Terms


 * Air Gap || a security measure often taken for computers and computer networks that must be extraordinarily secure  ||
 * Antispyware || Software used to detect spyware  ||
 * Asymmetric Key  || 2 keys (1 is public and 1 is private). They are nonreversable. The public key only to enrypt. ( 1 way) The private key decrypts the data. Protect the private key!!!!  ||
 * Authentication || The act of establishing or confirming something  ||
 * Authenticity || Ensuring that data, transaction, communications, or documents are genuine  ||
 * Availability || The information must be available when it is needed.  ||
 * Backdoor || A longon not using normal program  ||
 * Biometrics || Methods used to uniquly recognize people (fingerpringts)  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">BIOS || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Basic Input Output System  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Boot Sector Virus || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">A virus that affects the boot sector (a portion of storage set aside for start up)  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Botnet || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">A collection of zombies which launch a DDOS  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 12pt;">Brute Force || <span style="color: black; font-family: Arial,sans-serif; font-size: 12pt;">Trying to hack a password by trying every possible combination of symbols  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Certificate Authority || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">An entity that issues digital certificates  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Chain of custody || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">documentation showing a seizure, custody, control, transfer, analysis, and disposition of evidence  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Chief Information Security Officer (CISO) || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">a high level security officer  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Cipher || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">transformations of plaintext.A cipher is a an algorithm for performing encryption or decryption.  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Confdentiality || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Term used to prevent the disclosure of information to unauthorize individuals or systems/  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">cookie || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">A piece of text stored by a user's web browser  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">crawler || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Goes and checks every web server. It is an automatci software.  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Cryptography  || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">the practing and stuyd of hiding information  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Data Encryption Standard (DES) || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">A block cipher that uses shared secret encryption  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Data Leakage || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">the loss or control over data  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Data Theft || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">stealing data  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">DHCP || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Assigns the IP address  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Distrubted Denial of Service Attacks (DDOS) || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">When hackers send tons of pings to a server so that legitimate users can not access the service (website)  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Ditigal Certificates || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">An electronic document which uses a digital signature to bind together a public key with an identity  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Domain Name System (DNS) || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">A naming system for computer services  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Dongle || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Hardware that connects to for copy protection  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">DOS (Disk Operating System) || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">An Operating System  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Dynamic Host Configuration Protocol (DHCP) || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">An auto configuration protocol used on IP networks  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">End-to end || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Information can go from client to webserver securely  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Exploit || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">The means of the attack  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Failover || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">the capability to switch over automatically to redudant or standby computer server, system,or nework upon failure   ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Failsafe || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">In the event of failure, the minimal amount of harm is done  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Filter || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">A computer program to process a data stream  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">firewall || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">A part of a computer or network that is desigend dto bloc unauthorized access while permitting authorized communications  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">handshaking || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">the process of establishes the parameters of communications between two devices  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Hardware || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">The physical components of a computers  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Hash || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">values used in computer security in order to encrypt text.  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Hypertext Transfer Protocol || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">A networking protocol for distibuted, collaborative, hypermedia information  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Hypertext Transfer Protocol Secure (HTTPS) || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">A combination of HTTP with the SSL/TLS protocol to provide encrypted communication and secure indentification of a network web server  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Identity Based Access Controls (IBAC) || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">cotnrols set up for individual users  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Identity Theft || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">stealing personal identifiers  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Information System || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Hardware, Software, Information, People, Procedure  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Integrity || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Data cannot be modified undetectably  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Internet Protcol  || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">The principla communications protocol used for relaying packets across an intenetwork.  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Intrusion Detection System || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">software and/or hardward design to detect unwanted attempts at accessing, manipulating, and/or disabling of a computer system, mainly through a newtwork, such as the Internet  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">IP address || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">A numerical label assigned to each device participating in network  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Keylogger || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">the action of tracking (or loggin) he key struck on a keyboard, typically in a covert manner  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Logic Bombs || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Malware executed under a given condition  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">MAC Address || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">A unique number that belongs to the NIC   ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Malware || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">software designed to secretly access your computer. Malware includes viruses, worms, Trojans, rootkits, spyware, ect.  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Man in the middle Attack || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">An attack in which the hacker obtains information when it is being transmitted  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Mandatory Access Controls || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Set up controls  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">MD5  || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Hashes are numerical code that encrypts data.  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Media Access Control (MAC)  || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">A Unique identifier assigned to network interfaces for communciation on the physical network segment  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">NAT || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Network Address Translation  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">netstat || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">a command line tool that displace network connections  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">networks  ||  A collection of coputers  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Non-repudiation || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">One party cannot deny having received a transaction or can they deny the other party having sent the transaction.  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Operating System || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Programs of data that runs on computers and manages the computer hardware and provides common services for efficient execution of various application software  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Packet sniffers  || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">intercept and log traffic passing over a network  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Packet switching || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">a method that groups all transmitted da  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Passive Scanning || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">War driving is an example of war driving  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 12pt;">Passphrase || <span style="color: black; font-family: Arial,sans-serif; font-size: 12pt;">A sequence that makes sense to you and no one else  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">PAT || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Port Address Translation (share 1 external IP)  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">payload  || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">malware caused by a virus or other malicious code executed by the exploit on the target computer. It may move, alter, overwrite, delete file, or commit othe destructive activity.   ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Personal Identifiers ||  DOB, SSN, DL #, unique identifiers for people  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">PGP (Pretty Good Privacy) || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Sottware for encryption  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Phishing || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">The act of getting data by asking for it  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Ports || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">a physical interface between a computer and other computers or device  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Privledge Escalation || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Coming into a network under a restriction and gaining higher priviledges  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Public Key Encryption  || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Scrabbles the algorithm with RSA. It is a key  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Public Key Infrastructure (PKI) || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">A set of hardware, software, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 12pt;">Rainbow Table || <span style="color: black; font-family: Arial,sans-serif; font-size: 12pt;">list of passwords up to a certain length  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Redundancy || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Saving the same information in multiple places  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Risk Management  || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">The identification, assesment, and priotitization of risks  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Role Bases Access Controls (RBAC) || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">controls set up for user groups  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Root Kits || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Change the system software, making the attack invisible  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Router || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">An electronic device that interconnects two or more computer networks  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Safe Mode || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Booting up a computer in a minimal amount of devices  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Sandboxing ||  A security mechanism for separatingi running programs  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">script || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Program language that allows control of one or more software application  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">SDK (software development kit) || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Used to write software  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Secure Sockets Layer (SSL) || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">cryptographic protolcol that provides secure communication  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Sidejacking || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">An attack in which an attacker uses packet sniffing to read networking between two parties to steal the session cokies  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">SMS  || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Short Message Service  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Social Engineering || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Talking people into giving away information  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Software || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Collection of computer programs and related data that provides the instructions telling a computer what to do  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Spam || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Unwanted emails sent to solicated information indiscriminately  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Spoofing || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">falsying network information  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Spyware || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">A type of malware that can be installed on computers and collects little bits of information at a time about the users without their knowledge  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">SSID || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">The beacon broadcast by public service providers (a public establishment)  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Standard Operating Procedures(SOP) || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Establishes guidelines to follow  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Symmetric key cipher || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Can be hacked by brute force attacks. To make is safe, make it a long number. Good for stored information.  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">System Analysis || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Solving a problem for business with IT  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Telnet || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">A network protocol used on the internet   ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Threat Agents || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Cause of the threat (attack)  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Time Bombs || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Malware triggered by a date  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Time to Live (TTL) || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">packets is a limit on the period of time or number of iterations or transmissions in a computer and computer network technology that a unit of data (a packet) can experience before it should be discarded.   ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Tokens || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">A device that authorizes a user  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Tracert (tracing route) || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">used to show the route taken by packets across an IP network.  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Transmission Control Protocol (TCP) || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">corrects the errors and **__Internet__ __Protocol (IP)__** finds the address  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Trojans || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">malware, often sent through email/web links that offer attractive objects, then infect the computer with a virus (software)  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Virtual Private Network || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Made private by encryption (tunnel)  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Virus || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">A self-copying program that overwrites storage  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">War Driving || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Roaming around looking for vulnerable access points  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Web browser || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">A software application fro retrieving, presenting, and traversing information resources on the world wide web  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Web Server || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Hardware or softear that helps to deliver content that can be accessed through the internet  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Whalling || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">The target (phising) of a CISO  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Wired Equivelent Privacy (WEP || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">an attempt to make a private network  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Wireless Access Point (WAP) || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">A device that allows wired communication devices to connect to a wireless network using Wi-Fi.  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Worm || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Spreads across networks automatically  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Zero-Day Exploit || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Brand new, signiture of that has not been detected  ||
 * <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Zombie || <span style="color: black; font-family: Arial,sans-serif; font-size: 10pt;">Takes remote control of a victim PC  ||