2017-07-27T17:43:54+03:00[Europe/Moscow]entrueComputer and network surveillance, Information security management system, Backdoor (computing), Information security, Phishing, Reverse engineering, ARP spoofing, Data integrity, Hooking, Cyber Intelligence Sharing and Protection Act, CAPTCHA, Cybercrime, Packet analyzer, Principle of least privilege, Regin (malware), Classified information in the United States, Aurora Generator Test, Authenticated session, Security bug, Footprinting, Typed assembly language, Trust on first use, Cybersecurity Information Sharing Act, VPN blocking, Trustworthy computingflashcardshttps://studylib.netComputer security
Computer and network surveillance is the monitoring of computer activity and data stored on a hard drive, or data being transferred over computer networks such as the Internet.
Information security management system
An information security management system (ISMS) is a set of policies concerned with information security management or IT related risks.
A backdoor is a method, often secret, of bypassing normal authentication in a product, computer system, cryptosystem or algorithm etc.
Information security, sometimes shortened to InfoSec, is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction.
Phishing is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication.
Reverse engineering, also called back engineering, is the processes of extracting knowledge or design information from anything man-made and re-producing it or re-producing anything based on the extracted information.
In computer networking, ARP spoofing, ARP cache poisoning, or ARP poison routing, is a technique by which an attacker sends (spoofed) Address Resolution Protocol (ARP) messages onto a local area network.
Data integrity is the maintenance of, and the assurance of the accuracy and consistency of, data over its entire life-cycle, and is a critical aspect to the design, implementation and usage of any system which stores, processes, or retrieves data.
In computer programming, the term hooking covers a range of techniques used to alter or augment the behavior of an operating system, of applications, or of other software components by intercepting function calls or messages or events passed between software components.
Cyber Intelligence Sharing and Protection Act
The Cyber Intelligence Sharing and Protection Act (CISPA H.R. 3523 (112th Congress), H.R. 624 (113th Congress), H.R. 234 (114th Congress)) is a proposed law in the United States which would allow for the sharing of Internet traffic information between the U.
A CAPTCHA (a backronym for "Completely Automated Public Turing test to tell Computers and Humans Apart") is a type of challenge-response test used in computing to determine whether or not the user is human.
Cybercrime, or computer crime, is crime that involves a computer and a network.
A packet analyzer (also known as a network analyzer, protocol analyzer or packet sniffer—or, for particular types of networks, an Ethernet sniffer or wireless sniffer) is a computer program or piece of computer hardware that can intercept and log traffic that passes over a digital network or part of a network.
Principle of least privilege
In information security, computer science, and other fields, the principle of least privilege (also known as the principle of minimal privilege or the principle of least authority) requires that in a particular abstraction layer of a computing environment, every module (such as a process, a user, or a program, depending on the subject) must be able to access only the information and resources that are necessary for its legitimate purpose.
Regin (also known as Prax or WarriorPride) is a sophisticated malware toolkit revealed by Kaspersky Lab, Symantec, and The Intercept in November 2014.
Classified information in the United States
The United States government classification system is established under Executive Order 13526, the latest in a long series of executive orders on the topic.
Aurora Generator Test
Idaho National Laboratory ran the Aurora Generator Test in 2007 to demonstrate how a cyber attack could destroy physical components of the electric grid.
An authenticated session is a form of protocol that precedes the execution of a web application.
A security bug or security defect is a software bug that can be exploited to gain unauthorized access or privileges on a computer system.
Footprinting (also known as reconnaissance) is the technique used for gathering information about computer systems and the entities they belong to.
Typed assembly language
In computer science, a typed assembly language (TAL) is an assembly language that is extended to include a method of annotating the datatype of each value that is manipulated by the code.
Trust on first use
TOFU or TUFU are information security slang acronyms which mean Trust On First Use or Trust Upon First Use.
Cybersecurity Information Sharing Act
The Cybersecurity Information Sharing Act (CISA S. 2588 [113th Congress], S. 754 [114th Congress]) is a United States federal law designed to "improve cybersecurity in the United States through enhanced sharing of information about cybersecurity threats, and for other purposes".
VPN blocking is a technique used to block the encrypted protocol tunneling communications methods used by virtual private network (VPN) systems.
The term Trustworthy Computing (TwC) has been applied to computing systems that are inherently secure, available, and reliable.