Exploit - Taking advantage of a flaw in the OS or application, Virus - Used to cause damage and or disruption, Worm - Used to transmit malware and can self replicate without human intervention, Authorization - Determining what a user can do, Spyware - Can track and report on your computer and steal data, Ransomware - Locks your system to extort money, Rootkit - Conceals themselves on the hosts OS getting as close to the kernel as possible to get mor permissions., Backdoor - Open port or other route to get into a system., Keylogger - Records every keystroke on your system, Authentication - Validating that you have the proper credentials, Trojan - Seemingly good application that intends to do harm, Password Cracking - Used to attempt to gain entry by brute forcing , SSO - Allows you to use one set of credentials to access other accounts, MAC Mandatory Access Control - Able to access your clearance level aswell as lower levels, DAC Discretionary Access Control - Setting your own security levels and ACL's to files , Role Based Access Control - Administrator defined roles, Rule Based Access Control - Rules using ACL's, Most restrictive, Least Privileged Model - Allowing a user enough rights to do their job, Nonrepudiation - Cant deny something happened, Accounting - Keeping records of Users of who accessed what and when and what did they do,

Tabela

Vizuelni stil

Postavke

Promeni šablon

Vrati automatski sačuvano: ?