Malicious Data definition

Malicious Data. Harmful or illegal content (including but not limited to computer viruses, worms, trojan horses, time bombs, or any other harmful programs or components), either (i) submitted by Customer to the Software; or (ii) created by Customer in the course of using the Software.

Examples of Malicious Data in a sentence

  • Khargonekar, “Smart Grids Cyber-Physical Security as a Malicious Data Attack: An Innovation Approach,” Electric Power Systems Research, vol.

  • By monitoring the SIS input and output, we can build an automatic testing process for a complex IoT system.The Regular and Malicious Data Generator — When testing the IoT sys- tem, there are many testing scenarios and cases that do not frequently occur in reality.

  • The Regular and Malicious Data Generator enables the simulation of different sensor behaviors, from normal be- havior to abnormal behavior, such as a DOS attack (the sensor publishes massive data messages in a short time), node failure (the sensor stops sending data).

  • Freiling, “Preventing Malicious Data Harvesting from Deallocated Memory Areas,” in SIN, 2013.[11] Arizona State Univ., NIMO Group, “Predictive Technology Model,” http://ptm.asu.edu/, 2012.[12] T.

  • Extensions include: Damage to Money and Securities, Client Cover, Malicious Data Damage, Court Compensation Cost, Identity Fraud, Commercial Disruption, Telecommunications Fraud, Public Utilities Fraud, Public Relations Consultancy Fees, Mitigation Costs and Contractual Penalties.

  • The Regular and Malicious Data Generator module helps developers to create a testbed which contains sensor data for various scenarios, e.g., making the temperature too high or too low.

  • Application layerApplication Identification, Malicious Data Flow Detection6.

  • Khargonekar, “Smart Grids Cyber-Physical Security as a Malicious Data Attack: An Innovation Approach,” accepted for publication in Electric Power Systems Research.

  • V, No. N, Article A, Publication date: January YYYY.Detecting Malicious Data Injections in WSNs: a Survey A:7 certainty.

  • Madeira, “Online Detection of Malicious Data Access using DBMS Auditing”.

Related to Malicious Data

  • Malicious Software means any software program or code intended to destroy, interfere with, corrupt, or cause undesired effects on program files, data or other information, executable code or application software macros, whether or not its operation is immediate or delayed, and whether the malicious software is introduced wilfully, negligently or without knowledge of its existence.

  • Vicious dog means any dog evidencing an abnormal inclination to attack persons or animals without provocation.”

  • Anonymous Data means Personal Data that has been processed in such a manner that it can no longer be attributed to an identified or identifiable natural person.

  • Pseudonymous data means personal data that cannot be attributed to a specific natural person

  • Malicious Code means viruses, worms, time bombs, Trojan horses and other harmful or malicious code, files, scripts, agents or programs.

  • Customer Data means any content, materials, data and information that Authorized Users enter into the production system of a Cloud Service or that Customer derives from its use of and stores in the Cloud Service (e.g. Customer-specific reports). Customer Data and its derivatives will not include SAP’s Confidential Information.

  • Unauthorized disclosure or "unauthorized release" means any disclosure or release not permitted by federal or state statute or regulation, any lawful contract or written agreement, or that does not respond to a lawful order of a court or tribunal or other lawful order.

  • Transparency Information means the content of this Contract in its entirety, including from time to time agreed changes to the Contract, and details of any payments made by the Authority to the Contractor under the Contract;

  • Data Safeguards means the highest industry-standard safeguards (including administrative, physical, technical, and procedural safeguards) against the destruction, loss, misuse, unauthorized disclosure, or alteration of the JBE Data or Confidential Information, and such other related safeguards that are set forth in Applicable Laws, a Statement of Work, or pursuant to JBE policies or procedures.

  • Your Data means all electronic data or information submitted by You to the Purchased Services.

  • Third Party Data has the meaning set forth in Section 9.3(a).

  • computer data means any representation of facts, information or concepts in a form suitable for processing in a computer system, including a program suitable to cause a computer system to perform a function;

  • Serious Record means a conviction or any finding of guilt regarding a Serious Offence; and Vulnerable Person means an individual aged 18 years and above who is or may be unable to take care of themselves, or is unable to protect themselves against harm or exploitation for any reason, including age, physical or mental illness, trauma or disability, pregnancy, the influence, or past or existing use, of alcohol, drugs or substances or any other reason.

  • Privacy Shield means the EU-U.S. Privacy Shield and Swiss-U.S. Privacy Shield Framework self-certification program operated by the U.S. Department of Commerce and approved by the European Commission pursuant to Decision C(2016)4176 of 12 July 2016 and by the Swiss Federal Council on January 11, 2017 respectively.

  • Unauthorized signature means one made without actual, implied, or apparent authority and includes a forgery.

  • Interceptor means a device designed and installed so as to separate and retain deleterious, hazardous, or undesirable matter from normal wastes, while allowing normal sewage or wastes to discharge into the drainage system by gravity.

  • Summary Health Information means information (a) that summarizes the claims history, claims expenses, or type of claims experienced by individuals for whom a plan sponsor had provided health benefits under a health plan; and (b) from which the information described at 42 CFR Section 164.514(b)(2)(i) has been deleted, except that the geographic information described in 42 CFR Section 164.514(b)(2)(i)(B) need only be aggregated to the level of a five-digit ZIP code.

  • Proprietary Data means Data embodying trade secrets developed at private expense or commercial or financial information that is privileged or confidential, and that includes a restrictive notice, unless the Data is:

  • Customer Information means any information contained on a customer’s application or other form and all nonpublic personal information about a customer that a Party receives from the other Party. Customer Information shall include, but not be limited to, name, address, telephone number, social security number, health information, and personal financial information (which may include a Masterworks user account number).

  • Customer information systems means any methods used to access, collect, store, use, transmit, protect, or dispose of customer in- formation.

  • UNICEF Data means any and all information or data in digital form or processed or held in digital form that

  • Health data means data related to the state of physical or mental health of the data principal and includes records regarding the past, present or future state of the health of such data principal, data collected in the course of registration for, or provision of health services, data associating the data principal to the provision of specific health services.

  • Unauthorized Use means either of the following:

  • Serious assault means an act that constitutes a felony violation of chapter XI of the Michigan penal code, 1931 PA 328, MCL 750.81 to 750.90h, or that constitutes an assault and infliction of serious or aggravated injury under section 81a of the Michigan penal code, 1931 PA 328, MCL 750.81a.

  • Viruses means any malicious computer code or instructions that have a material adverse effect on the operation, security or integrity of (a) a computing, telecommunications or other electronic operating or processing system or environment, (b) software programs, data, databases or other computer files or libraries or (c) computer hardware, networking devices or telecommunications equipment, including (i) viruses, Trojan horses, malware, time bombs, undisclosed back door devices, worms or any other software routine or hardware component designed to permit unauthorized access, disable, erase or otherwise harm software, hardware or data or perform any other such harmful or unauthorized actions and (ii) similar malicious code or data.

  • Computer database or “database” means a collection of recorded information in a form capable of, and for the purpose of, being stored in, processed, and operated on by a computer. The term does not include computer software.