Código dañino

Acrónimos: Malware

Ver:

·         Bomba lógica

·         Caballo de Troya

·         Virus

·         Gusano informático

·         http://en.wikipedia.org/wiki/Malware

Software malicioso o malware

Software o firmware desarrollado para infiltrarse en una computadora o dañarla sin conocimiento ni consentimiento del propietario, con la intención de comprometer la confidencialidad, integridad o disponibilidad de los datos, las aplicaciones o el sistema operativo del propietario. Por lo general, esta clase de software se infiltra en una red durante diversas actividades aprobadas por el negocio, lo que permite explotar las vulnerabilidades del sistema. Algunos ejemplos son los virus, gusanos, troyanos (o caballos de Troya), spyware, adware y rootkits.

http://es.pcisecuritystandards.org

Malware malicious software

también (del inglés llamado badware o software malicioso) es un software que tiene como objetivo infiltrarse en o dañar un ordenador sin el conocimiento de su dueño y con finalidades muy diversas ya que en esta categoría encontramos desde un troyano hasta un spyware.

Esta expresión es un término general muy utilizado por profesionales de la computación para definir una variedad de softwares o programas de códigos hostiles e intrusivos. Muchos usuarios de computadores no están aún familiarizados con este término y otros incluso nunca lo han utilizado. Sin embargo la expresión "virus informático" es más utilizada en el lenguaje cotidiano y a menudo en los medios de comunicación para describir todos los tipos de malware.

http://es.wikipedia.org/wiki/Malware

Código malicioso

Software capaz de realizar un proceso no autorizado sobre un sistema con un deliberado propósito de ser perjudicial.

http://www.alerta-antivirus.es/seguridad/ver_pag.html?tema=S

(en) Malicious Software / Malware:

Software designed to infiltrate or damage a computer system without the owner‹s knowledge or consent. Such software typically enters a network during many business-approved activities, which results in the exploitation of system vulnerabilities. Examples include viruses, worms, Trojans (or Trojan horses), spyware, adware, and rootkits.

https://www.pcisecuritystandards.org/security_standards/glossary.php

(en) Malicious code

Software (e.g., Trojan horse) that appears to perform a useful or desirable function, but actually gains unauthorized access to system resources or tricks a user into executing other malicious logic.

http://www.sans.org/security-resources/glossary-of-terms/

(en) Malware

A generic term for a number of different types of malicious code.

http://www.sans.org/security-resources/glossary-of-terms/

(en) Malicious Logic:

Instructions and data that may be stored in software, firmware, or hardware that is designed or intended adversely to affect the performance of a computer system. The term ‘logic’ refers to any set of instructions, be they in hardware, firmware, or software, executed by a computing device. Examples of malicious logic include Trojan horses, rootkits, computer viruses, and computer worms. Firmware comprises a layer between software (i.e., applications and operating systems) and hardware and consists of low-level drivers that act as an interface between hardware and software.

The Tallinn Manual, 2013

(en) Malicious Code

Software or firmware intended to perform an unauthorized process that will have adverse impact on the confidentiality, integrity, or availability of an information system. A virus, worm, Trojan horse, or other code-based entity that infects a host. Spyware and some forms of adware are also examples of malicious code. [NIST-SP800-53:2013]

(en) Malware

Malicious software or potentially unwanted software installed without informed user consent, generally covering a range of software programmes designed to attack, or prevent the intended use of information and communications networks. [CSS NZ:2011]

(en) malicious code

Software or firmware intended to perform an unauthorized process that will have adverse impact on the confidentiality, integrity, or availability of an information system. A virus, worm, Trojan horse, or other code-based entity that infects a host. Spyware and some forms of adware are also examples of malicious code. [CNSSI_4009:2010]

(en) malicious applets

Small application programs that are automatically downloaded and executed and that perform an unauthorized function on an information system. [CNSSI_4009:2010]

(en) malicious logic

Hardware, firmware, or software that is intentionally included or inserted in a system for a harmful purpose. [CNSSI_4009:2010]

(en) malware

malicious software, such as a virus or a trojan horse, designed specifically to damage or disrupt a system. [ISO-18028-4:2005]

(en) Malware

A program that is inserted into a system, usually covertly, with the intent of compromising the confidentiality, integrity, or availability of the victims data, applications, or operating system or of otherwise annoying or disrupting the victim. [NIST-SP800-94:2007] [NIST-SP800-83:2005]

(en) Malicious Code

A virus, worm, Trojan horse, or other code-based entity that infects a host. [NIST-SP800-61:2004]

(en) Malware

is software designed to infiltrate or damage a computer system, without the owner's informed consent. The term is a portmanteau word of "malicious" and "software", and refers to the intent of the creator, rather than any specific behaviors. It includes computer viruses, worms, Trojan horses, spyware, adware, and other malicious and unwanted software. In law, malware is sometimes known as a computer contaminant, for instance in the legal codes of California, West Virginia, and several other U.S. states.

(en) Malware

All types of software that prevent users from using their computers as they were intended. This includes hostile java applets, ActiveX vandals, Trojan horses, script vandals and viruses that are designed to corrupt or steal digital information.

http://www.qtsnet.com/SecuritySolutions/security_glossary.html

(en) Malicious software

Malicious Software encompassing viruses, worms and Trojan horses amongst other bits of code.

http://www.enisa.europa.eu/

(en) Malware

A generic term (short for malicious software) that describes a variety of malicious programs that may be installed on machines with or without the users knowledge. Also called scumware; subcategories include viruses, worms, spyware and others.

http://www.csoonline.com/glossary/

(en) malware

Malware (for "malicious software") is any program or file that is harmful to a computer user. Thus, malware includes computer viruses, worms, Trojan horses, and also spyware, programming that gathers information about a computer user without permission.

http://searchsoftwarequality.techtarget.com/glossary/

(fr) Logiciel malveillant / maliciel

Logiciel ou firmware conçu pour infiltrer ou endommager un système informatique sans l’approbation ou la connaissance de son propriétaire, avec l’intention de compromettre la confidentialité, l’intégrité ou la disponibilité des données, des applications ou du système d’exploitation du propriétaire. Ce type de logiciel s’introduit généralement dans un réseau au cours d’activités approuvées par l’entreprise, et exploite les vulnérabilités du système. Les virus, les chevaux de Troie, les logiciels spyware et adware et les outils de dissimulation d’activité en sont des exemples.

http://fr.pcisecuritystandards.org/

(fr) Malware

Contraction de "malicious software"Les malwares correspondent aux programmes de type virus, vers ou chevaux de Troie développés dans le but de nuire au fonctionnement normal d'un système et de porter atteinte à ses utilisateurs.

http://www.cases.public.lu/functions/glossaire/

(fr) Malware

Contraction de "malicious software", le terme malware désigne les programmes spécifiquement conçus pour endommager ou entraver le fonctionnement normal d'un système, tels que les virus, les vers, les chevaux de Troie, ainsi que certains javascripts ou applets java hostiles. Cette famille ne doit pas être confondue avec les spywares (espiogiciels), autre famille de logiciels dont le fonctionnement est également contestable mais dont le but premier n'est pas de nuire à l'intégrité d'un système. Les antivirus détectent et éliminent une grande partie des malwares sans toutefois pouvoir jamais atteindre 100% d'efficacité 100% du temps: il reste donc indispensable de n'exécuter un programme ou un fichier joint que si sa sûreté est établie avec certitude, le doute profitant toujours aux malwares.

http://www.secuser.com/glossaire/

Temas relacionados

Términos