Term
|
Definition
Confidentiality, Integrity, Availability |
|
|
Term
|
Definition
Most common method to maintain confidentiality. |
|
|
Term
Other term for authentication attack |
|
Definition
Other term for Confidentiality attack |
|
|
Term
|
Definition
Communications and data must be available when users need them |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
Gaining Access (Escalation of privileges just after this) |
|
Definition
Hacking Step 3 (including this augmenting task) |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Attack from the outside by a user who has no knowledge of the systems; weakness: does not allow for simulation of an insider attack. |
|
|
Term
|
Definition
Attack from the inside by a user with total knowledge of the systems; designed to simulate an attack from within. |
|
|
Term
|
Definition
AKA partial knowledge testing; can demonstrate privilege escalation by a trusted employee. |
|
|
Term
|
Definition
It is the notion among hackers that something is worth doing or is interesting |
|
|
Term
Target of Evaluation (TOE) |
|
Definition
An IT system, product or component that is identified/subjected to a required security evaluation |
|
|
Term
|
Definition
An action or event which might compromise security. A threat is a potential violation of security |
|
|
Term
|
Definition
A weakness, design or implementation error that can lead to an unexpected and undesirable event, compromising the security of a system |
|
|
Term
|
Definition
An assault on the system security derived from an intelligent threat. An attack is any action violating security. |
|
|
Term
|
Definition
A defined way to breach the security of an IT system through vulnerability |
|
|
Term
|
Definition
A computer threat that tries to exploit computer application vulnerabilities that are unknown to others or undisclosed to the software developer |
|
|
Term
|
Definition
A state of well-being of information and infrastructure in which the possibility of theft, tampering, and disruption of information and services is kept low or tolerable |
|
|
Term
|
Definition
Advance on a SQL database, and then leaving but cleaning up tracks during leaving |
|
|
Term
|
Definition
Occurs when vulnerability combines with a threat |
|
|
Term
|
Definition
Hacker who doesn't cover tracks and doesn't care if they get caught. |
|
|
Term
|
Definition
|
|
Term
|
Definition
Hacker who has inflated view of themself. |
|
|
Term
|
Definition
|
|