Term
|
Definition
| An access right is a right granted to a user for a particular entity instance. |
|
|
Term
|
Definition
| A software program that delivers advertising content in a matter that is unexpected or unwanted by the user. |
|
|
Term
|
Definition
| Part of TCP/IP for determining the MAC based on IP. |
|
|
Term
|
Definition
|
|
Term
|
Definition
| Security actions that ensure that data is accessible to authorized users. |
|
|
Term
|
Definition
| An attacker that gains control of a system unknowingly to the user called a zombie. They then carry out attacks using multiple zombies. |
|
|
Term
|
Definition
| A device that can be inserted into the security slot of a portable device and rotated so that the cable lock is secured to the device to prevent it from being stolen. |
|
|
Term
|
Definition
| A combination lock that uses buttons which must be pushed in the proper sequence to open the door. |
|
|
Term
|
Definition
| An attack that targets vulnerabilities in client applications that interact with a compromised server or processes malicious data. |
|
|
Term
|
Definition
| Adds a program to the OS that is a malicious copycat version of legitimate program. |
|
|
Term
|
Definition
| A person that is hired to break into a computer and steal information. |
|
|
Term
|
Definition
| Security actions that ensure only authorized parties can view information. |
|
|
Term
|
Definition
| A premeditated, politically motivated attack against information, computer systems, computer programs, and data that results in violence. |
|
|
Term
|
Definition
| Apart of layering security, diversity is to have multiple non redundant forms of security. |
|
|
Term
|
Definition
| Domain name server. Resolves host names by their IP address. |
|
|
Term
|
Definition
| A vulnerability in a system software, hardware. |
|
|
Term
|
Definition
| Hardware or software that is designed to prevent malicious packets from entering or leaving a computer or network. |
|
|
Term
|
Definition
| A cookie that is created from the website that is currently being view. |
|
|
Term
|
Definition
|
|
Term
|
Definition
| A computer located in an area with limited security loaded with software and data that appears to be real to trick attackers into revealing their techniques. |
|
|
Term
|
Definition
| Stealing another persons personal info like SSN and using it to impersonate them for financial gain. |
|
|
Term
|
Definition
| A security action that ensures that info is correct and no unauthorized person or software has altered the data. |
|
|
Term
|
Definition
| Provides multiple lines of defense against attackers. |
|
|
Term
|
Definition
| Limits access to data to reduce the risk of it being compromised. |
|
|
Term
|
Definition
| An attack that lies dormant until an event triggers it. |
|
|
Term
|
Definition
| A series of instructions that can be grouped together as a single command. |
|
|
Term
|
Definition
| An attack that intercepts legit data and forges a fictitious response to the sender. |
|
|
Term
|
Definition
| A device that monitors and controls two interlocking doors to a small room designed to separate secure and non-secure data. |
|
|
Term
|
Definition
| Keeping system info secure from outside sources who don't need to know the info. |
|
|
Term
|
Definition
| A website or email that claims to be legitimate and asks unsuspecting users for sensitive data to be used against them. |
|
|
Term
|
Definition
| The action of hacking into telecommunications systems, esp. to obtain free calls. |
|
|
Term
|
Definition
| An attack that exploits a vulnerability in software to gain access to resources that the user would normally be restricted from obtaining. |
|
|
Term
|
Definition
| A predetermined set of rules to fallow in certain situations. |
|
|
Term
|
Definition
| A device that detects an emitted signal to id the owner. |
|
|
Term
|
Definition
| Radio frequency id's read by proxy readers usually in id badges. |
|
|
Term
|
Definition
| The likelihood that a threat agent will exploit the vulnerability. |
|
|
Term
|
Definition
| A set of software tools used by an attacker to hide the actions or presence of other types of malicious software. |
|
|
Term
|
Definition
| Software that is a cumulative package of all security updates plus additional features. |
|
|
Term
|
Definition
| A means of gathering information for an attack by relying on the weaknesses of individuals. |
|
|
Term
|
Definition
|
|
Term
|
Definition
| A general term used to describe software that is used to spy on users and gather info w/o consent, thus violating their privacy. |
|
|
Term
|
Definition
| An attack that targets SQL servers by injecting commands to be manipulated by the db. |
|
|
Term
|
Definition
| A cookie created by a 3rd party that is different from the primary website. |
|
|
Term
|
Definition
| A type of action that has the potential to cause harm. |
|
|
Term
|
Definition
| A person or agent that has the power to carry out a threat. |
|
|
Term
|
Definition
| An exe advertised as performing one activity but actually does something else. |
|
|
Term
|
Definition
| Code that reproduces itself. |
|
|
Term
|
Definition
| A flaw or weakness that allows a threat agent to bypass security. |
|
|
Term
|
Definition
| An app that takes advantage of a vulnerability in an app or OS in order to self replicate. |
|
|
Term
|
Definition
| Attacks that exploit previously unknown vulnerabilities so victims have no time to prepare or defend against them. |
|
|