Penetration, Testing(渗透测试)
IDS (Intrusion Detection System)
4A(Authentication, Authorization, Accounting, Audit)
4A – Authentication, Authorization, Accounting, Audit
https://baike.baidu.com/item/4A/1825?fr=aladdin
信息相关内容
Related security categories
Computer security, Automotive security, Cybercrime, Cybersex trafficking, Computer fraud, Cybergeddon, Cyberterrorism, Cyberwarfare, Electronic warfare, Information warfare, Internet security, Mobile security, Network security, Copy protection, Digital rights management
Threats
Adware, Advanced persistent threat, Arbitrary code execution, Backdoors, Hardware backdoors, Code injection, Crimeware, Cross-site scripting, Cryptojacking malware, Botnets, Data breach, Drive-by download, Browser helper objects, Viruses, Data Scraping, Denial of Service, Eavesdropping, Email fraud, Email spoofing, Exploits, Keyloggers, Logic bombs, Time bombs, Fork bombs, Zip bombs, Fraudulent dialers, Malware, Payload, Phishing, Polymorphic engine, Privilege escalation, Ransomware, Rootkits, Bootkits, Scareware, Shellcode, Spamming, Social engineering, Screen scraping, Spyware, Software bugs, Trojan horses, Hardware, Trojans, Remote access trojans, Vulnerability, Web shells, Wiper, Worms, SQL injection, Rogue security software, Zombie
Defenses
Application security, Secure coding, Secure by default, Secure by design, Misuse case, Computer access control, Authentication, Multi-factor authentication, Authorization, Computer security software, Antivirus software, Security-focused operating system, Data-centric security, Code obfuscation, Data masking, Encryption, Firewall, Intrusion Detection System, Host-based intrusion detection system (HIDS)Anomaly detection, Security information and event management (SIEM), Mobile secure gateway, Runtime application self-protection