Logo
Unionpedia
Communication
Get it on Google Play
New! Download Unionpedia on your Android™ device!
Free
Faster access than browser!
 

Threat (computer)

Index Threat (computer)

In computer security, a threat is a possible danger that might exploit a vulnerability to breach security and therefore cause possible harm. [1]

97 relations: Abuse, Accident, Antivirus software, Availability, Business continuity planning, Carbon Black (company), Computer emergency response team, Computer security, Computer virus, Confidentiality, Countermeasure (computer), Cryptanalysis, Cyber threat hunting, Cyberattack, Cyberwarfare, Data breach, Data corruption, Data security, Data theft, Deception, Denial-of-service attack, Digital signature forgery, DomainTools, DREAD (risk assessment model), Earthquake, Electrical disruptions caused by squirrels, Emanationism, European Union Agency for Network and Information Security, Exploit (computer security), Factor analysis of information risk, File system permissions, Fire, Firewall (computing), Grid computing, Human error, Inference, Information assurance, Information Operations Condition, Information privacy, Information security, Information security audit, Information technology security audit, Integrity, Intention, Interference (communication), International Organization for Standardization, Internet Engineering Task Force, Intrusion detection system, ISO/IEC 27000-series, ISO/IEC 27001, ..., IT risk, IT risk management, Machine learning, Malware, Microsoft, Misappropriation, National Information Assurance Glossary, National Information Assurance Training and Education Center, National Institute of Standards and Technology, Natural disaster, Non-repudiation, Open-source software, OWASP, Passive attack, Penetration (telecommunications), Penetration test, Phishing, Physical security, Privilege escalation, Proprietary software, Psychology, Reverse engineering, Risk factor (computing), Risk management, Robin Sage, SANS Institute, Security controls, Security information and event management, Security service (telecommunication), Signals intelligence, Social engineering (security), Social networking service, Spoofing attack, Sqrrl, STRIDE (security), Tampering (crime), Telephone tapping, The Open Group, Tornado, Traffic analysis, Trojan horse (computing), United States, User behavior analytics, Usurper, Vulnerability (computing), Vulnerability management, Web 2.0. Expand index (47 more) »

Abuse

Abuse is the improper usage or treatment of an entity, often to unfairly or improperly gain benefit.

New!!: Threat (computer) and Abuse · See more »

Accident

An accident, also known as an unintentional injury, is an undesirable, incidental, and unplanned event that could have been prevented had circumstances leading up to the accident been recognized, and acted upon, prior to its occurrence.

New!!: Threat (computer) and Accident · See more »

Antivirus software

Antivirus software, or anti-virus software (abbreviated to AV software), also known as anti-malware, is a computer program used to prevent, detect, and remove malware.

New!!: Threat (computer) and Antivirus software · See more »

Availability

In reliability theory and reliability engineering, the term availability has the following meanings.

New!!: Threat (computer) and Availability · See more »

Business continuity planning

Business continuity planning (or business continuity and resiliency planning) is the process of creating systems of prevention and recovery to deal with potential threats to a company.

New!!: Threat (computer) and Business continuity planning · See more »

Carbon Black (company)

Carbon Black, Inc. (formerly Bit9, Inc.) is a cybersecurity company based in Waltham, Massachusetts.

New!!: Threat (computer) and Carbon Black (company) · See more »

Computer emergency response team

A computer emergency response team (CERT) is an expert group that handles computer security incidents.

New!!: Threat (computer) and Computer emergency response team · See more »

Computer security

Cybersecurity, computer security or IT security is the protection of computer systems from theft of or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide.

New!!: Threat (computer) and Computer security · See more »

Computer virus

A computer virus is a type of malicious software program ("malware") that, when executed, replicates itself by modifying other computer programs and inserting its own code.

New!!: Threat (computer) and Computer virus · See more »

Confidentiality

Confidentiality involves a set of rules or a promise usually executed through confidentiality agreements that limits access or places restrictions on certain types of information.

New!!: Threat (computer) and Confidentiality · See more »

Countermeasure (computer)

In computer security a countermeasure is an action, device, procedure, or technique that reduces a threat, a vulnerability, or an attack by eliminating or preventing it, by minimizing the harm it can cause, or by discovering and reporting it so that corrective action can be taken.

New!!: Threat (computer) and Countermeasure (computer) · See more »

Cryptanalysis

Cryptanalysis (from the Greek kryptós, "hidden", and analýein, "to loosen" or "to untie") is the study of analyzing information systems in order to study the hidden aspects of the systems.

New!!: Threat (computer) and Cryptanalysis · See more »

Cyber threat hunting

Cyber threat hunting is "the process of proactively and iteratively searching through networks to detect and isolate advanced threats that evade existing security solutions." This is in contrast to traditional threat management measures, such as firewalls, intrusion detection systems (IDS), malware sandbox (computer security) and SIEM systems, which typically involve an investigation after there has been a warning of a potential threat or an incident has occurred.

New!!: Threat (computer) and Cyber threat hunting · See more »

Cyberattack

A cyberattack is any type of offensive maneuver that targets computer information systems, infrastructures, computer networks, or personal computer devices.

New!!: Threat (computer) and Cyberattack · See more »

Cyberwarfare

Cyberwarfare is the use or targeting in a battlespace or warfare context of computers, online control systems and networks.

New!!: Threat (computer) and Cyberwarfare · See more »

Data breach

A data breach is the intentional or unintentional release of secure or private/confidential information to an untrusted environment.

New!!: Threat (computer) and Data breach · See more »

Data corruption

Data corruption refers to errors in computer data that occur during writing, reading, storage, transmission, or processing, which introduce unintended changes to the original data.

New!!: Threat (computer) and Data corruption · See more »

Data security

Data security means protecting digital data, such as those in a database, from destructive forces and from the unwanted actions of unauthorized users, such as a cyberattack or a data breach.

New!!: Threat (computer) and Data security · See more »

Data theft

Data theft is a growing phenomenon primarily caused by system administrators and office workers with access to technology such as database servers, desktop computers and a growing list of hand-held devices capable of storing digital information, such as USB flash drives, iPods and even digital cameras.

New!!: Threat (computer) and Data theft · See more »

Deception

Deception is the act of propagating a belief that is not true, or is not the whole truth (as in half-truths or omission).

New!!: Threat (computer) and Deception · See more »

Denial-of-service attack

In computing, a denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.

New!!: Threat (computer) and Denial-of-service attack · See more »

Digital signature forgery

In a cryptographic digital signature or MAC system, digital signature forgery is the ability to create a pair consisting of a message, m, and a signature (or MAC), \sigma, that is valid for m, where m has not been signed in the past by the legitimate signer.

New!!: Threat (computer) and Digital signature forgery · See more »

DomainTools

DomainTools, LLC is a Seattle, Washington based American company that provides DNS research tools that use a database of domain name, IP address, and WHOIS data.

New!!: Threat (computer) and DomainTools · See more »

DREAD (risk assessment model)

DREAD is part of a system for risk-assessing computer security threats previously used at Microsoft and currently used by OpenStack and many other corporations.

New!!: Threat (computer) and DREAD (risk assessment model) · See more »

Earthquake

An earthquake (also known as a quake, tremor or temblor) is the shaking of the surface of the Earth, resulting from the sudden release of energy in the Earth's lithosphere that creates seismic waves.

New!!: Threat (computer) and Earthquake · See more »

Electrical disruptions caused by squirrels

Electrical disruptions caused by squirrels are common and widespread, and can involve the disruption of power grids.

New!!: Threat (computer) and Electrical disruptions caused by squirrels · See more »

Emanationism

Emanationism is an idea in the cosmology or cosmogony of certain religious or philosophical systems.

New!!: Threat (computer) and Emanationism · See more »

European Union Agency for Network and Information Security

The European Union Agency for Network and Information Security - self-designation ENISA from the abbreviation of its original name - is an agency of the European Union.

New!!: Threat (computer) and European Union Agency for Network and Information Security · See more »

Exploit (computer security)

An exploit (from the English verb to exploit, meaning "to use something to one’s own advantage") is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized).

New!!: Threat (computer) and Exploit (computer security) · See more »

Factor analysis of information risk

Factor analysis of information risk (FAIR) is a taxonomy of the factors that contribute to risk and how they affect each other.

New!!: Threat (computer) and Factor analysis of information risk · See more »

File system permissions

Most file systems have methods to assign permissions or access rights to specific users and groups of users.

New!!: Threat (computer) and File system permissions · See more »

Fire

Fire is the rapid oxidation of a material in the exothermic chemical process of combustion, releasing heat, light, and various reaction products.

New!!: Threat (computer) and Fire · See more »

Firewall (computing)

In computing, a firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

New!!: Threat (computer) and Firewall (computing) · See more »

Grid computing

Grid computing is the collection of computer resources from multiple locations to reach a common goal.

New!!: Threat (computer) and Grid computing · See more »

Human error

Human error has been cited as a primary cause contributing factor in disasters and accidents in industries as diverse as nuclear power (e.g., the Three Mile Island accident), aviation (see pilot error), space exploration (e.g., the Space Shuttle Challenger Disaster and Space Shuttle Columbia disaster), and medicine (see medical error).

New!!: Threat (computer) and Human error · See more »

Inference

Inferences are steps in reasoning, moving from premises to logical consequences.

New!!: Threat (computer) and Inference · See more »

Information assurance

Information assurance (IA) is the practice of assuring information and managing risks related to the use, processing, storage, and transmission of information or data and the systems and processes used for those purposes.

New!!: Threat (computer) and Information assurance · See more »

Information Operations Condition

INFOCON (short for Information Operations Condition) is a threat level system in the United States similar to that of FPCON.

New!!: Threat (computer) and Information Operations Condition · See more »

Information privacy

Information privacy, or data privacy (or data protection), is the relationship between the collection and dissemination of data, technology, the public expectation of privacy, and the legal and political issues surrounding them.

New!!: Threat (computer) and Information privacy · See more »

Information security

Information security, sometimes shortened to InfoSec, is the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information.

New!!: Threat (computer) and Information security · See more »

Information security audit

An information security audit is an audit on the level of information security in an organization.

New!!: Threat (computer) and Information security audit · See more »

Information technology security audit

A computer security audit is a manual or systematic measurable technical assessment of a system or application.

New!!: Threat (computer) and Information technology security audit · See more »

Integrity

Integrity is the quality of being honest and having strong moral principles, or moral uprightness.

New!!: Threat (computer) and Integrity · See more »

Intention

Intention is a mental state that represents a commitment to carrying out an action or actions in the future.

New!!: Threat (computer) and Intention · See more »

Interference (communication)

In communications and electronics, especially in telecommunications, interference is anything which modifies, or disrupts a signal as it travels along a channel between a source and a receiver.

New!!: Threat (computer) and Interference (communication) · See more »

International Organization for Standardization

The International Organization for Standardization (ISO) is an international standard-setting body composed of representatives from various national standards organizations.

New!!: Threat (computer) and International Organization for Standardization · See more »

Internet Engineering Task Force

The Internet Engineering Task Force (IETF) develops and promotes voluntary Internet standards, in particular the standards that comprise the Internet protocol suite (TCP/IP).

New!!: Threat (computer) and Internet Engineering Task Force · See more »

Intrusion detection system

An intrusion detection system (IDS) is a device or software application that monitors a network or systems for malicious activity or policy violations.

New!!: Threat (computer) and Intrusion detection system · See more »

ISO/IEC 27000-series

The ISO/IEC 27000-series (also known as the 'ISMS Family of Standards' or 'ISO27K' for short) comprises information security standards published jointly by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC).

New!!: Threat (computer) and ISO/IEC 27000-series · See more »

ISO/IEC 27001

ISO/IEC 27001 is an information security standard, part of the ISO/IEC 27000 family of standards, of which the last version was published in 2013, with a few minor updates since then.

New!!: Threat (computer) and ISO/IEC 27001 · See more »

IT risk

Information technology risk, IT risk, IT-related risk, or Cyber Risk is any risk related to information technology.

New!!: Threat (computer) and IT risk · See more »

IT risk management

IT risk management is the application of risk management methods to information technology in order to manage IT risk, i.e.: IT risk management can be considered a component of a wider enterprise risk management system.

New!!: Threat (computer) and IT risk management · See more »

Machine learning

Machine learning is a subset of artificial intelligence in the field of computer science that often uses statistical techniques to give computers the ability to "learn" (i.e., progressively improve performance on a specific task) with data, without being explicitly programmed.

New!!: Threat (computer) and Machine learning · See more »

Malware

Malware (a portmanteau for malicious software) is any software intentionally designed to cause damage to a computer, server or computer network.

New!!: Threat (computer) and Malware · See more »

Microsoft

Microsoft Corporation (abbreviated as MS) is an American multinational technology company with headquarters in Redmond, Washington.

New!!: Threat (computer) and Microsoft · See more »

Misappropriation

In law, misappropriation is the unauthorized use of another's name, likeness, or identity without that person's permission, resulting in harm to that person.

New!!: Threat (computer) and Misappropriation · See more »

National Information Assurance Glossary

Committee on National Security Systems Instruction No.

New!!: Threat (computer) and National Information Assurance Glossary · See more »

National Information Assurance Training and Education Center

The National Information Assurance Training and Education Center (NIATEC) is an American consortium of academic, industry, and government organizations to improve the literacy, awareness, training and education standards in Information Assurance.

New!!: Threat (computer) and National Information Assurance Training and Education Center · See more »

National Institute of Standards and Technology

The National Institute of Standards and Technology (NIST) is one of the oldest physical science laboratories in the United States.

New!!: Threat (computer) and National Institute of Standards and Technology · See more »

Natural disaster

A natural disaster is a major adverse event resulting from natural processes of the Earth; examples include floods, hurricanes, tornadoes, volcanic eruptions, earthquakes, tsunamis, and other geologic processes.

New!!: Threat (computer) and Natural disaster · See more »

Non-repudiation

Non-repudiation refers to a state of affairs where the author of a statement will not be able to successfully challenge the authorship of the statement or validity of an associated contract.

New!!: Threat (computer) and Non-repudiation · See more »

Open-source software

Open-source software (OSS) is a type of computer software whose source code is released under a license in which the copyright holder grants users the rights to study, change, and distribute the software to anyone and for any purpose.

New!!: Threat (computer) and Open-source software · See more »

OWASP

The Open Web Application Security Project (OWASP), an online community, produces freely-available articles, methodologies, documentation, tools, and technologies in the field of web application security.

New!!: Threat (computer) and OWASP · See more »

Passive attack

A passive attack on a cryptosystem is one in which the cryptanalyst cannot interact with any of the parties involved, attempting to break the system solely based upon observed data (i.e. the ciphertext).

New!!: Threat (computer) and Passive attack · See more »

Penetration (telecommunications)

In telecommunication, the term penetration has the following meanings.

New!!: Threat (computer) and Penetration (telecommunications) · See more »

Penetration test

A penetration test, colloquially known as a pen test, is an authorized simulated attack on a computer system, performed to evaluate the security of the system.

New!!: Threat (computer) and Penetration test · See more »

Phishing

Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords, and credit card details (and money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication.

New!!: Threat (computer) and Phishing · See more »

Physical security

Physical security describes security measures that are designed to deny unauthorized access to facilities, equipment and resources and to protect personnel and property from damage or harm (such as espionage, theft, or terrorist attacks).

New!!: Threat (computer) and Physical security · See more »

Privilege escalation

Privilege escalation is the act of exploiting a bug, design flaw or configuration oversight in an operating system or software application to gain elevated access to resources that are normally protected from an application or user.

New!!: Threat (computer) and Privilege escalation · See more »

Proprietary software

Proprietary software is non-free computer software for which the software's publisher or another person retains intellectual property rights—usually copyright of the source code, but sometimes patent rights.

New!!: Threat (computer) and Proprietary software · See more »

Psychology

Psychology is the science of behavior and mind, including conscious and unconscious phenomena, as well as feeling and thought.

New!!: Threat (computer) and Psychology · See more »

Reverse engineering

Reverse engineering, also called back engineering, is the process by which a man-made object is deconstructed to reveal its designs, architecture, or to extract knowledge from the object; similar to scientific research, the only difference being that scientific research is about a natural phenomenon.

New!!: Threat (computer) and Reverse engineering · See more »

Risk factor (computing)

In Information security, Risk factor is a collectively name for circumstances affecting the likelihood or the impact of a security risk.

New!!: Threat (computer) and Risk factor (computing) · See more »

Risk management

Risk management is the identification, evaluation, and prioritization of risks (defined in ISO 31000 as the effect of uncertainty on objectives) followed by coordinator and economical application of resources to minimize, monitor, and control the probability or impact of unfortunate events or to maximize the realization of opportunities.

New!!: Threat (computer) and Risk management · See more »

Robin Sage

Robin Sage is a fictional American cyber threat analyst.

New!!: Threat (computer) and Robin Sage · See more »

SANS Institute

The SANS Institute (officially the Escal Institute of Advanced Technologies) is a private U.S. for-profit company founded in 1989 that specializes in information security, cybersecurity training and selling Certificates.

New!!: Threat (computer) and SANS Institute · See more »

Security controls

Security controls are safeguards or countermeasures to avoid, detect, counteract, or minimize security risks to physical property, information, computer systems, or other assets.

New!!: Threat (computer) and Security controls · See more »

Security information and event management

In the field of computer security, security information and event management (SIEM) software products and services combine security information management (SIM) and security event management (SEM).

New!!: Threat (computer) and Security information and event management · See more »

Security service (telecommunication)

Security service is a service, provided by a layer of communicating open systems, which ensures adequate security of the systems or of data transfers as defined by ITU-T X.800 Recommendation.

New!!: Threat (computer) and Security service (telecommunication) · See more »

Signals intelligence

Signals intelligence (SIGINT) is intelligence-gathering by interception of signals, whether communications between people (communications intelligence—abbreviated to COMINT) or from electronic signals not directly used in communication (electronic intelligence—abbreviated to ELINT).

New!!: Threat (computer) and Signals intelligence · See more »

Social engineering (security)

Social engineering, in the context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information.

New!!: Threat (computer) and Social engineering (security) · See more »

Social networking service

A social networking service (also social networking site, SNS or social media) is a web application that people use to build social networks or social relations with other people who share similar personal or career interests, activities, backgrounds or real-life connections.

New!!: Threat (computer) and Social networking service · See more »

Spoofing attack

In the context of network security, a spoofing attack is a situation in which a person or program successfully masquerades as another by falsifying data, to gain an illegitimate advantage.

New!!: Threat (computer) and Spoofing attack · See more »

Sqrrl

Sqrrl Data, Inc. is an American company founded in 2012 that markets software for big data analytics and cyber security.

New!!: Threat (computer) and Sqrrl · See more »

STRIDE (security)

STRIDE is a threat classification model developed by Microsoft for thinking about computer security threats.

New!!: Threat (computer) and STRIDE (security) · See more »

Tampering (crime)

Tampering can refer to many forms of sabotage but the term is often used to mean intentional modification of products in a way that would make them harmful to the consumer.

New!!: Threat (computer) and Tampering (crime) · See more »

Telephone tapping

Telephone tapping (also wire tapping or wiretapping in American English) is the monitoring of telephone and Internet conversations by a third party, often by covert means.

New!!: Threat (computer) and Telephone tapping · See more »

The Open Group

The Open Group is an industry consortium that seeks to "enable the achievement of business objectives" by developing "open, vendor-neutral technology standards and certifications".

New!!: Threat (computer) and The Open Group · See more »

Tornado

A tornado is a rapidly rotating column of air that is in contact with both the surface of the Earth and a cumulonimbus cloud or, in rare cases, the base of a cumulus cloud.

New!!: Threat (computer) and Tornado · See more »

Traffic analysis

Traffic analysis is the process of intercepting and examining messages in order to deduce information from patterns in communication, which can be performed even when the messages are encrypted.

New!!: Threat (computer) and Traffic analysis · See more »

Trojan horse (computing)

In computing, a Trojan horse, or Trojan, is any malicious computer program which misleads users of its true intent.

New!!: Threat (computer) and Trojan horse (computing) · See more »

United States

The United States of America (USA), commonly known as the United States (U.S.) or America, is a federal republic composed of 50 states, a federal district, five major self-governing territories, and various possessions.

New!!: Threat (computer) and United States · See more »

User behavior analytics

User behavior analytics ("UBA") as defined by Gartner is a cybersecurity process about detection of insider threats, targeted attacks, and financial fraud.

New!!: Threat (computer) and User behavior analytics · See more »

Usurper

A usurper is an illegitimate or controversial claimant to power, often but not always in a monarchy.

New!!: Threat (computer) and Usurper · See more »

Vulnerability (computing)

In computer security, a vulnerability is a weakness which can be exploited by a Threat Actor, such as an attacker, to perform unauthorized actions within a computer system.

New!!: Threat (computer) and Vulnerability (computing) · See more »

Vulnerability management

Vulnerability management is the "cyclical practice of identifying, classifying, remediating, and mitigating vulnerabilities", particularly in software.

New!!: Threat (computer) and Vulnerability management · See more »

Web 2.0

Web 2.0 refers to World Wide Web websites that emphasize user-generated content, usability (ease of use, even by non-experts), and interoperability (this means that a website can work well with other products, systems, and devices) for end users.

New!!: Threat (computer) and Web 2.0 · See more »

Redirects here:

Threat Agent, Threat agent, Threat detection.

References

[1] https://en.wikipedia.org/wiki/Threat_(computer)

OutgoingIncoming
Hey! We are on Facebook now! »