Principles of Information Security
Brownout
A long term decrease in electrical power availability.
Surge
A long term increase in electrical power availability.
Blackout
A long term interruption or outage in electrical power availability.
Trojan Horse
A malware program that hides its true nature and reveals its designed behavior only when activated.
Polymorphic threat
A malware, a virus, or a worm that, over time, changes the way it appears to anti-virus software programs, making it undetectable by techniques that look for pre-configured signatures.
Sag
A short term decrease in electrical power availability.
Spike, a Swell
A short term increase in electrical power availability.
Fault
A short term interruption in electrical power availability.
Virus
A type of malware that is attached to other executable programs. When activated, it replicates and propagates itself to multiple systems, spreading by multiple communications vectors.
Worm
A type of malware that is capable of activation and replication without being attached to an existing program.
Boot virus, or boot sector virus
A type of virus that targets the boot sector, or master boot record, or a computer system's hard drive or removable storage media.
Macrovirus
A type of virus written in a specific macro language to target applications that use the language. It typically affects documents, slide shows, emails, or spread sheets created by Office Suite applications.
Memory-resistant virus, or resident virus
A virus that is capable of installing itself in a computer's operating system starting when the computer is activated and residing in the system's memory, even after the host application is terminated.
Zero-day attack
An attack that makes use of malware that is not yet known by the anti-malware software companies.
Spyware
Any technology that aides in gathering information about people or organizations without their knowledge.
Adware
Malware intended to provide undesired marketing and advertising, including popups and banners on a user's screen.
Shoulder surfing
The direct, covert observation of individual information or system use.
Noise
The presence of additional and disruptive signals in network communications or electrical power delivery.
Trespass
Unauthorized entry into the real or virtual property of another party.
Electrostatic discharge, or Static Electricity
When it comes into contact with technology, especially computer