「INFORMATION, TECHNOLOGY, SECURITY」- 信息安全

  CREATED BY JENKINSBOT

Penetration, Testing(渗透测试)

IDS (Intrusion Detection System)

4A(Authentication, Authorization, Accounting, Audit)

4A – Authentication, Authorization, Accounting, Audit
https://baike.baidu.com/item/4A/1825?fr=aladdin

信息相关内容

Related security categories

Computer security, Automotive security, Cybercrime, Cybersex trafficking, Computer fraud, Cybergeddon, Cyberterrorism, Cyberwarfare, Electronic warfare, Information warfare, Internet security, Mobile security, Network security, Copy protection, Digital rights management

Threats

Adware, Advanced persistent threat, Arbitrary code execution, Backdoors, Hardware backdoors, Code injection, Crimeware, Cross-site scripting, Cryptojacking malware, Botnets, Data breach, Drive-by download, Browser helper objects, Viruses, Data Scraping, Denial of Service, Eavesdropping, Email fraud, Email spoofing, Exploits, Keyloggers, Logic bombs, Time bombs, Fork bombs, Zip bombs, Fraudulent dialers, Malware, Payload, Phishing, Polymorphic engine, Privilege escalation, Ransomware, Rootkits, Bootkits, Scareware, Shellcode, Spamming, Social engineering, Screen scraping, Spyware, Software bugs, Trojan horses, Hardware, Trojans, Remote access trojans, Vulnerability, Web shells, Wiper, Worms, SQL injection, Rogue security software, Zombie

Defenses

Application security, Secure coding, Secure by default, Secure by design, Misuse case, Computer access control, Authentication, Multi-factor authentication, Authorization, Computer security software, Antivirus software, Security-focused operating system, Data-centric security, Code obfuscation, Data masking, Encryption, Firewall, Intrusion Detection System, Host-based intrusion detection system (HIDS)Anomaly detection, Security information and event management (SIEM), Mobile secure gateway, Runtime application self-protection