itsc.cuhk.edu.hk

Woonplaats:1
Upvotes received0
Downvotes received0
Karma:0 (upvotes-downvotes)



0 earned Badges

No badges were found



Definitions (44)

1

0 Thumbs up   0 Thumbs down

Adware


Adware is software that displays advertising banners while the program is running. A lot of adware is also spyware.
Source: itsc.cuhk.edu.hk

2

0 Thumbs up   0 Thumbs down

door


door is a general term for a malicious program that listens for commands on a certain network port. Most backdoors consist of a client component and a server component. The client resides on the intruder's remote computer, and the server resides on the infected system. When a connection between client and server is established, the remote intr [..]
Source: itsc.cuhk.edu.hk

3

0 Thumbs up   0 Thumbs down

Botnet


A botnet is a network of zombie computers under the remote control of a master.
Source: itsc.cuhk.edu.hk

4

0 Thumbs up   0 Thumbs down

Brute force attack


Brute force attack is a technique used to break an encryption or authentication system by trying all possibilities.
Source: itsc.cuhk.edu.hk

5

0 Thumbs up   0 Thumbs down

certification authority


In cryptography, a certificate authority or certification authority (CA) is an entity which issues digital certificates for use by other parties. It is an example of a trusted third party. CAs are characteristic of many public key infrastructure (PKI) schemes. There are many commercial CAs that charge for their services. Institutions and government [..]
Source: itsc.cuhk.edu.hk

6

0 Thumbs up   0 Thumbs down

companion virus


A virus that creates a new program with the same file name as an existing program, but in a different place or with a different file type, so that typing the program's name on the command line causes the virus program to be executed instead of the original program.
Source: itsc.cuhk.edu.hk

7

0 Thumbs up   0 Thumbs down

Data Driven Attack


A form of attack encoded in innocuous-seeming data which is then executed by a user or software to enforce the attack.
Source: itsc.cuhk.edu.hk

8

0 Thumbs up   0 Thumbs down

denial of service


A prevention of the use of information resources either intentionally or unintentionally, which affects the availability of the information resources. Examples of such attacks are SYN flood, Ping O death, packet flooding and Ping flooding.
Source: itsc.cuhk.edu.hk

9

0 Thumbs up   0 Thumbs down

Dictionary Attack


Dictionary attack is a technique used to break an encryption or authentication system by trying words that can be found in a dictionary.
Source: itsc.cuhk.edu.hk

10

0 Thumbs up   0 Thumbs down

DNS spoofing


Pretend to be the DNS name of another system by compromising the domain name server for a valid domain.
Source: itsc.cuhk.edu.hk


To view all 44 definitions, please sign in.