Term
|
Definition
executed completely or not at all |
|
|
Term
|
Definition
collection of compromised hosts under attacker control |
|
|
Term
social engineering attack |
|
Definition
exploit human behavior to subvert security |
|
|
Term
|
Definition
narrowly held knowledge used to secure info |
|
|
Term
|
Definition
requires sender and receiver share secret |
|
|
Term
|
Definition
easy to compute, hard to invert |
|
|
Term
|
Definition
user denies permission by default |
|
|
Term
|
Definition
not typically indexed by search engines |
|
|
Term
|
Definition
not typically indexed by search engines |
|
|