Computer security

2017-07-27T17:43:54+03:00[Europe/Moscow] en true Computer and network surveillance, Information security management system, Backdoor (computing), Information security, Phishing, Reverse engineering, ARP spoofing, Data integrity, Hooking, Cyber Intelligence Sharing and Protection Act, CAPTCHA, Cybercrime, Packet analyzer, Principle of least privilege, Regin (malware), Classified information in the United States, Aurora Generator Test, Authenticated session, Security bug, Footprinting, Typed assembly language, Trust on first use, Cybersecurity Information Sharing Act, VPN blocking, Trustworthy computing flashcards Computer security
Click to flip
  • Computer and network surveillance
    Computer and network surveillance is the monitoring of computer activity and data stored on a hard drive, or data being transferred over computer networks such as the Internet.
  • Information security management system
    An information security management system (ISMS) is a set of policies concerned with information security management or IT related risks.
  • Backdoor (computing)
    A backdoor is a method, often secret, of bypassing normal authentication in a product, computer system, cryptosystem or algorithm etc.
  • Information security
    Information security, sometimes shortened to InfoSec, is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction.
  • Phishing
    Phishing is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication.
  • Reverse engineering
    Reverse engineering, also called back engineering, is the processes of extracting knowledge or design information from anything man-made and re-producing it or re-producing anything based on the extracted information.
  • ARP spoofing
    In computer networking, ARP spoofing, ARP cache poisoning, or ARP poison routing, is a technique by which an attacker sends (spoofed) Address Resolution Protocol (ARP) messages onto a local area network.
  • Data integrity
    Data integrity is the maintenance of, and the assurance of the accuracy and consistency of, data over its entire life-cycle, and is a critical aspect to the design, implementation and usage of any system which stores, processes, or retrieves data.
  • Hooking
    In computer programming, the term hooking covers a range of techniques used to alter or augment the behavior of an operating system, of applications, or of other software components by intercepting function calls or messages or events passed between software components.
  • Cyber Intelligence Sharing and Protection Act
    The Cyber Intelligence Sharing and Protection Act (CISPA H.R. 3523 (112th Congress), H.R. 624 (113th Congress), H.R. 234 (114th Congress)) is a proposed law in the United States which would allow for the sharing of Internet traffic information between the U.
  • CAPTCHA
    A CAPTCHA (a backronym for "Completely Automated Public Turing test to tell Computers and Humans Apart") is a type of challenge-response test used in computing to determine whether or not the user is human.
  • Cybercrime
    Cybercrime, or computer crime, is crime that involves a computer and a network.
  • Packet analyzer
    A packet analyzer (also known as a network analyzer, protocol analyzer or packet sniffer—or, for particular types of networks, an Ethernet sniffer or wireless sniffer) is a computer program or piece of computer hardware that can intercept and log traffic that passes over a digital network or part of a network.
  • Principle of least privilege
    In information security, computer science, and other fields, the principle of least privilege (also known as the principle of minimal privilege or the principle of least authority) requires that in a particular abstraction layer of a computing environment, every module (such as a process, a user, or a program, depending on the subject) must be able to access only the information and resources that are necessary for its legitimate purpose.
  • Regin (malware)
    Regin (also known as Prax or WarriorPride) is a sophisticated malware toolkit revealed by Kaspersky Lab, Symantec, and The Intercept in November 2014.
  • Classified information in the United States
    The United States government classification system is established under Executive Order 13526, the latest in a long series of executive orders on the topic.
  • Aurora Generator Test
    Idaho National Laboratory ran the Aurora Generator Test in 2007 to demonstrate how a cyber attack could destroy physical components of the electric grid.
  • Authenticated session
    An authenticated session is a form of protocol that precedes the execution of a web application.
  • Security bug
    A security bug or security defect is a software bug that can be exploited to gain unauthorized access or privileges on a computer system.
  • Footprinting
    Footprinting (also known as reconnaissance) is the technique used for gathering information about computer systems and the entities they belong to.
  • Typed assembly language
    In computer science, a typed assembly language (TAL) is an assembly language that is extended to include a method of annotating the datatype of each value that is manipulated by the code.
  • Trust on first use
    TOFU or TUFU are information security slang acronyms which mean Trust On First Use or Trust Upon First Use.
  • Cybersecurity Information Sharing Act
    The Cybersecurity Information Sharing Act (CISA S. 2588 [113th Congress], S. 754 [114th Congress]) is a United States federal law designed to "improve cybersecurity in the United States through enhanced sharing of information about cybersecurity threats, and for other purposes".
  • VPN blocking
    VPN blocking is a technique used to block the encrypted protocol tunneling communications methods used by virtual private network (VPN) systems.
  • Trustworthy computing
    The term Trustworthy Computing (TwC) has been applied to computing systems that are inherently secure, available, and reliable.
Sitemap