Term
|
Definition
A software program that delivers advertising content in a manner that is unexpected and unwanted by the user. |
|
|
Term
|
Definition
Software code that gives access to a program or a service that circumvents normal security protections. |
|
|
Term
|
Definition
A logical computer network of zombies under the control of an attacker. |
|
|
Term
|
Definition
A malicious computer code that, like its biological counterpart, reproduces itself on the same computer. |
|
|
Term
|
Definition
The act of digging through trash receptacles to find information that can be useful in an attack. |
|
|
Term
|
Definition
|
|
Term
|
Definition
An attack that creates a fictitious character and then plays out the role of that person on a victim. |
|
|
Term
|
Definition
Captures and stores each keystroke that a user types on the computers keyboard. |
|
|
Term
|
Definition
Computer code that lies dormant until it is triggered by a specific logical event. |
|
|
Term
|
Definition
Software that enters a computer system without the users knowledge or consent and then performs an unwantedand usually harmfulaction. |
|
|
Term
|
Definition
A phishing attack that automatically redirects the user to a fake site. |
|
|
Term
|
Definition
Sending an e-mail or displaying a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information. |
|
|
Term
|
Definition
A set of software tools used by an attacker to hide the actions or presence of other types of malicious software. |
|
|
Term
|
Definition
Watching an authorized user enter a security code on a keypad. |
|
|
Term
|
Definition
A means of gathering information for an attack by relying on the weaknesses of individuals. |
|
|
Term
|
Definition
|
|
Term
|
Definition
A phishing attack that targets only specific users. |
|
|
Term
|
Definition
A variation of spam, which targets instant messaging users instead of e-mail users. |
|
|
Term
|
Definition
A general term used to describe software that spies on users by gathering information without consent, thus violating their privacy. |
|
|
Term
|
Definition
The act of unauthorized individuals entering a restricted-access building by following an authorized user. |
|
|
Term
|
Definition
An executable program advertised as performing one activity, but actually does something else (or it may perform both the advertised and malicious activities). |
|
|
Term
|
Definition
A phishing attack that uses a telephone call instead of using e-mail. |
|
|
Term
|
Definition
A phishing attack that targets only wealthy individuals. |
|
|
Term
|
Definition
Horizontally separating words so that they can still be read by the human eye. |
|
|
Term
|
Definition
A malicious program designed to take advantage of a vulnerability in an application or an operating system in order to enter a computer and then self-replicate to other computers. |
|
|