Prevention is ideal but detection is a must.

Definitions Edit

Data Edit

Detection is the extraction of particular information from a larger stream of information without specific cooperation from or synchronization with the sender.

Electronic warfare Edit

Detection is

the active and passive monitoring of an operational environment for radio frequency, electro-optical, laser, infrared, and ultraviolet electromagnetic threats. Detection is the first step in EW for exploitation, targeting, and defensive planning. Friendly forces maintain the capability to detect and characterize interference as hostile jamming or unintentional electromagnetic interference.[1]

General Edit

Detection is

[d]evelopment and implementation of the appropriate activities in order to identify the occurrence of a cyber event.[2]

Malware Edit

Detection is

the process whereby a service provider or end-user comes to be aware that a particular system or device has been infected with malicious software. A service provider may detect that a system has become infected many different ways, including as a result of receiving complaints from third parties about spam, network scanning, or attacks that have been sourced from that system. End-users may detect system infections through software tools or other means.[3]

References Edit

  1. FM 3-36, at 1-10.
  2. Guidance on Cyber Resilience for Financial Market Infrastructures, App. A, at 24.
  3. U.S. Anti-Bot Code of Conduct (ABCs) for Internet Service Providers (ISPs), at 21.

This page uses Creative Commons Licensed content from Wikipedia (view authors). Smallwikipedialogo.png
Community content is available under CC-BY-SA unless otherwise noted.