Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

malware

Abbreviation(s) and Synonym(s):

Malicious Code
malicious code and malicious logic
Malware

Definition(s):

  Software or firmware intended to perform an unauthorized process that will have adverse impact on the confidentiality, integrity, or availability of an information system. A virus, worm, Trojan horse, or other code-based entity that infects a host. Spyware and some forms of adware are also examples of malicious code.
Source(s):
NIST SP 800-53 Rev. 4 under Malicious Code
CNSSI 4009-2015 under malicious code (NIST SP 800-53 Rev. 4)
NISTIR 7621 Rev. 1 under Malware (NIST SP 800-53 Rev. 4 - “Malicious Code”)

  Hardware, firmware, or software that is intentionally included or inserted in a system for a harmful purpose.
Source(s):
CNSSI 4009-2015 under malicious logic (IETF RFC 4949 Ver 2)

  Software or firmware intended to perform an unauthorized process that will have adverse impact on the confidentiality, integrity, or availability of an information system. A virus, worm, Trojan horse, or other code-based entity that infects a host. Spyware and some forms of adware are also examples of malicious code.
Source(s):
NIST SP 800-53 Rev. 4 under Malicious Code

  Software or firmware intended to perform an unauthorized process that will have adverse impact on the confidentiality, integrity, or availability of a system. A virus, worm, Trojan horse, or other code-based entity that infects a host. Spyware and some forms of adware are also examples of malicious code.
Source(s):
NIST SP 800-12 Rev. 1 under Malicious Code (NIST SP 800-53)
NIST SP 800-171 Rev. 1 under malicious code

  A program that is written intentionally to carry out annoying or harmful actions, which includes Trojan horses, viruses, and worms.
Source(s):
NIST SP 800-28 Version 2 under Malicious Code

  See Malicious Code.
Source(s):
NIST SP 800-12 Rev. 1 under Malware (NIST SP 800-53)
NIST SP 800-53 Rev. 4 under Malware

  Software or firmware intended to perform an unauthorized process that will have adverse impact on the confidentiality, integrity, or availability of an information system. A virus, worm, Trojan horse, or other code-based entity that infects a host. Spyware and some forms of adware are also examples of malicious code (malware).
Source(s):
NIST SP 800-82 Rev. 2 under Malware (NIST SP 800-53)

  Software designed and operated by an adversary to violate the security of a computer (includes spyware, virus programs, root kits, and Trojan horses).
Source(s):
NIST SP 800-152 under Malware

  A program that is inserted into a system, usually covertly, with the intent of compromising the confidentiality, integrity, or availability of the victim’s data, applications, or operating system or of otherwise annoying or disrupting the victim.
Source(s):
NIST SP 800-137 under Malware (NISTIR 7298)
NIST SP 800-28 Version 2 under Malware
NIST SP 800-45 Version 2 under Malware

  See malicious code and malicious logic.
Source(s):
CNSSI 4009-2015

  See “Malware.”
Source(s):
NIST SP 800-114 under Malicious Code [Superseded]

  See “Malware”.
Source(s):
NIST SP 800-69 under Malicious Code

  Software or firmware intended to perform an unauthorized process that will have adverse impact on the confidentiality, integrity, or availability of an information system. A virus, worm, Trojan horse, or other code-based entity that infects a host.  Spyware and some forms of adware are also examples of malicious code.
Source(s):
NIST SP 800-128 under Malicious Code (NIST SP 800-53)

  A computer program that is covertly placed onto a computer with the intent to compromise the privacy, accuracy, or reliability of the computer’s data, applications, or OS. Common types of malware threats include viruses, worms, malicious mobile code, Trojan horses, rootkits, and spyware.
Source(s):
NIST SP 800-114 under Malware [Superseded]

  A computer program that is covertly placed onto a computer with the intent to compromise the privacy, accuracy, or reliability of the computer’s data, applications, or operating system.
Source(s):
NIST SP 800-69 under Malware

  A virus, worm, Trojan horse, or other code-based malicious entity that successfully infects a host.
Source(s):
NIST SP 800-61 Rev. 2 under Malware

  A program that is covertly inserted into another program with the intent to destroy data, run destructive or intrusive programs, or otherwise compromise the confidentiality, integrity, or availability of the victim’s data, applications, or operating system.
Source(s):
NIST SP 800-83 Rev. 1 under Malware

  See Malicious Code.
Source(s):
NIST SP 800-128 under Malware
NIST SP 800-53 Rev. 4 under Malware