Infosecblogger
Labels
CRAMM
FMEA
FRAP
Methodologies
NIST
OCTAVE
PUSH
Quantitative
R
Risk
Risk assessment
SOMAP
SPOF
Security
Single point of failure
VAR
attachments
availability
bottleneck
cartoon
cybersecurity
email
fantasy
malware
phishing
Sunday, 7 February 2016
Backdoor
Backdoor: Gaining unauthorized, often hidden, access to a system after bypassing security measures in place. Users are unaware a lot of times. Anomaly detection could be used to scan for existing backdoor.
Newer Posts
Older Posts
Home
Subscribe to:
Posts (Atom)