Term
|
Definition
| executed completely or not at all |
|
|
Term
|
Definition
| collection of compromised hosts under attacker control |
|
|
Term
| social engineering attack |
|
Definition
| exploit human behavior to subvert security |
|
|
Term
|
Definition
| narrowly held knowledge used to secure info |
|
|
Term
|
Definition
| requires sender and receiver share secret |
|
|
Term
|
Definition
| easy to compute, hard to invert |
|
|
Term
|
Definition
| user denies permission by default |
|
|
Term
|
Definition
| not typically indexed by search engines |
|
|
Term
|
Definition
| not typically indexed by search engines |
|
|