itsc.cuhk.edu.hk

Woonplaats:1
Upvotes received0
Downvotes received0
Karma:0 (upvotes-downvotes)



0 earned Badges

No badges were found



Definitions (44)

1

0 Thumbs up   0 Thumbs down

adware


Adware is software that displays advertising banners while the program is running. A lot of adware is also spyware.
Source: itsc.cuhk.edu.hk (offline)

2

0 Thumbs up   0 Thumbs down

anti-antivirus virus


A virus that attacks, disables, or avoids infecting specific anti-virus software. Also called a retrovirus.
Source: itsc.cuhk.edu.hk (offline)

3

0 Thumbs up   0 Thumbs down

door


door is a general term for a malicious program that listens for commands on a certain network port. Most backdoors consist of a client component and a server component. The client resides on the intruder's remote computer, and the server resides on the infected system. When a connection between client and server is established, the remote intr [..]
Source: itsc.cuhk.edu.hk (offline)

4

0 Thumbs up   0 Thumbs down

botnet


A botnet is a network of zombie computers under the remote control of a master.
Source: itsc.cuhk.edu.hk (offline)

5

0 Thumbs up   0 Thumbs down

brute force attack


Brute force attack is a technique used to break an encryption or authentication system by trying all possibilities.
Source: itsc.cuhk.edu.hk (offline)

6

0 Thumbs up   0 Thumbs down

certification authority


In cryptography, a certificate authority or certification authority (CA) is an entity which issues digital certificates for use by other parties. It is an example of a trusted third party. CAs are characteristic of many public key infrastructure (PKI) schemes. There are many commercial CAs that charge for their services. Institutions and government [..]
Source: itsc.cuhk.edu.hk (offline)

7

0 Thumbs up   0 Thumbs down

code injection attack


An attack technique to introduce code into a computer program or system to form an unexpected action. The attack is usually accomplished by taking advantage of an un-enforced or loosely implemented input validation process.
Source: itsc.cuhk.edu.hk (offline)

8

0 Thumbs up   0 Thumbs down

companion virus


A virus that creates a new program with the same file name as an existing program, but in a different place or with a different file type, so that typing the program's name on the command line causes the virus program to be executed instead of the original program.
Source: itsc.cuhk.edu.hk (offline)

9

0 Thumbs up   0 Thumbs down

data driven attack


A form of attack encoded in innocuous-seeming data which is then executed by a user or software to enforce the attack.
Source: itsc.cuhk.edu.hk (offline)

10

0 Thumbs up   0 Thumbs down

denial of service


A prevention of the use of information resources either intentionally or unintentionally, which affects the availability of the information resources. Examples of such attacks are SYN flood, Ping O death, packet flooding and Ping flooding.
Source: itsc.cuhk.edu.hk (offline)


To view all 44 definitions, please sign in.