expand for answer

Malicious Code

Code objects that include a broad range of programmed computer security threats that exploit various network, operating system, software, and physical security vulnerabilities to spread malicious payloads to computer systems. Software or firmware intended to perform an unauthorized process that will have adverse impact on the confidentiality, integrity, or availability of an information system. (. See Trojan horse. )


Similar items:
A computer program that is apparently or actually useful and contains a trapdoor or unexpected code. A malicious code object that appears to be a benevolent program, such as a game or simple utility that performs the “cover” functions as advertised but also carries an unknown payload, such as a virus. Program containing hidden code allowing the unauthorized collection, falsification, or destruction of information. (. See malicious code. )
[view]
A Trojan horse that will trigger when a specific logical event or action occurs. Malicious code objects that infect a system and lie dormant until they are triggered by the occurrence of one or more conditions.
[view]
Security commensurate with the risk and magnitude of harm resulting from the loss, misuse, or unauthorized access to or modification of information. This includes assuring that information systems operate effectively and provide appropriate confidentiality, integrity, and availability, through the use of costeffective management, personnel, operational, and technical controls. (OMB Circular A130)Security commensurate with the risk and magnitude of the harm resulting from the loss, misuse, or unauthorized access to or modification of information. This includes assuring that systems and applications operate effectively and provide appropriate confidentiality, integrity, and availability, through the use of costeffective management, acquisition, development, installation, operational, and technical controls.
[view]
A type of malicious software that can destroy the computer’s hard drive, files, and programs in memory, and that replicates itself to other disks. Selfreplicating, malicious code that attaches itself to an application program or other executable system component and leaves no obvious signs of its presence. The oldest form of malicious code objects that plague cyberspace. Once they are in a system, they attach themselves to legitimate operating system and user files and applications
[view]
An object is highly cohesive if it can perform a task with little or no help from other objects. Highly cohesive objects are not as dependent on other objects as objects with lower cohesion. Objects with higher cohesion are often better. Highly cohesive objects perform tasks alone and have low coupling.
[view]


There are no comments yet.

Authentication required

You must log in to post a comment.

Log in