Blacklist - Used to refer to a list of banned IP addresses, applications or users.
Whitelist - The exact opposite of a blacklist
Cat fishing - The process of creating a fake online profile in order to trick people into believing they are someone else for financial gain.
Authentication - The process of proving an individual is who they claim to be.
Data Mining - The activity of analyzing and/or searching through data in order to find items of relevance, significance or value
Threat - This generally refers to anything that has the potential to cause our data, systems and networks harm.
Exploit - A clearly defined way to breach the security of a system.
Vulnerabilities - These are weaknesses within a system or network that can be exploited to cause us harm.
Risk - This refers to the likelihood of something bad happening. A risk requires both a threat and a vulnerability to exist.
Zero Day - This is used to describe a threat that is unknown to security specialists and has not been addressed.
Hack Value - This describes a target that may attract an above average level of attention from an attacker.
Non-Repudiation - This is the concept that once an action is carried out by a party it cannot be denied by that same party.
Logic Bomb - A malicious code that is only triggered when a set of conditions are met.
Obfuscation - A term used to describe the tactic of making code unclear so that humans or programs like an antivirus cannot understand it.
Honey Pot - A decoy or trap for hackers
Spoof - The act of falsifying the identity of the source of a communication or interaction
'IT > 정보보안창고' 카테고리의 다른 글
보안의 개념과 CIA (0) | 2020.12.05 |
---|---|
내부통제 IT 감사 관련 용어 (0) | 2020.07.21 |
비트로커(bitlocker) 란? TPM 뜻 (0) | 2020.07.07 |