sabotage: A malicious attack on work, tools, or business.
malware: Malicious software, especially destructive programs such as the viruses, worms, and Trojan horses devised and spread by computer saboteurs.
virus: Software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. A form of software sabotage.
macro virus: Viruses that attach to and are transmitted through macros embedded in documents; usually spread via email.
email virus: Viruses spread via e-mail.
worms: Programs that use computer hosts to reproduce themselves. Worm programs travel independently over computer networks, seeking out uninfected workstations to occupy. A form of software sabotage.
trojan horse: A program that performs a useful task while at the same time carrying out some secret destructive act. A form of software sabotage.
logic bomb: A program designed to attack in response to a particular logical event or sequence of events. A type of software sabotage.
time bomb: A logic bomb that is triggered by a time-related event.
spyware: Technology that collects information from computer users without their knowledge or consent.
tracking software: A spyware application program, also called a spybot, that gathers user information and communicates it to an outsider via the Internet.
spybot: A spyware application program, also called tracking software, that gathers user information and communicates it to an outsider via the Internet.
drive-by download: A spyware download onto your computer that occurs simply by visiting certain Web sites.
hackers: Someone who uses computer skills to gain unauthorized access to computer systems. Also sometimes used to refer to a particularly talented, dedicated programmer.
cracking: Unauthorized access and/or vandalism of computer systems; short for criminal hacking.
phreaking:
DoS attacks: (Denial of Service attacks)--> A type of computer vandalism that bombards servers and Web sites with so much bogus traffic that they’re effectively shut down, denying service to legitimate customers and clients.
DDos: (Distributed Denial of Service)--> A denial of service attack in which the flood of messages comes from many compromised systems distributed across the Net.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment