1 |
malicious codeSoftware (e.g., Trojan horse) that appears to perform a useful or desirable function, but actually gains unauthorized access to system resources or tricks a user into executing other malicious logic.
|
2 |
malicious codeSoftware or firmware capable of performing an unauthorized function on an information system (IS). [INFOSEC-99]
|
3 |
malicious codeMalicious code is the term used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system. Malicious code des [..]
|
4 |
malicious codeA virus worm Trojan horse or other code-based malicious entity that infects a host.
|
5 |
malicious codeA computer program that is meant to hurt you and your computer. Viruses, worms, and Trojan horses are examples of malicious code.
|
6 |
malicious codeAny type of software capable of performing an unauthorized process on an information system
|
7 |
malicious code Malicious code includes all and any programs (including macros and scripts) which are deliberately coded in order to cause an unexpected (and usually, unwanted) event on a user's PC. However, whereas anti virus definitions ('vaccines') are released weekly or monthly, they operate retrospectively. In other words, someone's PC h [..]
|
8 |
malicious codesee Malware
|
9 |
malicious codeViruses like Trojan horses, worms, and scripts used by crackers/hackers to gain privileges, capture passwords, and to modify audit logs to hide unauthorized activity or code intentionally included in a program to allow an unauthorized person/purpose.
|
10 |
malicious codegoogle_ad_client="pub-8027288574377500";google_ad_slot="1043341745";google_ad_width=120;google_ad_height=600; Definition: Malicious Code is a type of computer program or instructio [..]
|
11 |
malicious codeMalicious code includes all and any programs (including macros and scripts) that are deliberately coded in order to cause an unexpected (and usually unwanted) event on a PC or other system. However, w [..]
|
12 |
malicious codeis any software that is intended to cause undesired effects, security breaches or damage, e.g. attack scripts, viruses, worms, spyware, Trojan horses, and logic bombs.
|
13 |
malicious codeMalicious code is code causing damage to a computer or system. It is code not easily or solely controlled through the use of anti-virus tools. Malicious code can either activate itself or be like a vi [..]
|
14 |
malicious codeany code that is intentionally included in software or hardware for an unauthorized purpose one-time password
|
15 |
malicious codeSoftware or firmware intended to perform an unauthorized process that will have adverse impact on the confidentiality, integrity, or availability of an information system. A virus, worm, Trojan horse, or other code-based entity that infects a host. Spyware and some forms of adware are also examples of malicious code. Also known as Malware.
|
16 |
malicious codeSoftware capable of performing an unauthorized process on an information system.
|
17 |
malicious codeMalicious code is another description for programs such as vi ruses, worms and Trojans that perform unauthorised processes on a computer or network such as send in email, stealing passwords or deleting information.
|
<< malicious applets | modal dispersion >> |