Term
|
Definition
A software program that delivers advertising content in a manner that is unexpected and unwanted by the user. |
|
|
Term
Basic Input Output System (BIOS) |
|
Definition
A coded program embedded on a processor chip that recognizes and controls different devices on the computer system. |
|
|
Term
|
Definition
A virus that infects the Master Boor Record ~MBR) of a hard disk drive. |
|
|
Term
|
Definition
An attacker who controls several botnets. |
|
|
Term
|
Definition
A group of zombie computers that are under the control of an attacker. |
|
|
Term
|
Definition
The coverage areas for cellular communications. |
|
|
Term
Cellular telephones (cell phones) |
|
Definition
Portable communications devices that function in a manner unlike wired telephones. |
|
|
Term
|
Definition
Internet Relay Chat (IRC) discussion forums. |
|
|
Term
|
Definition
A virus that adds a program to the operating system that is a copycat companion to a legitimate program. |
|
|
Term
EEPROM (Electrically Erasable Programmable Read Only Memory) |
|
Definition
Non-volatile computer memory that can be electrically erased and rewritten repeatedly. |
|
|
Term
|
Definition
A virus that infects program executable files with an .EXE or .COM file extension. |
|
|
Term
|
Definition
A type of non-volatile computer memory that can be electrically erased and rewritten repeatedly. |
|
|
Term
|
Definition
The process for rewriting the contents of the BIOS. |
|
|
Term
|
Definition
Spam that uses speckling and different colors so that no two spam e.-ma its appear to be the same. |
|
|
Term
|
Definition
Spam that is divided into multiple images but still create a legible message. |
|
|
Term
|
Definition
A foreign virtual operating system. |
|
|
Term
|
Definition
The native operating system to the hardware. |
|
|
Term
|
Definition
Software that runs on a physical computer and manages one or more virtual machine operating systems. |
|
|
Term
|
Definition
Spam that uses graphical images of text in order to circumvent text-based spam filters. |
|
|
Term
|
Definition
A method of online communication like e-mail except that it is conducted instantaneously in real time, |
|
|
Term
Internet Relay Chat (IRC) |
|
Definition
An open communication protocol that is used for real-time chatting~ with other IRC users over the Internet. Also used to remotely control zombie computers in a botnet. |
|
|
Term
|
Definition
A small hardware device or a program that monitors each keystroke a user types on the computers keyboard. |
|
|
Term
|
Definition
Technology that enables a virtual machine to be moved to a different physical computer with no impact to the users. |
|
|
Term
|
Definition
Balancing processing load among several servers; moving a virtual machine to another physical server with more RAM or CPU resources. |
|
|
Term
|
Definition
A computer program or a part of a program that lies dormant until it is triggered by a specific logical event. |
|
|
Term
|
Definition
A series of commands and instructions that can be grouped together as a single command. |
|
|
Term
|
Definition
A virus written in a scripting language. |
|
|
Term
|
Definition
Malicious software that enters a computer system without the owners knowledge or consent. |
|
|
Term
|
Definition
An area on a hard disk drive that contains the program necessary for the computer to start up and a description of how the hard drive is organized. |
|
|
Term
|
Definition
A virus that alters how it appears in order to avoid detection. |
|
|
Term
mobile telecommunications switching office (MTSO) |
|
Definition
The link between the cellular network and the wired telephone world that controls all of the transmitters and base stations in the cellular network. |
|
|
Term
Network Attached Storage (NAS) |
|
Definition
A single dedicated hard disk-based file storage device that provides centralized and consolidated disk storage that is available to LAN users through a standard network connection. |
|
|
Term
Operating system virtualization |
|
Definition
A virtualized environment in which an entire operating system environment is simulated. |
|
|
Term
|
Definition
a table on the hard drive that describes how the hard drive is organized. |
|
|
Term
|
Definition
A virus that changes how it appears and also encrypts its contents differently each time. |
|
|
Term
|
Definition
The act of exploiting a vulnerability in the software to gain access to resources that the user would normally be restricted from obtaining. |
|
|
Term
PROM (Programmable Read Only Memory) |
|
Definition
A chip with which the contents can be rewritten to provide new functionality. |
|
|
Term
|
Definition
A chip that cannot be reprogrammed. |
|
|
Term
|
Definition
Devices, such as USB flash drives, that can store data from a computer and then be disconnected. |
|
|
Term
|
Definition
A virus that is loaded into random access memory and can interrupt almost any function executed by the computer operating system and alter it. |
|
|
Term
|
Definition
A set of software tools used by an intruder to break into a computer, obtain special privileges to perform unauthorized functions, and then hide all traces of its existence. |
|
|
Term
|
Definition
Creating and managing multiple server operating systems. Spam Unsolicited e-mail. |
|
|
Term
|
Definition
A general term used to describe software that violates a users personal security. |
|
|
Term
Storage Area Network (SAN) |
|
Definition
A specialized high-speed network for attaching servers to storage devices. |
|
|
Term
|
Definition
A program advertised as performing one activity but actually does something else, or it may perform both the advertised and malicious activities. |
|
|
Term
|
Definition
A self-contained software environment. |
|
|
Term
|
Definition
A means of managing and presenting computer resources by function without regard to their physical layout or location. |
|
|
Term
|
Definition
A program that secretly attaches itself to a legitimate carrier. such as a document or program. and then executes when that document is open or the program is launched. |
|
|
Term
|
Definition
Spam that horizontally separates words so that they can still be read by the human eye. |
|
|
Term
|
Definition
A program that is designed to take advantage of vulnerability in an application or an operating system in order to enter a system. |
|
|
Term
|
Definition
Computer under the control of an attacker. |
|
|