Vous êtes sur la page 1sur 2

Term

Definition

Malware

A computer program causing damage or denial of service on infected


computer systems

Denial of service
(DoS) attack

an attempt to make a machine or network resource unavailable to its intended


users ( generally consists of efforts to temporarily or indefinitely interrupt or
suspend services of a host connected to the Internet)

Computer virus

-Attaches itself to other programs


-Duplicates itself to infect other computers
-Must be sent out by computer users who are unaware of the virus

Macro virus

Computer virus written in a macro language, attached in a Microsoft Office


document

Virus hoax

A message warning users of a non-existent virus, usually in the form of a chain


letter

Worm

-Uses computer networks and security loopholes to spread


-Replicates itself
-A copy of the worm scans the network for another machine with a specific
security loophole, and uses it to copy itself to the new computer. This is
AUTOMATIC and does not require the unwary users to spread it manually.
-Typically spread by email
-Standalone application which DOES NOT attach to other programs

Trojan horse

-Disguises itself as a useful program


-Freely downloaded from a web server or spread as an email attachment
-Secretly enters the system when the useful program runs
-CANNOT replicate itself onto other computers
-Often for stealing sensitive info, e.g. passwords and cred card nos.,
controlling a computer remotely, or create a backdoor on an infected computer

Backdoor

a method of bypassing normal authentication, securing illegal remote access


to a computer, obtaining access to plaintext, and so on, while attempting to
remain undetected.

Distributed denial
of service

DoS attack sent by >1 person

Spyware

(NOT malware)
-Hides in the computer to look for information for illegal use (browsing
behaviour, personal info, financial info)
-May even take control of the computer, e.g. changing the default homepage,
redirecting to specific sites, restricting/disabling control settings of browsers especially IE, installing other spyware or malware)
-May be installed by a Trojan horse, at a dynamic website, or disguised as
shareware/freeware

Adware

-Sometimes categorised as spyware


-Keeps track of user activities and displays related advertisements as pop-up
windows or banners
-Usually embedded in other programs

-Scans files stored on a disk or downloaded from the Internet to determine if


they are affected, and disinfects, deletes or quarantines files where necessary
-Stores numerous virus signatures
-May also monitor running programs and terminate suspicious instructions to
Anti-virus software
avoid further damage
-Anti-virus software should be started on system boot, the computer should be
scanned regularly, virus signatures should be updated regularly, incoming files
should be scanned before use,
Virus
signature/Virus
definition

a signature is an algorithm or hash (a number derived from a string of text) that


uniquely identifies a specific virus

False positive

When the virus definition identifies a virus in a virus-free program

False negative

When the virus definition categorises a virus-infected file as safe

Anti-spyware
program

Scans webpages and executables for traces of spyware, and detects system
anomalies like arbitrarily opened network channels
-Contains spyware definitions which must be updated regularly
-May also deal with adware

Vous aimerez peut-être aussi