Upload
juniper-networks
View
217
Download
0
Embed Size (px)
Citation preview
8/3/2019 Glossary of Mobile Malware Terms
http://slidepdf.com/reader/full/glossary-of-mobile-malware-terms 1/2
Glossary of Terms
Antivirus: sof tware that is used to prevent, detect, and remove malware, including but not limited to viruses, worms, tro jans,
spyware, and adware.
APK: android package (e.g., “f ilename.apk ”), a pack aging f ile format for the android mobile operating system.
Botnet: a collection of software agents, robots, or “zombies” that run autonomously and automatically, typically overtaken
by hackers to perform malicious operations.
Buffer Overflow (also known as buff er overrun): an anomaly where a program, while writing data to a buff er, overruns the
buff er’s boundary and overwrites ad jacent memory. buff er overflows can be triggered by inputs that are designed to execute
code oralter the way the program operates. This may result in erratic program behavior, including memory access errors,
incorrect results, a crash, or a breach of system security.
CERT: Computer emergency r esponse Team.
Cydia: apple ios application that allows users to locate and download apps for jailbrok en iphones and ipads.
Denial of Service (DoS): an attack which attempts to make a computer or mobile device resource unavailable to its
intended users or for its intended use.
Data Encryption Standard (DES): a block cipher that uses shared secret encryption.
Hypertext Transfer Protocol (HTTP): a network ing protocol for distributed, collaborative, hypermedia inf ormation systems.
hTTp is the f oundation of data communication for the World Wide Web.
Jailbrok en: an apple iphone or ipad that has had its apple ios operating system covertly “unlock ed” to gain full root access,
removing all apple imposed limitations on applications, and essentially exposing all of an application’s f eatures.
Keylogging: Keystrok e logging or the action of track ing (or logging) the keys struck on a k eyboard, typically in a covert
manner so that the person using the keyboard is unaware that actions are being monitored. There are numerous k eylogging
methods, ranging f rom hardware and sof tware-based approaches to electromagnetic and acoustic analysis.
Malware: short for malicious sof tware, a general term used by computer prof essionals to mean a variety of forms of hostile,
intrusive, or annoying software or program code.
Multimedia Messaging Service (MMS): a standard way to send messages that include multimedia content to and from mobile
devices. MMs extends the coresMs capability that allows exchange of text messages only up to 160 characters in length.
Phishing: away of attempting to acquire sensitive inf ormation such as usernames, passwords, and credit card details by
masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social
websites, auction sites, online payment processors, or IT administrators are commonly used to lure unsuspecting users.
Premium Rate Numbers: a billing mechanism that allows providers tobill consumers f or services via sMs, MMs, Wap
content, or video services. It is usually a 5-digit number that charges the consumer a specif ic amount that is then deposited
in the account of the premium rate number owner.
Rootk it: Malware that lurks camouflaged from anti-malware software and administrators by circumventing or interrupting
standard operating system or other application f unctionality, allowing unseen and unwanted privileged access to a device.
Sandbox: a security mechanism for separating running programs.
Secure Digital (SD): a non-volatile memory card format developed by the sD Cardassociation for use in portable devices.
Short Message Service (SMS): The text communication service component of phone, Web, or mobile communication
systems, using
standardized
communications
protocols that allow
the exchange of short text
messages
between
f ixed
line
and mobile devices.
Secure Shell (SSH): anetwork protocol that allows data to be exchanged using a secure channel between two networked
devices. The two ma jor versions of the protocol are ref erred to as ssh1 (or ssh-1), and ssh2 (or ssh-2). used primarily on
linux and unix-based systems to access shell accounts, ssh was designed as a replacement for Telnet and other insecure
remote shells, which send inf ormation, notably passwords, in plain text, rendering them susceptible to packet analysis.
Spyware: a type of malware that collects inf ormation and makes it available, usually secretly, to a third party. The presence
of spyware is typically hidden from the user and can be diff icult to detect.
Copyright © 2011, Juniper Network s, Inc.
8/3/2019 Glossary of Mobile Malware Terms
http://slidepdf.com/reader/full/glossary-of-mobile-malware-terms 2/2
Glossary of Mobile Malware Term
Tro jan: shortened from the Tro jan horse story in history, software that appears to perform a desirable f unction while
containing malicious and / or undesirable elements.
Virus Def inition / Signature: a unique string of bits, or the binary pattern of the machine code of a virus. The term “virus
def initions” typically refers to the database of all current virus signature f iles used by a particular antivirus software for virus
detection. Virus def initions are the primary method of detection for most antivirus software programs.
Wireless Application Protocol (WAP): an open international standard; commonly used Web browser for small mobile
devices such as cell phones or smartphones.
Zombie: an Internet connected mobile device that has been compromised by a virus or tro jan that can be used to perform
malicious task s under remote direction, usually from a botnet.