Ver:
· Sistema de detección de intrusiones
· Sistema de prevención de intrusiones
Que se ha
introducido sin derecho.
DRAE.
Diccionario de la Lengua Española.
Apropiarse,
sin razón ni derecho, de un cargo, una autoridad, una jurisdicción, etc.
DRAE.
Diccionario de la Lengua Española.
Cuando un
atacante accede a un sistema informático sin autorización con el objetivo de
tomar el control de la máquina o recopilar información confidencial.
Para hacerlo,
suelen aprovechar alguna vulnerabilidad del sistema afectado.
http://www.inteco.es/glossary/Formacion/Glosario/
Acción de
soslayar o violar los mecanismos de seguridad instalados y los procedimientos
de seguridad establecidos con objeto de atacar a un sistema. [Ribagorda:1997]
Dispositivo
físicamente robusto, diseñado para destruir sus microcircuitos internos cuando
se intenta penetrar o, en general, violar de cualquier manera. [Ribagorda:1997]
the act of
entering a place which is private or where you may not be wanted.
Oxford
Advanced Learner's Dictionary.
Unauthorized act
of bypassing the security mechanisms of a system. [CNSSI_4009:2010]
(I) An entity
that gains or attempts to gain access to a system or system resource without
having authorization to do so. (See: intrusion. Compare: adversary, cracker, hacker.) [RFC4949:2007]
1. (I) A security
event, or a combination of multiple security events, that constitutes a
security incident in which an intruder gains, or attempts to gain, access to a
system or system resource without having authorization to do so. (See: IDS.)
2. (I) A type of
threat action whereby an unauthorized entity gains access to sensitive data by
circumventing a system's security protections. (See: unauthorized disclosure.)
Usage: This type
of threat action includes the following subtypes:
·
"Trespass":
Gaining physical access to sensitive data by circumventing a system's
protections.
·
"Penetration":
Gaining logical access to sensitive data by circumventing a system's
protections.
·
"Reverse
engineering": Acquiring sensitive data by disassembling and analyzing the design
of a system component.
·
"Cryptanalysis":
Transforming encrypted data into plain text without having prior knowledge of
encryption parameters or processes. (See: main entry for
"cryptanalysis".)
[RFC4949:2007]
unauthorized
access to a network or a network-connected system i.e. deliberate or accidental
unauthorized access to an information system, to include malicious activity
against an information system, or unauthorized use of resources within an
information system. [ISO-18028-1:2006]
Une combinaison
délibérée ou accidentelle d' évènements qui peuvent potentiellement causer un
accès non autorisé et constituer une activité allant à l'encontre du système IT
au sein même ou à l'extérieur du système. [ISO-15947:2002]
Temas relacionados