1 Introduktion till ESET:s ordlista 1 .........................................................................................................
1.1 Reklamprogram 1 ..........................................................................................................................
1.2 Botnet 1 .......................................................................................................................................
1.3 Falsk positiv (FP) 1 ........................................................................................................................
1.4 Packer 2 .......................................................................................................................................
1.5 Potentiellt farliga program 2 ..........................................................................................................
1.6 Potentiellt oönskade program 2 ......................................................................................................
1.7 Ransomware 6 ..............................................................................................................................
1.8 Rootkit 7 ......................................................................................................................................
1.9 Return-Oriented Programming 7 .....................................................................................................
1.10 Spionprogram 7 ..........................................................................................................................
1.11 Trojan 8 ......................................................................................................................................
1.12 Virus 8 .......................................................................................................................................
1.13 Mask 9 .......................................................................................................................................
1.14 Credential stuffing 9 ....................................................................................................................
1.15 DNS-förgiftning 9 ........................................................................................................................
1.16 DoS-attack 10 .............................................................................................................................
1.17 ICMP-attack 10 ...........................................................................................................................
1.18 Portgenomsökning 10 ..................................................................................................................
1.19 SMB-relä 10 ................................................................................................................................
1.20 TCP-desynkronisering 11 ..............................................................................................................
1.21 Maskattack 11 ............................................................................................................................
1.22 ARP-cacheattack 11 .....................................................................................................................
2 E-posthot 12 .........................................................................................................................................
2.1 Annonser 12 .................................................................................................................................
2.2 Bluffar 12 .....................................................................................................................................
2.3 Nätfiske 13 ...................................................................................................................................
2.4 Känna igen spambedrägerier 13 .....................................................................................................
2.4 Regler 14 .................................................................................................................................
2.4 Vitlista 14 .................................................................................................................................
2.4 Svartlista 14 ..............................................................................................................................
2.4 Undantag 15 ..............................................................................................................................
2.4 Kontroll på serversidan 15 ...............................................................................................................
2.5 Avancerad minnesskanner 15 .........................................................................................................
2.6 Bank- & betalskydd 15 ...................................................................................................................
2.7 Botnetsskydd 16 ...........................................................................................................................
2.8 DNA-detekteringar 16 ....................................................................................................................
2.9 ESET LiveGrid® 17 ........................................................................................................................
2.10 Kryphålsblockering 17 .................................................................................................................
2.11 Java-kryphålsblockering 18 ..........................................................................................................
2.12 ESET LiveSense 18 ......................................................................................................................
2.13 Maskininlärning 18 ......................................................................................................................
2.14 Skydd mot nätverksattacker 19 ....................................................................................................
2.15 Skydd mot ransomware 19 ...........................................................................................................
2.16 Skydd mot skriptbaserade attacker 19 ..........................................................................................
2.17 Säker webbläsare 20 ...................................................................................................................
2.18 UEFI-skanner 20 ..........................................................................................................................
2.19 Kanariefil 21 ...............................................................................................................................
2.20 Baklås 21 ...................................................................................................................................