Front | Back |
Privilege Escalation
|
The act of exploiting a vulnerability in the software to gain access to resources that the user would normally be restricted obtaining.
|
Virus
|
A program that secretly attatches itself to a legitimate "carrier," such as a document or program, and then executes when that document is open or the program is launched.
|
Worm
|
A program that secretly attatches itself to legitimate "carrier," such as a document or program
|
Trojan horse (Trojan)
|
A program advertised as performing one activity but actually doing something else, or performing both the advertised and the malicious activities.
|
Spyware
|
A general term used to descibe software that violates a user's personal security.
|
Spam
|
Unsolicited email
|
Adware
|
A software program that delivers advertising content in a manner that is unexpectd and unwanted by the user.
|
Rootkits
|
A set of software tools used by an intruder to break into a computer, obtain special privileges to perform unauthorized functions, and then hide all traces of its existence.
|
Botnets
|
A group of zombie computers that are under the control of an attacker.
|
Logic Bomb
|
A computer program or a part of a program that lies dormant until it is triggered by a specific logical event.
|