relay; it enables anyone on the Internet to send e-mail through an SMTP server. |
|
|
Term
|
Definition
Host-Based Intrusion Detection System
A type of system loaded on an individual computer; it analyzes and monitors what happens inside that computer, for example, if any changes have been made to file integrity. |
|
|
Term
|
Definition
An application or add-on to a web browser that blocks pop-up windows that usually contain advertisements. |
|
|
Term
|
Definition
Ways of blocking and filtering out unwanted advertisement; popup blockers and content filters are considered to be ad filtering methods. |
|
|
Term
|
Definition
Individual computer programs that block external files that use JavaScript or images from loading into the browser. |
|
|
Term
|
Definition
Applications that protect an individual computer from unwanted Internet traffic; they do so by way of a set of rules and policies. |
|
|
Term
|
Definition
The act of exploiting a bug or design flaw in a software or firmware application to gain access to resources that normally would’ve been protected from an application or user. |
|
|
Term
|
Definition
Used in computer programs to bypass normal authentication and other security mechanisms in place. |
|
|
Term
|
Definition
A physical device that deals with the encryption of authentication processes, digital signings, and payment processes. |
|
|
Term
|
Definition
The sending of unsolicited messages to Bluetooth-enabled devices such as mobile phones and PDAs. |
|
|
Term
|
Definition
The unauthorized access of information from a wireless device through a Bluetooth connection. |
|
|