Investigative Data Mining for Security and Criminal Detection
- Back Door
-
A hole in the security of a computer system deliberately left in place by designers or maintainers. Synonymous with trap door. A hidden software or hardware mechanism used to circumvent security controls.
- Bell-La Padula Security Model
-
Formal-state transition model of computer security policy that describes a formal set of access controls based on information sensitivity and subject authorizations.
- Biba Integrity Model
-
A formal security model for the integrity of subjects and objects in a system.
- Bomb
-
A general synonym for crash, normally of software or operating system failures.
- Breach
-
The successful defeat of security controls, which could result in a penetration of the system. A violation of controls of a particular information system such that information assets or system components are unduly exposed.
- Buffer Overflow
-
This happens when more data is put into a buffer or holding area than the buffer can handle. This is due to a mismatch in processing rates between the producing and consuming processes. This can result in system crashes or the creation of a back door leading to system access.
- Bug
-
An unwanted and unintended property of a program or piece of hardware, especially one that causes it to malfunction.
[B]
Категории