Prevention is ideal but detection is a must.

Definitions[edit | edit source]

Data[edit | edit source]

Detection is the extraction of particular information from a larger stream of information without specific cooperation from or synchronization with the sender.

Electronic warfare[edit | edit source]

Detection is

the active and passive monitoring of an operational environment for radio frequency, electro-optical, laser, infrared, and ultraviolet electromagnetic threats. Detection is the first step in EW for exploitation, targeting, and defensive planning. Friendly forces maintain the capability to detect and characterize interference as hostile jamming or unintentional electromagnetic interference.[1]

General[edit | edit source]

Detection is

[d]evelopment and implementation of the appropriate activities in order to identify the occurrence of a cyber event.[2]

Malware[edit | edit source]

Detection is

the process whereby a service provider or end-user comes to be aware that a particular system or device has been infected with malicious software. A service provider may detect that a system has become infected many different ways, including as a result of receiving complaints from third parties about spam, network scanning, or attacks that have been sourced from that system. End-users may detect system infections through software tools or other means.[3]

References[edit | edit source]

This page uses Creative Commons Licensed content from Wikipedia (view authors). Smallwikipedialogo.png
Community content is available under CC-BY-SA unless otherwise noted.