Logo
Unionpedia
Communication
Get it on Google Play
New! Download Unionpedia on your Android™ device!
Free
Faster access than browser!
 

Targeted threat

+ Save concept

Targeted threats are a class of malware destined for one specific organization or industry. [1]

13 relations: Cyberattack, Gramm–Leach–Bliley Act, Health Insurance Portability and Accountability Act, Heuristic, Industrial espionage, Malware, Phishing, Sarbanes–Oxley Act, Spamming, Threat (computer), Trojan Horse, Vulnerability (computing), Zero-day (computing).

Cyberattack

A cyberattack is any type of offensive maneuver that targets computer information systems, infrastructures, computer networks, or personal computer devices.

New!!: Targeted threat and Cyberattack · See more »

Gramm–Leach–Bliley Act

The Gramm–Leach–Bliley Act (GLBA), also known as the Financial Services Modernization Act of 1999, is an act of the 106th United States Congress (1999–2001).

New!!: Targeted threat and Gramm–Leach–Bliley Act · See more »

Health Insurance Portability and Accountability Act

The Health Insurance Portability and Accountability Act of 1996 (HIPAA) was enacted by the United States Congress and signed by President Bill Clinton in 1996.

New!!: Targeted threat and Health Insurance Portability and Accountability Act · See more »

Heuristic

A heuristic technique (εὑρίσκω, "find" or "discover"), often called simply a heuristic, is any approach to problem solving, learning, or discovery that employs a practical method, not guaranteed to be optimal, perfect, logical, or rational, but instead sufficient for reaching an immediate goal.

New!!: Targeted threat and Heuristic · See more »

Industrial espionage

Industrial espionage, economic espionage, corporate spying or corporate espionage is a form of espionage conducted for commercial purposes instead of purely national security.

New!!: Targeted threat and Industrial espionage · See more »

Malware

Malware (a portmanteau for malicious software) is any software intentionally designed to cause damage to a computer, server or computer network.

New!!: Targeted threat and Malware · See more »

Phishing

Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords, and credit card details (and money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication.

New!!: Targeted threat and Phishing · See more »

Sarbanes–Oxley Act

The Sarbanes–Oxley Act of 2002, also known as the "Public Company Accounting Reform and Investor Protection Act" (in the Senate) and "Corporate and Auditing Accountability, Responsibility, and Transparency Act" (in the House) and more commonly called Sarbanes–Oxley, Sarbox or SOX, is a United States federal law that set new or expanded requirements for all U.S. public company boards, management and public accounting firms.

New!!: Targeted threat and Sarbanes–Oxley Act · See more »

Spamming

Electronic spamming is the use of electronic messaging systems to send an unsolicited message (spam), especially advertising, as well as sending messages repeatedly on the same site.

New!!: Targeted threat and Spamming · See more »

Threat (computer)

In computer security, a threat is a possible danger that might exploit a vulnerability to breach security and therefore cause possible harm.

New!!: Targeted threat and Threat (computer) · See more »

Trojan Horse

The Trojan Horse is a tale from the Trojan War about the subterfuge that the Greeks used to enter the independent city of Troy and win the war.

New!!: Targeted threat and Trojan Horse · See more »

Vulnerability (computing)

In computer security, a vulnerability is a weakness which can be exploited by a Threat Actor, such as an attacker, to perform unauthorized actions within a computer system.

New!!: Targeted threat and Vulnerability (computing) · See more »

Zero-day (computing)

A zero-day (also known as 0-day) vulnerability is a computer-software vulnerability that is unknown to those who would be interested in mitigating the vulnerability (including the vendor of the target software).

New!!: Targeted threat and Zero-day (computing) · See more »

Redirects here:

Targeted attack, Targeted attacks, Targeted threats.

References

[1] https://en.wikipedia.org/wiki/Targeted_threat

OutgoingIncoming
Hey! We are on Facebook now! »