|“||Prevention is ideal but detection is a must.||”|
Electronic warfare Edit
|“||the active and passive monitoring of an operational environment for radio frequency, electro-optical, laser, infrared, and ultraviolet electromagnetic threats. Detection is the first step in EW for exploitation, targeting, and defensive planning. Friendly forces maintain the capability to detect and characterize interference as hostile jamming or unintentional electromagnetic interference.||”|
|“||[d]evelopment and implementation of the appropriate activities in order to identify the occurrence of a cyber event.||”|
|“||the process whereby a service provider or end-user comes to be aware that a particular system or device has been infected with malicious software. A service provider may detect that a system has become infected many different ways, including as a result of receiving complaints from third parties about spam, network scanning, or attacks that have been sourced from that system. End-users may detect system infections through software tools or other means.||”|
- ↑ FM 3-36, at 1-10.
- ↑ Guidance on Cyber Resilience for Financial Market Infrastructures, App. A, at 24.
- ↑ U.S. Anti-Bot Code of Conduct (ABCs) for Internet Service Providers (ISPs), at 21.
|This page uses Creative Commons Licensed content from Wikipedia (view authors).|
Community content is available under CC-BY-SA unless otherwise noted.