Malware/Related Articles: Difference between revisions
< Malware
Jump to navigation
Jump to search
imported>Howard C. Berkowitz (New page: {{subpages}} ==Parent topics== {{r|Information security}} {{r|Denial of service}} ==Subtopics== {{r|Adware}} {{r|Virus (computers)}} {{r|Spyware}} {{r|Worm (computers)}} {{r|Rootkit (...) |
No edit summary |
||
Line 24: | Line 24: | ||
{{r|Phishing}} | {{r|Phishing}} | ||
{{r|Social engineering}} | {{r|Social engineering}} | ||
==Articles related by keyphrases (Bot populated)== | |||
{{r|Mine (land warfare)}} | |||
{{r|Video game}} | |||
{{r|Pain}} | |||
{{r|Recession of 2009}} | |||
{{r|Health Insurance Portability and Accountability Act}} |
Latest revision as of 11:00, 15 September 2024
- See also changes related to Malware, or pages that link to Malware or to this page or whose text contains "Malware".
Parent topics
- Information security [r]: The set of policies and protective measures used to ensure appropriate confidentiality, integrity and availability to information; usually assumed to be information in a computer or telecommunications network but the principles extend to people and the physical world [e]
- Denial of service [r]: An attack on a computer or communications system that tries to prevent the system delivering its normal services to its users, [e]
Subtopics
- Adware [r]: Add brief definition or description
- Virus (computers) [r]: A piece of malware that can exist only as part of another, authorized piece of software, which is an unauthorized consumer of resources on a computer; it may or may not propagate to other computers inside software sent to them [e]
- Spyware [r]: Malicious software that offers you services or may infiltrate quietly, and then clandestinely steals your personal details. [e]
- Worm (computers) [r]: A form of malware that can spread, among networked computers, without human interaction. [e]
- Rootkit (computers) [r]: The set of nasty things that an attacker installs on a computer system after he or she acquires administrator privileges, or in Unix terms "becomes root". [e]
- Trojan (computers [r]: An apparently useful program with some nasty code concealed within it; if a user installs it, system security is breached. [e]
- Nagware [r]: Add brief definition or description
- Scareware [r]: Add brief definition or description
- Botnet [r]: A set of compromised computers which can collectively provide services to a "bot herder". [e]
- Host intrusion detection system [r]: Add brief definition or description
- Malware polymorphism [r]: Methods by which malware, in the process of reproduction and propagation, alters new copies in a way that makes them difficult to be recognized by defensive software [e]
- Miscreant [r]: One who enters a computer or computer network without authorization by the owner or administrator, regardless of the motivation for entry [e]
- Network intrusion detection system [r]: Add brief definition or description
- Phishing [r]: Use of online social engineering methods in order to persuade a victim to part with personal details such as online banking logins, in order to perpetrate fraud. [e]
- Social engineering [r]: Subverting a security system by deceiving its users. [e]
- Mine (land warfare) [r]: Add brief definition or description
- Video game [r]: A game played using an electronic controller to manipulate images on a display screen. [e]
- Pain [r]: Unpleasant feeling or hurtful sensation that is conveyed to the brain by stimulation of sensory neurons. [e]
- Recession of 2009 [r]: the international recession that was triggered by the Crash of 2008. [e]
- Health Insurance Portability and Accountability Act [r]: a 1996 U.S. statute protecting the confidentiality of medical records [e]