The IT Law Wiki
No edit summary
 
(14 intermediate revisions by 2 users not shown)
Line 1: Line 1:
  +
== Definitions ==
{{stub}}
 
   
  +
'''Malicious code''' (also called '''malicious software''' or '''[[malware]]''') is
   
'''Malicious code''' is “[[software|[s]oftware]] or my mom is 82[[firmware]] or i am the cow lord molester intended to perform an unauthorized process that will have adverse impact on the [[confidentiality]], [[integrity]], or availability of an [[information system]].<ref>Comm. on Nat’l Security Sys., National Information Assurance Glossary 39 (Inst. No. 4009 (2006)).</ref>
+
{{Quote|[[program code|[p]rogram code]] intended to perform an [[unauthorized]] function or [[process]] that will have adverse [[impact]] on the [[confidentiality]], [[integrity]], or [[availability]] of an [[information system]].<ref>NICCS, Explore Terms: A Glossary of Common Cybersecurity Terminology ([http://niccs.us-cert.gov/glossary#letter_m full-text]).</ref>}}
   
  +
{{Quote|[[Rogue program|[r]ogue computer programs]] designed to inflict a magnitude of harm by diminishing the [[confidentiality]], [[integrity]], and [[availability]] of [[information system]]s and [[information]].<ref>[[Tax Information Security Guidelines For Federal, State and Local Agencies]], at 154.</ref>}}
Malicious code, such as [[virus]]es or [[Trojan horse]]s, are used to [[infect]] a [[computer]] to make it available for takeover and remote control. Malicious code can [[infect]] a [[computer]] if the [[user]] opens an [[email]] attachment, or [[click]]]s an innocent-looking [[link]] on a [[website]]. Malicious code can scan a victim’s [[computer]] for [[sensitive information]], such as name, address, place and date of birth, [[social security number]], mother’s maiden name, and telephone number.
 
   
  +
{{Quote|[[software|[s]oftware]] or [[firmware]] intended to perform an [[unauthorized]] [[process]] that will have adverse impact on the [[confidentiality]], [[integrity]], or [[availability]] of an [[information system]]. A [[virus]], [[worm]], [[Trojan horse]], or other [[code]]-based entity that [[infect]]s a [[host]]. [[Spyware]] and some forms of [[adware]] are also examples of malicious code.<ref>[[CNSSI 4009]].</ref>}}
== References == my mom is 82
 
  +
  +
{{Quote|[[software]], for example, a [[virus]], designed to damage or [[disrupt]] a [[system]].<ref>45 C.F.R. §164.304.</ref>}}
  +
  +
== Overview ==
  +
 
Malicious code, such as [[virus]]es or [[Trojan horse]]s, are used to [[infect]] a [[computer]] to make it available for takeover and [[remote control]]. Malicious code can [[infect]] a [[computer]] if the [[user]] opens an [[email]] attachment, or [[click]]s an innocent-looking [[link]] on a [[website]]. Malicious code can scan a victim’s [[computer]] for [[sensitive information]], such as name, address, place and date of birth, [[social security number]], mother’s maiden name, and telephone number.
  +
  +
Malicious software can result in [[performance degradation]], loss of [[system availability]], and the [[data capture|capture]], [[modification]], or [[deletion]] of [[data]].
  +
 
== References ==
 
<references />
 
<references />
   
 
== See also ==
 
== See also ==
   
  +
<div style="{{column-count|2}}">
* [[Malware]]
 
   
  +
* [[Backdoor]]
  +
* [[Malicious applet]]
  +
* [[Malicious application]]
  +
* [[Malicious Software (Malware): A Security Threat to the Internet Economy]]
 
* [[Malware]]
 
* [[Trojan horse]]
 
* [[Trojan horse]]
 
 
* [[Virus]]
 
* [[Virus]]
 
 
* [[Worm]]
 
* [[Worm]]
   
  +
</div>
 
[[Category:Software]]
 
[[Category:Software]]
  +
[[Category:Cybercrime]]
  +
[[Category:Malware]]
  +
[[Category:Definition]]

Latest revision as of 04:53, 16 November 2014

Definitions[]

Malicious code (also called malicious software or malware) is

[p]rogram code intended to perform an unauthorized function or process that will have adverse impact on the confidentiality, integrity, or availability of an information system.[1]
[r]ogue computer programs designed to inflict a magnitude of harm by diminishing the confidentiality, integrity, and availability of information systems and information.[2]
[s]oftware or firmware intended to perform an unauthorized process that will have adverse impact on the confidentiality, integrity, or availability of an information system. A virus, worm, Trojan horse, or other code-based entity that infects a host. Spyware and some forms of adware are also examples of malicious code.[3]
software, for example, a virus, designed to damage or disrupt a system.[4]

Overview[]

Malicious code, such as viruses or Trojan horses, are used to infect a computer to make it available for takeover and remote control. Malicious code can infect a computer if the user opens an email attachment, or clicks an innocent-looking link on a website. Malicious code can scan a victim’s computer for sensitive information, such as name, address, place and date of birth, social security number, mother’s maiden name, and telephone number.

Malicious software can result in performance degradation, loss of system availability, and the capture, modification, or deletion of data.

References[]

  1. NICCS, Explore Terms: A Glossary of Common Cybersecurity Terminology (full-text).
  2. Tax Information Security Guidelines For Federal, State and Local Agencies, at 154.
  3. CNSSI 4009.
  4. 45 C.F.R. §164.304.

See also[]