Term
|
Definition
| uses office document motion |
|
|
Term
|
Definition
| a virus that uses encryption technologies to hide the core code from detection(ski-mask) |
|
|
Term
|
Definition
| A virus that is able to modify all but the core code of a virus |
|
|
Term
|
Definition
| a virus that is able to completely refactor internal code to make itself different between each generation( a catipillar ro butterfly) |
|
|
Term
|
Definition
| immediate limited release fix for a specific problem |
|
|
Term
|
Definition
| When a hotfix because a problem for everyone(or enough people) |
|
|
Term
|
Definition
| a collection of patches ,updates hotfixes, and upgrades |
|
|
Term
|
Definition
| recommended or approved collection of setting |
|
|
Term
|
Definition
| current minimum or acceptable values |
|
|
Term
|
Definition
| lovel access to the system at the same priviliges as the user |
|
|
Term
|
Definition
| "applet" and "sandbox". full programming language "bytecode" java script developed by netscape designed to be used in a browser to provide dynamic experience |
|
|
Term
|
Definition
| integrity attack, attempt to insert unvetted code into a system |
|
|
Term
|
Definition
| code injection against an application which puts too much data into a memory location to attempt to overwrite a piece of critical system memory (a code injection attack) |
|
|
Term
|
Definition
| code injection against a browser where unintended functions or communications occur (a code injection attack) |
|
|
Term
|
Definition
| Physical architecture to create a sheltered network segment for public services |
|
|
Term
|
Definition
| logical segmentation of networks for functional purposes |
|
|
Term
|
Definition
| process of converting one set of logical addresses into another |
|
|
Term
|
Definition
| a 1-to-1 mapping of addresses between internal and external |
|
|
Term
|
Definition
| The combination of policies, procedures, technologies, and people used to enhance confidentiallity, integrit, and availibility |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| increased authorization without authentication |
|
|
Term
|
Definition
| unintended authorization typically through the implemention of job rotation |
|
|
Term
|
Definition
| Transport mechanism/carriers |
|
|
Term
|
Definition
| Replicates within a object and need some form of subject interaction |
|
|
Term
|
Definition
| self replicates and requires no subject interaction |
|
|
Term
|
Definition
| appears to be an asset to entice subject interaction(ooo shiny) |
|
|
Term
|
Definition
| Transport mechanism that is dormant until triggered |
|
|
Term
|
Definition
| unsoliticed messages usually email |
|
|
Term
|
Definition
| software with advertisement |
|
|
Term
|
Definition
| software that collects information about this subject |
|
|