Penggodam (keselamatan komputer): Perbezaan antara semakan

Kandungan dihapus Kandungan ditambah
Shahru (bincang | sumb.)
Shahru (bincang | sumb.)
Baris 34:
* [[Computer worm|Worm]] — Like a virus, a worm is also a self-replicating program. The difference between a virus and a worm is that a worm does not create multiple copies of itself on one system and that it propogates itself through computer networks. After the comparison between computer viruses and biological viruses, the obvious comparison here is to a [[bacterium]]. Many people conflate the terms "virus" and "worm", using them both to describe any self-propagating program. It is possible for a program to have the blunt characteristics of both a worm and a virus.
* [[Vulnerability scanner]] — A tool used to quickly check computers on a network for known weaknesses. Hackers also use [[port scanner]]s. These check to see which ports on a specified computer are "open" or available to access the computer. (Note that [[Firewall (networking)|firewalls]] defend computers from intruders by limiting access to ports/machines both inbound and outbound.)
* [[Sniffer]] — AnAplikasi applicationyang thatmenyaring captureskata passwordlalauan and otherdan data while it islain insemasa transitia eitherdalam withinpemindahan thesamada computerdalam orkomputer overataupun thediatas networkrangkaian.
* [[Exploit (computer security)|Exploit]] — AAplikasi preparedyang applicationdisediakan thatuntuk takesmengambil advantagepeluang ofatas akelemahan knownsistem weaknessyang telah diketahui.
* [[Social engineering (computer security)|Social engineering]] — UsingMenggunakan manipulationkepakaran skillsdalam inmanipulasi orderuntuk tomendapatkan obtainsesuatu somebentuk form of informationmaklumat. An example would beSebagai askingcontoh someonemenanyakan forkata theirlaluan passwordatau orakaun accountseseorang possiblyhanya overdengan asegelas beerbir oratau bydengan posingmenyamar assebagai someoneorang elselain.
* [[Root kit]] — A toolkit for hiding the fact that a computer's security has been compromised. Root kits may include replacements for system binaries so that it becomes impossible for the legitimate user to detect the presence of the intruder on the system by looking at [[process table]]s.