Term
|
Definition
uses office document motion |
|
|
Term
|
Definition
a virus that uses encryption technologies to hide the core code from detection(ski-mask) |
|
|
Term
|
Definition
A virus that is able to modify all but the core code of a virus |
|
|
Term
|
Definition
a virus that is able to completely refactor internal code to make itself different between each generation( a catipillar ro butterfly) |
|
|
Term
|
Definition
immediate limited release fix for a specific problem |
|
|
Term
|
Definition
When a hotfix because a problem for everyone(or enough people) |
|
|
Term
|
Definition
a collection of patches ,updates hotfixes, and upgrades |
|
|
Term
|
Definition
recommended or approved collection of setting |
|
|
Term
|
Definition
current minimum or acceptable values |
|
|
Term
|
Definition
lovel access to the system at the same priviliges as the user |
|
|
Term
|
Definition
"applet" and "sandbox". full programming language "bytecode" java script developed by netscape designed to be used in a browser to provide dynamic experience |
|
|
Term
|
Definition
integrity attack, attempt to insert unvetted code into a system |
|
|
Term
|
Definition
code injection against an application which puts too much data into a memory location to attempt to overwrite a piece of critical system memory (a code injection attack) |
|
|
Term
|
Definition
code injection against a browser where unintended functions or communications occur (a code injection attack) |
|
|
Term
|
Definition
Physical architecture to create a sheltered network segment for public services |
|
|
Term
|
Definition
logical segmentation of networks for functional purposes |
|
|
Term
|
Definition
process of converting one set of logical addresses into another |
|
|
Term
|
Definition
a 1-to-1 mapping of addresses between internal and external |
|
|
Term
|
Definition
The combination of policies, procedures, technologies, and people used to enhance confidentiallity, integrit, and availibility |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
increased authorization without authentication |
|
|
Term
|
Definition
unintended authorization typically through the implemention of job rotation |
|
|
Term
|
Definition
Transport mechanism/carriers |
|
|
Term
|
Definition
Replicates within a object and need some form of subject interaction |
|
|
Term
|
Definition
self replicates and requires no subject interaction |
|
|
Term
|
Definition
appears to be an asset to entice subject interaction(ooo shiny) |
|
|
Term
|
Definition
Transport mechanism that is dormant until triggered |
|
|
Term
|
Definition
unsoliticed messages usually email |
|
|
Term
|
Definition
software with advertisement |
|
|
Term
|
Definition
software that collects information about this subject |
|
|