Line 18: | Line 18: | ||
{{Quote|the [[process]] whereby a [[service provider]] or [[end-user]] comes to be aware that a particular [[system]] or [[device]] has been [[infect]]ed with [[malicious software]]. A [[service provider]] may detect that a [[system]] has become [[infect]]ed many different ways, including as a result of receiving complaints from [[third parties]] about [[spam]], [[network scanning]], or [[attack]]s that have been sourced from that [[system]]. [[End-user]]s may detect [[system]] [[infection]]s through [[software tool]]s or other means.<ref>[[U.S. Anti-bot Code of Conduct (ABCs) for Internet Service Providers (ISPs)]], at 21.</ref>}} |
{{Quote|the [[process]] whereby a [[service provider]] or [[end-user]] comes to be aware that a particular [[system]] or [[device]] has been [[infect]]ed with [[malicious software]]. A [[service provider]] may detect that a [[system]] has become [[infect]]ed many different ways, including as a result of receiving complaints from [[third parties]] about [[spam]], [[network scanning]], or [[attack]]s that have been sourced from that [[system]]. [[End-user]]s may detect [[system]] [[infection]]s through [[software tool]]s or other means.<ref>[[U.S. Anti-bot Code of Conduct (ABCs) for Internet Service Providers (ISPs)]], at 21.</ref>}} |
||
+ | |||
+ | == References == |
||
+ | <references /> |
||
Revision as of 03:31, 26 January 2014
“ | Prevention is ideal but detection is a must. | ” |
Definitions
Data
Detection is the extraction of particular information from a larger stream of information without specific cooperation from or synchronization with the sender.
Electronic warfare
Detection is
“ | the active and passive monitoring of an operational environment for radio frequency, electro-optical, laser, infrared, and ultraviolet electromagnetic threats. Detection is the first step in EW for exploitation, targeting, and defensive planning. Friendly forces maintain the capability to detect and characterize interference as hostile jamming or unintentional electromagnetic interference.[1] | ” |
Malware
Detection is
“ | the process whereby a service provider or end-user comes to be aware that a particular system or device has been infected with malicious software. A service provider may detect that a system has become infected many different ways, including as a result of receiving complaints from third parties about spam, network scanning, or attacks that have been sourced from that system. End-users may detect system infections through software tools or other means.[2] | ” |
References
This page uses Creative Commons Licensed content from Wikipedia (view authors). |