Inference attack
A data mining technique in which an attacker infers data from related known data without actually accessing a database containing the inferred data.
A data mining technique in which an attacker infers data from related known data without actually accessing a database containing the inferred data.
A device that receives packets and forwards them to their destination. Examples include routers, switches, firewalls, intrusion detection and intrusion prevention systems, web application firewalls, anti-malware and network taps.
In the context of cybersecurity, and not confined to intelligence developed for military purposes, intelligence is knowledge of threats, developed by analyzing various sources of information. The US DOD Dictionary...
A form of homographic attack that uses apparently similar or identical characters from different language sets to spoof a domain. Also called IDN homograph attack. Compare typosquatting.
A cybersecurity first principle strategy that seeks to disrupt known adversary activity at any one of several points in an attack sequence.
A group of hacked computers, smart appliances and Internet-connected devices co-opted for illicit purposes.