Infosecblogger
Labels
attachments
availability
bottleneck
cartoon
CRAMM
cybersecurity
email
fantasy
FMEA
FRAP
malware
Methodologies
NIST
OCTAVE
phishing
PUSH
Quantitative
R
Risk
Risk assessment
Security
Single point of failure
SOMAP
SPOF
VAR
Sunday, 7 February 2016
Backdoor
Backdoor: Gaining unauthorized, often hidden, access to a system after bypassing security measures in place. Users are unaware a lot of times. Anomaly detection could be used to scan for existing backdoor.
No comments:
Post a Comment
Newer Post
Older Post
Home
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment