1 Inleiding in de ESET-woordenlijst 1 ......................................................................................................
1.1 Adware 1 ......................................................................................................................................
1.2 Botnet 1 .......................................................................................................................................
1.3 Vals-positief 2 ...............................................................................................................................
1.4 Compressiesoftware 2 ...................................................................................................................
1.5 Potentieel onveilige toepassingen 2 ................................................................................................
1.6 Potentieel ongewenste toepassingen 2 ............................................................................................
1.7 Ransomware 7 ..............................................................................................................................
1.8 Rootkit 7 ......................................................................................................................................
1.9 Return-oriented programming 8 ......................................................................................................
1.10 Spyware 8 ..................................................................................................................................
1.11 Trojaans paard 8 .........................................................................................................................
1.12 Virus 9 .......................................................................................................................................
1.13 Worm 9 ......................................................................................................................................
1.14 Credential stuffing 10 ..................................................................................................................
1.15 DNS Poisoning 10 ........................................................................................................................
1.16 DoS-aanval 10 .............................................................................................................................
1.17 ICMP-aanval 10 ...........................................................................................................................
1.18 Port Scanning 11 .........................................................................................................................
1.19 SMB Relay 11 ..............................................................................................................................
1.20 TCP-desynchronisatie 12 ..............................................................................................................
1.21 Wormaanval 12 ...........................................................................................................................
1.22 ARP-cachevergiftiging 12 .............................................................................................................
2 E-mailbedreigingen 12 .........................................................................................................................
2.1 Advertenties 13 ............................................................................................................................
2.2 Nepmeldingen 13 ..........................................................................................................................
2.3 Phishing 14 ..................................................................................................................................
2.4 Spam herkennen 14 ......................................................................................................................
2.4 Regels 15 .................................................................................................................................
2.4 Witte lijst 15 ..............................................................................................................................
2.4 Zwarte lijst 15 ............................................................................................................................
2.4 Uitzondering 16 ..........................................................................................................................
2.4 Controle vanaf de server 16 .............................................................................................................
2.5 Geavanceerde geheugenscanner 16 ................................................................................................
2.6 Veilig internetbankieren 17 ............................................................................................................
2.7 Botnetbeveiliging 17 .....................................................................................................................
2.8 DNA-detecties 17 ..........................................................................................................................
2.9 ESET LiveGrid® 18 ........................................................................................................................
2.10 Exploit Blocker 19 .......................................................................................................................
2.11 Java Exploit Blocker 19 ................................................................................................................
2.12 ESET LiveSense 19 ......................................................................................................................
2.13 Zelflerend systeem 20 .................................................................................................................
2.14 Netwerkaanvalbeveiliging 21 ........................................................................................................
2.15 Ransomware Shield 21 .................................................................................................................
2.16 Beveiliging tegen aanvallen met scripts 21 ....................................................................................
2.17 Beveiligde browser 21 .................................................................................................................
2.18 UEFI-scanner 22 ..........................................................................................................................
2.19 Canary-bestand 22 ......................................................................................................................
2.20 Patstelling 23 .............................................................................................................................