Exploit - Taking advantage of a flaw in the OS or application, Virus - Used to cause damage and or disruption, Worm - Used to transmit malware and can self replicate without human intervention, Authorization - Determining what a user can do, Spyware - Can track and report on your computer and steal data, Ransomware - Locks your system to extort money, Rootkit - Conceals themselves on the hosts OS getting as close to the kernel as possible to get mor permissions., Backdoor - Open port or other route to get into a system., Keylogger - Records every keystroke on your system, Authentication - Validating that you have the proper credentials, Trojan - Seemingly good application that intends to do harm, Password Cracking - Used to attempt to gain entry by brute forcing , SSO - Allows you to use one set of credentials to access other accounts, MAC Mandatory Access Control - Able to access your clearance level aswell as lower levels, DAC Discretionary Access Control - Setting your own security levels and ACL's to files , Role Based Access Control - Administrator defined roles, Rule Based Access Control - Rules using ACL's, Most restrictive, Least Privileged Model - Allowing a user enough rights to do their job, Nonrepudiation - Cant deny something happened, Accounting - Keeping records of Users of who accessed what and when and what did they do,
0%
Security Terms ITF
공유
공유
공유
만든이
Benzi622390
콘텐츠 편집
인쇄
퍼가기
더보기
할당
순위표
더 보기
접기
이 순위표는 현재 비공개입니다.
공유
를 클릭하여 공개할 수 있습니다.
자료 소유자가 이 순위표를 비활성화했습니다.
옵션이 자료 소유자와 다르기 때문에 이 순위표가 비활성화됩니다.
옵션 되돌리기
일치하는 것 찾기
(은)는 개방형 템플릿입니다. 순위표에 올라가는 점수를 산출하지 않습니다.
로그인이 필요합니다
비주얼 스타일
글꼴
구독 필요
옵션
템플릿 전환하기
모두 표시
액티비티를 플레이할 때 더 많은 포맷이 나타납니다.
결과 열기
링크 복사
QR 코드
삭제
자동 저장된
게임을 복구할까요?