Ver:
· Spoof
Pretensión de una entidad de ser otra diferente, para así acceder sin autorización a los recursos a los que aquella tiene acceso. (ISO-7498-2). [Ribagorda:1997]
Pretensión de una entidad de hacerse pasar por otra y transmitir mensajes por una red no estando autorizada a ello. [CESID:1997]
Pretención de una entidad de pasar por una entidad diferente. [ISO-7498-2:1989]
A type of threat
action whereby an unauthorized entity gains access to a system or performs a
malicious act by illegitimately posing as an authorized entity. [CNSSI_4009:2010]
(I) A type of
threat action whereby an unauthorized entity gains access to a system or
performs a malicious act by illegitimately posing as an authorized entity.
(See: deception.)
Usage: This type
of threat action includes the following subtypes:
·
"Spoof":
Attempt by an unauthorized entity to gain access to a system by posing as an
authorized user.
· "Malicious logic": In context of masquerade, any hardware, firmware, or software (e.g., Trojan horse) that appears to perform a useful or desirable function, but actually gains unauthorized access to system resources or tricks a user into executing other malicious logic. (See: corruption, incapacitation, main entry for "malicious logic", misuse.)
[RFC4949:2007]
A type of attack
in which one system entity illegitimately poses as (assumes the identity of)
another entity.
http://www.sans.org/security-resources/glossary-of-terms/
The pretence by
an entity to be a different entity. [ISO-7498-2:1989]
Prétention qu'a une entité d'en être une autre. [ISO-7498-2:1989]
L'usurpation par un
entité qui se révèle être une entité différente de celle annoncée.
http://www.cases.public.lu/functions/glossaire/
Temas relacionados