Back to Results
First PageMeta Content
Computing / Malware / Computer crimes / Spamming / Phishing / Rootkit / Botnet / Vulnerability / Trojan horse / Cyberwarfare / Computer security / Computer network security


Cyber Reference Aid The purpose of this Cyber Reference Aid is to illustrate the various phases of an attack and to define some of the more common cyber threat terms. Cyber Attack Cycle Testing and Compromise - Prior to
Add to Reading List

Document Date: 2013-10-09 14:04:37


Open Document

File Size: 557,94 KB

Share Result on Facebook

Company

LinkedIn / Norton / Symantec / Microsoft / Trend Micro / /

Country

United States / /

IndustryTerm

wireless-enabled computer / Internet Security Glossary / bank account / Wireless Technology / wireless connection / monitor web-browsing activity / wireless network / social networking / http /

OperatingSystem

DoS / /

Organization

Federal Bureau of Investigation / National Cyber-Forensics & Training Alliance / National Cyber Security Alliance / /

Position

administrator / researcher / /

Product

SQL Injection / /

ProgrammingLanguage

SQL / /

Technology

SMS / wireless access / DNS / HTTP / operating system / Domain Name Server / pdf / /

URL

http /

SocialTag