Difference between revisions of "Keyword Index and Glossary of Core Ideas"
Line 9: | Line 9: | ||
===Antivirus=== | ===Antivirus=== | ||
− | Software which attempts to identify and delete or isolate [http://cyber.law.harvard.edu/cybersecurity | + | Software which attempts to identify and delete or isolate [http://cyber.law.harvard.edu/cybersecurity/Glossary_of_Core_Ideas#Malware malware]. May use a combination of signatures of known threats and heuristics to identify malware. Usually run as a background service to scan files and email copied to the protected system. |
References: | References: |
Revision as of 14:40, 14 June 2010
Glossary of Core Ideas
Air-Gapped Network
Air gapping is a security measure that isolates a secure network from unsecure networks, such as the public Internet, physically and electrically.
References:
Antivirus
Software which attempts to identify and delete or isolate malware. May use a combination of signatures of known threats and heuristics to identify malware. Usually run as a background service to scan files and email copied to the protected system.
References:
Black Hat
A black hat is a computer hacker who works to harm others (e.g., steal identities or spreading computer viruses).
See also:
- White Hat
References:
Botnet
Casus Belli
Civilian Participation
Combatant Status
Computer Network Attack
Communications Privacy Law
Crimeware
Cyber Terrorism
Cyber Warfare
Actions by a nation-state to penetrate another nation’s computers or networks for the purposes of causing damage or disruption. (Clarke)
References:
Data Mining
Digital Pearl Harbor
Distributed Denial of Service (DDoS)
Dumpster Diving
Geneva Conventions
Hacker
Hacktivism
Honeypot
Intelligence Infrastructure/Information Infrastructure
Interdependencies
International Humanitarian Law
Internet Relay Chat (IRC)
Internet Service Providers
Lawfare
Laws of War
Malware
National Security
Organized Crime
Phishing
The criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication.