Term
|
Definition
| Confidentiality, Integrity, Availability |
|
|
Term
|
Definition
| Most common method to maintain confidentiality. |
|
|
Term
| Other term for authentication attack |
|
Definition
| Other term for Confidentiality attack |
|
|
Term
|
Definition
| Communications and data must be available when users need them |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
| Gaining Access (Escalation of privileges just after this) |
|
Definition
| Hacking Step 3 (including this augmenting task) |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| Attack from the outside by a user who has no knowledge of the systems; weakness: does not allow for simulation of an insider attack. |
|
|
Term
|
Definition
| Attack from the inside by a user with total knowledge of the systems; designed to simulate an attack from within. |
|
|
Term
|
Definition
| AKA partial knowledge testing; can demonstrate privilege escalation by a trusted employee. |
|
|
Term
|
Definition
| It is the notion among hackers that something is worth doing or is interesting |
|
|
Term
| Target of Evaluation (TOE) |
|
Definition
| An IT system, product or component that is identified/subjected to a required security evaluation |
|
|
Term
|
Definition
| An action or event which might compromise security. A threat is a potential violation of security |
|
|
Term
|
Definition
| A weakness, design or implementation error that can lead to an unexpected and undesirable event, compromising the security of a system |
|
|
Term
|
Definition
| An assault on the system security derived from an intelligent threat. An attack is any action violating security. |
|
|
Term
|
Definition
| A defined way to breach the security of an IT system through vulnerability |
|
|
Term
|
Definition
| A computer threat that tries to exploit computer application vulnerabilities that are unknown to others or undisclosed to the software developer |
|
|
Term
|
Definition
| A state of well-being of information and infrastructure in which the possibility of theft, tampering, and disruption of information and services is kept low or tolerable |
|
|
Term
|
Definition
| Advance on a SQL database, and then leaving but cleaning up tracks during leaving |
|
|
Term
|
Definition
| Occurs when vulnerability combines with a threat |
|
|
Term
|
Definition
| Hacker who doesn't cover tracks and doesn't care if they get caught. |
|
|
Term
|
Definition
|
|
Term
|
Definition
| Hacker who has inflated view of themself. |
|
|
Term
|
Definition
|
|