An unauthorized act of bypassing the security mechanisms of a network or information system.
An unauthorized act of bypassing the security mechanisms of a network or information system.
A security event, or a combination of multiple security events, that constitutes a security incident in which an intruder gains, or attempts to gain, access to a system or system resource without having authorization to do so. (See: IDS.)
A type of threat action whereby an unauthorized entity gains access to sensitive data by circumventing a system's security protections. (See: unauthorized disclosure.)
Usage: This type of threat action includes the following subtypes:
"Trespass": Gaining physical access to sensitive data by circumventing a system's protections.
"Penetration": Gaining logical access to sensitive data by circumventing a system's protections.
"Reverse engineering": Acquiring sensitive data by disassembling and analyzing the design of a system component.
"Cryptanalysis": Transforming encrypted data into plain text without having prior knowledge of encryption parameters or processes. (See: main entry for "cryptanalysis".)