Acrónimos:
Malware
Ver:
· Virus
· http://en.wikipedia.org/wiki/Malware
Software o
firmware desarrollado para infiltrarse en una computadora o dañarla sin
conocimiento ni consentimiento del propietario, con la intención de comprometer
la confidencialidad, integridad o disponibilidad de los datos, las aplicaciones
o el sistema operativo del propietario. Por lo general, esta clase de software
se infiltra en una red durante diversas actividades aprobadas por el negocio,
lo que permite explotar las vulnerabilidades del sistema. Algunos ejemplos son
los virus, gusanos, troyanos (o caballos de Troya), spyware, adware y rootkits.
http://es.pcisecuritystandards.org
también (del
inglés llamado badware o software malicioso) es un software que tiene como
objetivo infiltrarse en o dañar un ordenador sin el conocimiento de su dueño y
con finalidades muy diversas ya que en esta categoría encontramos desde un
troyano hasta un spyware.
Esta
expresión es un término general muy utilizado por profesionales de la
computación para definir una variedad de softwares o programas de códigos
hostiles e intrusivos. Muchos usuarios de computadores no están aún
familiarizados con este término y otros incluso nunca lo han utilizado. Sin
embargo la expresión "virus informático" es más utilizada en el
lenguaje cotidiano y a menudo en los medios de comunicación para describir
todos los tipos de malware.
http://es.wikipedia.org/wiki/Malware
Software
capaz de realizar un proceso no autorizado sobre un sistema con un deliberado
propósito de ser perjudicial.
http://www.alerta-antivirus.es/seguridad/ver_pag.html?tema=S
Software designed
to infiltrate or damage a computer system without the owners knowledge or
consent. Such software typically enters a network during many business-approved
activities, which results in the exploitation of system vulnerabilities.
Examples include viruses, worms, Trojans (or Trojan horses), spyware, adware,
and rootkits.
https://www.pcisecuritystandards.org/security_standards/glossary.php
Software (e.g.,
Trojan horse) that appears to perform a useful or desirable function, but
actually gains unauthorized access to system resources or tricks a user into
executing other malicious logic.
http://www.sans.org/security-resources/glossary-of-terms/
A generic term
for a number of different types of malicious code.
http://www.sans.org/security-resources/glossary-of-terms/
Instructions and
data that may be stored in software, firmware, or hardware that is designed or
intended adversely to affect the performance of a computer system. The term
logic refers to any set of instructions, be they in hardware, firmware, or
software, executed by a computing device. Examples of malicious logic include
Trojan horses, rootkits, computer viruses, and computer worms. Firmware
comprises a layer between software (i.e., applications and operating systems)
and hardware and consists of low-level drivers that act as an interface between
hardware and software.
The Tallinn
Manual, 2013
Software or
firmware intended to perform an unauthorized process that will have adverse
impact on the confidentiality, integrity, or availability of an information
system. A virus, worm, Trojan horse, or other code-based entity that infects a
host. Spyware and some forms of adware are also examples of malicious code. [NIST-SP800-53:2013]
Malicious
software or potentially unwanted software installed without informed user
consent, generally covering a range of software programmes designed to attack,
or prevent the intended use of information and communications networks. [CSS NZ:2011]
Software or
firmware intended to perform an unauthorized process that will have adverse
impact on the confidentiality, integrity, or availability of an information
system. A virus, worm, Trojan horse, or other code-based entity that infects a
host. Spyware and some forms of adware are also examples of malicious code. [CNSSI_4009:2010]
Small application
programs that are automatically downloaded and executed and that perform an
unauthorized function on an information system. [CNSSI_4009:2010]
Hardware,
firmware, or software that is intentionally included or inserted in a system
for a harmful purpose. [CNSSI_4009:2010]
malicious
software, such as a virus or a trojan horse, designed specifically to damage or
disrupt a system. [ISO-18028-4:2005]
A program that is
inserted into a system, usually covertly, with the intent of compromising the
confidentiality, integrity, or availability of the victims data, applications,
or operating system or of otherwise annoying or disrupting the victim. [NIST-SP800-94:2007] [NIST-SP800-83:2005]
A virus, worm,
Trojan horse, or other code-based entity that infects a host. [NIST-SP800-61:2004]
is software
designed to infiltrate or damage a computer system, without the owner's
informed consent. The term is a portmanteau word of "malicious" and
"software", and refers to the intent of the creator, rather than any
specific behaviors. It includes computer viruses, worms, Trojan horses,
spyware, adware, and other malicious and unwanted software. In law, malware is
sometimes known as a computer contaminant, for instance in the legal codes of
California, West Virginia, and several other U.S. states.
All types of
software that prevent users from using their computers as they were intended.
This includes hostile java applets, ActiveX vandals, Trojan horses, script
vandals and viruses that are designed to corrupt or steal digital information.
http://www.qtsnet.com/SecuritySolutions/security_glossary.html
Malicious
Software encompassing viruses, worms and Trojan horses amongst other bits of
code.
http://www.enisa.europa.eu/
A generic term
(short for malicious software) that describes a variety of malicious programs
that may be installed on machines with or without the users knowledge. Also
called scumware; subcategories include viruses, worms, spyware and others.
http://www.csoonline.com/glossary/
Malware (for
"malicious software") is any program or file that is harmful to a
computer user. Thus, malware includes computer viruses, worms, Trojan horses,
and also spyware, programming that gathers information about a computer user
without permission.
http://searchsoftwarequality.techtarget.com/glossary/
Logiciel ou firmware
conçu pour infiltrer ou endommager un système informatique sans lapprobation
ou la connaissance de son propriétaire, avec lintention de compromettre la
confidentialité, lintégrité ou la disponibilité des données, des applications
ou du système dexploitation du propriétaire. Ce type de logiciel sintroduit
généralement dans un réseau au cours dactivités approuvées par lentreprise,
et exploite les vulnérabilités du système. Les virus, les chevaux de Troie, les
logiciels spyware et adware et les outils de dissimulation dactivité en sont
des exemples.
http://fr.pcisecuritystandards.org/
Contraction de
"malicious software"Les malwares correspondent aux programmes de type
virus, vers ou chevaux de Troie développés dans le but de nuire au
fonctionnement normal d'un système et de porter atteinte à ses utilisateurs.
http://www.cases.public.lu/functions/glossaire/
Contraction de
"malicious software", le terme malware désigne les programmes
spécifiquement conçus pour endommager ou entraver le fonctionnement normal d'un
système, tels que les virus, les vers, les chevaux de Troie, ainsi que certains
javascripts ou applets java hostiles. Cette famille ne doit pas être confondue
avec les spywares (espiogiciels), autre famille de logiciels dont le
fonctionnement est également contestable mais dont le but premier n'est pas de
nuire à l'intégrité d'un système. Les antivirus détectent et éliminent une
grande partie des malwares sans toutefois pouvoir jamais atteindre 100%
d'efficacité 100% du temps: il reste donc indispensable de n'exécuter un
programme ou un fichier joint que si sa sûreté est établie avec certitude, le
doute profitant toujours aux malwares.
http://www.secuser.com/glossaire/
Temas relacionados