Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Malicious Code

Handbook of Research on Civil Society and National Security in the Era of Cyber Warfare
Program code intended to perform an unauthorized function or process that will have adverse impact on the confidentiality, integrity, or availability of an information system.
Published in Chapter:
National Security Policy and Strategy and Cyber Security Risks
Olivera Injac (University of Donja Gorica, Montenegro) and Ramo Šendelj (University of Donja Gorica, Montenegro)
DOI: 10.4018/978-1-4666-8793-6.ch002
Abstract
This chapter gives explanation on theoretical framework of the national security policy and strategy. Moreover, it analyzes selected countries approaches to cyber security in national policy and how countries build their capacities to face with risks, and address objectives in some cyber security policies. Also, in this chapter are described different sorts and sources of cyber threats, techniques of cyber attacks and frequently used tools (software and hardware) by cyber attackers. In addition, according with Symantec's and Kaspersky's annual report about Internet security threats for 2014, were analyzed the most important cyber threats and attacks during 2013. Furthermore, the chapter shows organization structure of cyber security system of Montenegro, statistical analysis of users activities in cyber space and cyber incidents that happened in Montenegro during 2014.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Cybersecurity Laws in Malaysia
Computer code often used by hackers to infiltrate a computer to cause damage and security vulnerabilities.
Full Text Chapter Download: US $37.50 Add to Cart
Auditing Defense against XSS Worms in Online Social Network-Based Web Applications
Code which looks legitimate but performs some unwanted actions and produce harmful effects like data leakage.
Full Text Chapter Download: US $37.50 Add to Cart
BDS: Browser Dependent XSS Sanitizer
It is such type of code which looks like a legitimate one but it is intended to produce undesirable results (like stealing cookies or credit card numbers etc.).
Full Text Chapter Download: US $37.50 Add to Cart
Online Social Networks Misuse, Cyber Crimes, and Counter Mechanisms
Malicious code is the term used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR