GMAIL Glossary of common computer security terms (part :2) | Security Learner's Blog

Sunday, 16 February 2014

Glossary of common computer security terms (part :2)

Malicious Code:
Hardware, software, or firmware that is intentionally included in a system for an unauthorised purpose.
Software designed to infiltrate or damage a computer system without the owner’s informed consent.
A hacker’s attack aiming to redirect a website’s traffic to another, bogus website.
Is the fraudulent process of attempting to acquire sensitive information such as user names, passwords and credit card details by masquerading as a trustworthy entity. Usually used as part of stealing someone’s identity (see identity theft).
Unwanted/unsolicited email, often advertisements, which can also include viruses or other malware.
Computer software that is installed surreptitiously on a personal computer to intercept or take partial control over the user’s interaction with the computer, without the user’s informed consent.
Trojan horse
A program that neither replicates or copies itself but does damage or compromises the security of the computer. Typically, it relies on someone emailing it to a user – it does not email itself. It may arrive in the form of a joke program or software of some kind.
A program or code that replicates – that is, infects another program or document – by inserting itself or attaching itself. Most viruses just replicate; many also inflict damage.
A program that makes copies of itself – from one PC to another, for example or by copying itself using email or some other mechanism. It may do damage and compromise the security of the computer. It may arrive in the form of a joke program or software of some kind.
A zombie is a computer system/terminal that has been attacked and taken over by a hacker. The hacker then uses this system to support further attacks or as a storage location for a hacker’s information and files.


I am Fida Hussain,a computer student from Pakistan. Right from the day one I was introduced to computers,I had a passion for Hacking and Information security. So,I started this blog in 2012 to share my views and ideas with the world.


Post a Comment


Security Learner's Blog

Designed by Fida Hussain
This content is DMCA Protected.Copying or reproducing of procedure is prohibited.Do Not Copy!!