46 relations: Access control, Antivirus software, Apple Inc., Application software, Behavior, Buffer overflow, C't, Complexity, Computer security, Computer virus, Computer worm, Convention on Cybercrime, Electronic signature, Exploit (computer security), Framework decision, Halting problem, Heuristic (computer science), Heuristic analysis, Internet, Linear bounded automaton, Linux, Malware, Microsoft, Microsoft Windows, Network Access Control, Network Access Protection, Network Admission Control, OS X, RFPolicy, Sandbox (computer security), Security and safety features new to Windows Vista, Simple Mail Transfer Protocol, Software-defined protection, Solaris (operating system), Static program analysis, Sun Microsystems, Symantec, Targeted threat, Timeline of computer viruses and worms, TippingPoint, United States Computer Emergency Readiness Team, Unix, Vulnerability, Vulnerability (computing), Windows Vista, Zeroday Emergency Response Team.
Access control
In the fields of physical security and information security, access control is the selective restriction of access to a place or other resource.
New!!: Zero-day (computing) and Access control ·
Antivirus software
Antivirus or anti-virus software (often abbreviated as AV), sometimes known as anti-malware software, is computer software used to prevent, detect and remove malicious software.
New!!: Zero-day (computing) and Antivirus software ·
Apple Inc.
Apple Inc. (commonly known as Apple) is an American multinational technology company headquartered in Cupertino, California, that designs, develops, and sells consumer electronics, computer software, and online services.
New!!: Zero-day (computing) and Apple Inc. ·
Application software
An application program (or application for short) is a computer program designed to perform a group of coordinated functions, tasks, or activities for the benefit of the user.
New!!: Zero-day (computing) and Application software ·
Behavior
Behavior or behaviour (see spelling differences) is the range of actions and mannerisms made by individuals, organisms, systems, or artificial entities in conjunction with themselves or their environment, which includes the other systems or organisms around as well as the (inanimate) physical environment.
New!!: Zero-day (computing) and Behavior ·
Buffer overflow
In computer security and programming, a buffer overflow, or buffer overrun, is an anomaly where a program, while writing data to a buffer, overruns the buffer's boundary and overwrites memory in adjacent locations.
New!!: Zero-day (computing) and Buffer overflow ·
C't
c't – Magazin für Computertechnik (magazine for computer technology) is a German computer magazine, published by the Heinz Heise publishing house.
New!!: Zero-day (computing) and C't ·
Complexity
There is no absolute definition of what complexity means; the only consensus among researchers is that there is no agreement about the specific definition of complexity.
New!!: Zero-day (computing) and Complexity ·
Computer security
Computer security, also known as cybersecurity or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide.
New!!: Zero-day (computing) and Computer security ·
Computer virus
A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be "infected".
New!!: Zero-day (computing) and Computer virus ·
Computer worm
A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers.
New!!: Zero-day (computing) and Computer worm ·
Convention on Cybercrime
The Convention on Cybercrime, also known as the Budapest Convention on Cybercrime or the Budapest Convention, is the first international treaty seeking to address Internet and computer crime by harmonizing national laws, improving investigative techniques, and increasing cooperation among nations.
New!!: Zero-day (computing) and Convention on Cybercrime ·
Electronic signature
An electronic signature, or e-signature, is any electronic means that indicates either that a person adopts the contents of an electronic message, or more broadly that the person who claims to have written a message is the one who wrote it (and that the message received is the one that was sent by this person).
New!!: Zero-day (computing) and Electronic signature ·
Exploit (computer security)
An exploit (from the English verb to exploit, meaning "using something to one’s own advantage") is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized).
New!!: Zero-day (computing) and Exploit (computer security) ·
Framework decision
A framework decision was a kind of legislative act of the European Union used exclusively within the EU's competences in police and judicial co-operation in criminal justice matters.
New!!: Zero-day (computing) and Framework decision ·
Halting problem
In computability theory, the halting problem is the problem of determining, from a description of an arbitrary computer program and an input, whether the program will finish running or continue to run forever.
New!!: Zero-day (computing) and Halting problem ·
Heuristic (computer science)
In computer science, artificial intelligence, and mathematical optimization, a heuristic is a technique designed for solving a problem more quickly when classic methods are too slow, or for finding an approximate solution when classic methods fail to find any exact solution.
New!!: Zero-day (computing) and Heuristic (computer science) ·
Heuristic analysis
Heuristic analysis is a method employed by many computer antivirus programs designed to detect previously unknown computer viruses, as well as new variants of viruses already in the "wild".
New!!: Zero-day (computing) and Heuristic analysis ·
Internet
The Internet is the global system of interconnected computer networks that use the Internet protocol suite (TCP/IP) to link billions of devices worldwide.
New!!: Zero-day (computing) and Internet ·
Linear bounded automaton
In computer science, a linear bounded automaton (plural linear bounded automata, abbreviated LBA) is a restricted form of Turing machine.
New!!: Zero-day (computing) and Linear bounded automaton ·
Linux
Linux (pronounced or, less frequently) is a Unix-like and mostly POSIX-compliant computer operating system (OS) assembled under the model of free and open-source software development and distribution.
New!!: Zero-day (computing) and Linux ·
Malware
Malware, short for malicious software, is any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems.
New!!: Zero-day (computing) and Malware ·
Microsoft
Microsoft Corporation (commonly referred to as Microsoft) is an American multinational technology company headquartered in Redmond, Washington, that develops, manufactures, licenses, supports and sells computer software, consumer electronics and personal computers and services.
New!!: Zero-day (computing) and Microsoft ·
Microsoft Windows
Microsoft Windows (or simply Windows) is a metafamily of graphical operating systems developed, marketed, and sold by Microsoft.
New!!: Zero-day (computing) and Microsoft Windows ·
Network Access Control
Network Access Control (NAC) is an approach to computer security that attempts to unify endpoint security technology (such as antivirus, host intrusion prevention, and vulnerability assessment), user or system authentication and network security enforcement.
New!!: Zero-day (computing) and Network Access Control ·
Network Access Protection
Network Access Protection (NAP) is a Microsoft technology for controlling network access of a computer, based on its health.
New!!: Zero-day (computing) and Network Access Protection ·
Network Admission Control
Network Admission Control (NAC) refers to Cisco's version of Network Access Control, which restricts access to the network based on identity or security posture.
New!!: Zero-day (computing) and Network Admission Control ·
OS X
OS X (pronounced; originally Mac OS X) is a series of Unix-based graphical interface operating systems (OS) developed and marketed by Apple Inc. It is designed to run on Macintosh computers, having been pre-installed on all Macs since 2002.
New!!: Zero-day (computing) and OS X ·
RFPolicy
The RFPolicy states a method of contacting vendors about security vulnerabilities found in their products.
New!!: Zero-day (computing) and RFPolicy ·
Sandbox (computer security)
In computer security, a sandbox is a security mechanism for separating running programs.
New!!: Zero-day (computing) and Sandbox (computer security) ·
Security and safety features new to Windows Vista
There are a number of security and safety features new to Windows Vista, most of which are not available in any prior Microsoft Windows operating system release.
New!!: Zero-day (computing) and Security and safety features new to Windows Vista ·
Simple Mail Transfer Protocol
Simple Mail Transfer Protocol (SMTP) is an Internet standard for electronic mail (email) transmission.
New!!: Zero-day (computing) and Simple Mail Transfer Protocol ·
Software-defined protection
Software-defined Protection (SDP) is a computer networking security architecture and methodology that combines network security devices and defensive protections that leverage both internal and external intelligence sources.
New!!: Zero-day (computing) and Software-defined protection ·
Solaris (operating system)
Solaris is a Unix operating system originally developed by Sun Microsystems.
New!!: Zero-day (computing) and Solaris (operating system) ·
Static program analysis
Static program analysis is the analysis of computer software that is performed without actually executing programs (analysis performed on executing programs is known as dynamic analysis).
New!!: Zero-day (computing) and Static program analysis ·
Sun Microsystems
Sun Microsystems, Inc. was a company that sold:computers, computer components,:computer software, and:information technology services and that created the Java programming language, Solaris Unix and the Network File System (NFS).
New!!: Zero-day (computing) and Sun Microsystems ·
Symantec
Symantec Corporation (commonly known as Symantec) is an American technology company headquartered in Mountain View, California, United States.
New!!: Zero-day (computing) and Symantec ·
Targeted threat
Targeted threats are a class of malware destined for one specific organization or industry.
New!!: Zero-day (computing) and Targeted threat ·
Timeline of computer viruses and worms
This timeline of computer viruses and worms presents a chronology of noteworthy computer viruses, computer worms, Trojan horses, similar malware, related research and events.
New!!: Zero-day (computing) and Timeline of computer viruses and worms ·
TippingPoint
HP TippingPoint’s Intrusion Prevention System (IPS) deals with IT threat protection.
New!!: Zero-day (computing) and TippingPoint ·
United States Computer Emergency Readiness Team
The United States Computer Emergency Readiness Team (US-CERT) is an organization within the Department of Homeland Security’s (DHS) National Protection and Programs Directorate (NPPD).
New!!: Zero-day (computing) and United States Computer Emergency Readiness Team ·
Unix
Unix (all-caps UNIX for the trademark) is a family of multitasking, multiuser computer operating systems that derive from the original AT&T Unix, developed in the 1970s at the Bell Labs research center by Ken Thompson, Dennis Ritchie, and others.
New!!: Zero-day (computing) and Unix ·
Vulnerability
Vulnerability refers to the inability to withstand the effects of a hostile environment.
New!!: Zero-day (computing) and Vulnerability ·
Vulnerability (computing)
In computer security, a vulnerability is a weakness which allows an attacker to reduce a system's information assurance.
New!!: Zero-day (computing) and Vulnerability (computing) ·
Windows Vista
Windows Vista (codenamed Longhorn) is an operating system by Microsoft for use on personal computers, including home and business desktops, laptops, tablet PCs and media center PCs.
New!!: Zero-day (computing) and Windows Vista ·
Zeroday Emergency Response Team
In computer security, the Zeroday Emergency Response Team (ZERT) was a group of volunteer security researchers who produced emergency patches for zero day attack vulnerabilities in proprietary software.
New!!: Zero-day (computing) and Zeroday Emergency Response Team ·
Redirects here:
0-day attack, 0-day exploit, 0day, Day zero attack, Day zero worm, Day zero worms, Next-generation malware, Zero day attack, Zero day exploit, Zero day exploits, Zero day flaw, Zero day threat, Zero day virus, Zero day vulnerability, Zero day worm, Zero day worms, Zero hour attack, Zero-Day Attack, Zero-Day Exploit, Zero-day (software), Zero-day attack, Zero-day exploit, Zero-day malware, Zero-day virus, Zero-day vulnerability.