3.7. Terms and Concepts

program, 95trapdoor, 112
user, 95worm, 112
secure program, 95rabbit, 112
penetrate and patch, 96appended virus, 113
fault, 96document virus, 116
program security flaw, 97macro virus, 116
bug, 98boot sector virus, 118
error, 98virus signature, 120
failure, 98polymorphic virus, 123
buffer overflow, 100encrypting virus, 124
incomplete mediation, 104Brain virus, 128
time-of-check to time-of-use, 106The Internet worm, 129
malicious code, 108Code Red, 132
rogue program, 111web bug, 134
virus, 111stub, 137
agent, 111driver, 137
transient virus, 111side effect, 138
resident virus, 111error checking, 138
Trojan horse, 111undefined operation, 139
logic bomb, 112salami attack, 139
time bomb, 112information leakage, 141
backdoor, 112covert channel, 141 ...

Get Security in Computing, Third Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.