Get it on Google Play
New! Download Unionpedia on your Android™ device!
Faster access than browser!
New! Explore your interests! » Create account

Targeted threat

+ Save concept Saved concepts

Targeted threats are a class of malware destined for one specific organization or industry. [1]

12 relations: Attack (computing), Crimeware, Health Insurance Portability and Accountability Act, Heuristic, Industrial espionage, Malware, Phishing, Spamming, Threat (computer), Trojan Horse, Vulnerability (computing), Zero-day (computing).

Attack (computing)

In computer and computer networks an attack is any attempt to destroy, expose, alter, disable, steal or gain unauthorized access to or make unauthorized use of an asset.

New!!: Targeted threat and Attack (computing) · See more »


Crimeware is a class of malware designed specifically to automate cybercrime.

New!!: Targeted threat and Crimeware · See more »

Health Insurance Portability and Accountability Act

The Health Insurance Portability and Accountability Act of 1996 (HIPAA) was enacted by the United States Congress and signed by President Bill Clinton in 1996.

New!!: Targeted threat and Health Insurance Portability and Accountability Act · See more »


A heuristic technique (εὑρίσκω, "find" or "discover"), often called simply a heuristic, is any approach to problem solving, learning, or discovery that employs a practical method not guaranteed to be optimal or perfect, but sufficient for the immediate goals.

New!!: Targeted threat and Heuristic · See more »

Industrial espionage

Industrial espionage, economic espionage or corporate espionage is a form of espionage conducted for commercial purposes instead of purely national security.

New!!: Targeted threat and Industrial espionage · See more »


Malware, short for malicious software, is any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems.

New!!: Targeted threat and Malware · See more »


Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication.

New!!: Targeted threat and Phishing · See more »


Electronic spamming is the use of electronic messaging systems to send unsolicited messages (spam), especially advertising, as well as sending messages repeatedly on the same site.

New!!: Targeted threat and Spamming · See more »

Threat (computer)

In computer security a threat is a possible danger that might exploit a vulnerability to breach security and thus cause possible harm.

New!!: Targeted threat and Threat (computer) · See more »

Trojan Horse

The Trojan Horse is a tale from the Trojan War about the subterfuge that the Greeks used to enter the city of Troy and win the war.

New!!: Targeted threat and Trojan Horse · See more »

Vulnerability (computing)

In computer security, a vulnerability is a weakness which allows an attacker to reduce a system's information assurance.

New!!: Targeted threat and Vulnerability (computing) · See more »

Zero-day (computing)

A zero-day (also known as zero-hour or 0-day) vulnerability is an undisclosed and uncorrected computer application vulnerability that could be exploited to adversely affect the computer programs, data, additional computers or a network.

New!!: Targeted threat and Zero-day (computing) · See more »

Redirects here:

Targeted attack, Targeted attacks, Targeted threats.


[1] https://en.wikipedia.org/wiki/Targeted_threat

Hey! We are on Facebook now! »