3.7. Terms and Concepts
program, 95 | trapdoor, 112 |
user, 95 | worm, 112 |
secure program, 95 | rabbit, 112 |
penetrate and patch, 96 | appended virus, 113 |
fault, 96 | document virus, 116 |
program security flaw, 97 | macro virus, 116 |
bug, 98 | boot sector virus, 118 |
error, 98 | virus signature, 120 |
failure, 98 | polymorphic virus, 123 |
buffer overflow, 100 | encrypting virus, 124 |
incomplete mediation, 104 | Brain virus, 128 |
time-of-check to time-of-use, 106 | The Internet worm, 129 |
malicious code, 108 | Code Red, 132 |
rogue program, 111 | web bug, 134 |
virus, 111 | stub, 137 |
agent, 111 | driver, 137 |
transient virus, 111 | side effect, 138 |
resident virus, 111 | error checking, 138 |
Trojan horse, 111 | undefined operation, 139 |
logic bomb, 112 | salami attack, 139 |
time bomb, 112 | information leakage, 141 |
backdoor, 112 | covert channel, 141 ... |
Get Security in Computing, Third Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.