Adware – Adware is a software designed to force pre-chosen ads to display on your system.Adware is the name given to programs that are designed to display advertisements on your computer, redirect your search requests to advertising websites and collect marketing-type data about you
Attack – An attack is an action that is done on a system to get access and extract sensitive data.
Back door – A back door,or tap door, is a hidden entry to a computing devices or software that bypasses security measures,such as login and password protection.
Bot – A bot is a program that automates an action so that it can be done repeatedly at a much higher rate for a more sustained period than a human operator could do it.For example,sending HTTP,FTP or Talnet at a higher rate of calling script to create objects at a high rate.
Botnet – A botnet,also known as zombie army,is a group of computer controlled without owners knowledge.Botnet are used to send spam or make denial of services attacks.
Brute Force Attack – A Brute force attack is an automated and the simplest kind of method to gain access to a system or website.It tries different combination of usernames and password, over and over again ,until it gets in.
Buffer OverFlow – Buffer Overflow is flaw that is occurs,when more data is written to a block of a memory,or buffer,that the buffer is allocated to hold.
Clone phishing – Clone phishing is the modification of an existing ,legitimate email with a false link to trick the recipient into providing personal information.
Cracker – A cracker is one who modifies the software to access the features which are considered undesirable by the person cracking the software,especially copy protection features.
Denial of services attack (DOS) – A denial of services attack is malicious attempt to make a server or a network resource unavailable to users, usually by temporarily interrupting or suspending the services of host connected to the Internet.
DDoS – Distributed denial of services attack
Exploit Kit – An exploit kit is a software system designed to run on web server ,with the purpose of identifying software vulnerabilities in client machines communicating with it and exploiting discovered vulnerabilities to upload execute malicious code on client.
Exploit – Exploit is a piece of software, a chunk of data,or a sequence of commands that takes advantages of a bug or vulnerability to compromise that security of a computer network system.
Firewall – A Firewall is a filter designed to keep unwanted intruders outside a computer system or network while allowing safe communication between systems and users on the inside of a firewall.
Keystroke – Keystroke logging is the process of tracking the keys which are pressed on a computer (and which touchscreen points are user).It is simply the map of a computer/human interface.It is used by grey and black hat hackers to record login IDs and password onto a device using a Trojan delivered by phishing email.
Logic bomb – A Virus secreted into a system that triggers a malicious action when certain conditions are met.The most common version is time bomb.
Malware – Malware is an umbrella term used to refer to a verity of forms of hostile or intrusive software,including viruses,worms,Trojan Horses, Rensomware,spyware,adware,screware and other malicious programs.
Master Program – A master program is a program a black hat hackers uses to remotely transmit commands to infected zombie drones,normally to carry out Denial of services attack or spam attack.
Phishing – Phishing is an e-mail fraud method in which the prepertrator send out legitimate-looking emails,in an attempt to gather personal and financial information from recipients.
Phreaker – Phreakers are considered the original computer hackers and they are those who break into the telephone network illegally,typically to make free long distance phone calls to tap phones lines.
Rootkil – Rootkil is a stealthy type of software,typically malicious,designed to hide the distance of certain process of program from normal methods of detection and enables continued privileged access of computer.
Social Engineering – Social engineering implies deceiving someone with the purpose of acquiring sensitive and personal information,like credit card detail ,user name and password etc.
Spam – A Spam is simply an unsolicited email,also known as junk email,send to a large number of recipients without their consent.
Spyware – Spyware is a software that aims to gather information about a person or organization without their knowledge and that may send such information to another entity without the customer consent, or that asserts control over a computer without the consumers knowledge.
SQL Injection – SQL injection is an SQL code injection technique used to attack data driven applications ,in which malicious SQL statements are inserted into the entry field for executions .
Threat – A threat is a possible danger that can be exploit the existing bug to a compromise the security to a computer or network system.
Trojan – A Trojan or a Trojan Horse ,is a malicious program disguised to look like a valid program, making it difficult to disguinsh from program that are supposed top be there designed with the intention to destroy files,alter information,steal password or other information.
Virus – A Virus is a malicious program or a piece of code which is capable of copying itself and typically has a detrimental effect,such as corrupting the system or destroying data.
Worms – A worm is a self replicating virus that does not alter files but resides in active memory and duplicate itself.
Zombie Drone – A Zombie drone is a defined as hi-jacked computer that is being used anonymously as a soldier or ” drone “for malicious activity,for example, distributing unwanted spam e-mails