12 relations: Attack (computing), Crimeware, Health Insurance Portability and Accountability Act, Heuristic, Industrial espionage, Malware, Phishing, Spamming, Threat (computer), Trojan Horse, Vulnerability (computing), Zero-day (computing).
In computer and computer networks an attack is any attempt to destroy, expose, alter, disable, steal or gain unauthorized access to or make unauthorized use of an asset.
Crimeware is a class of malware designed specifically to automate cybercrime.
New!!: Targeted threat and Crimeware ·
The Health Insurance Portability and Accountability Act of 1996 (HIPAA) was enacted by the United States Congress and signed by President Bill Clinton in 1996.
A heuristic technique (εὑρίσκω, "find" or "discover"), often called simply a heuristic, is any approach to problem solving, learning, or discovery that employs a practical method not guaranteed to be optimal or perfect, but sufficient for the immediate goals.
New!!: Targeted threat and Heuristic ·
Industrial espionage, economic espionage or corporate espionage is a form of espionage conducted for commercial purposes instead of purely national security.
Malware, short for malicious software, is any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems.
New!!: Targeted threat and Malware ·
Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication.
New!!: Targeted threat and Phishing ·
Electronic spamming is the use of electronic messaging systems to send unsolicited messages (spam), especially advertising, as well as sending messages repeatedly on the same site.
New!!: Targeted threat and Spamming ·
In computer security a threat is a possible danger that might exploit a vulnerability to breach security and thus cause possible harm.
The Trojan Horse is a tale from the Trojan War about the subterfuge that the Greeks used to enter the city of Troy and win the war.
New!!: Targeted threat and Trojan Horse ·
In computer security, a vulnerability is a weakness which allows an attacker to reduce a system's information assurance.
A zero-day (also known as zero-hour or 0-day) vulnerability is an undisclosed and uncorrected computer application vulnerability that could be exploited to adversely affect the computer programs, data, additional computers or a network.