英語對應詞索引
A
attack ……………………………………………………………… 2.2
attack pattern …………………………………………………… 3.22
attacker …………………………………………………………… 2.1
audit log ………………………………………………………… 3.50
audit trail ………………………………………………………… 4.17
B
backdoor ………………………………………………………… 3.5
botnet ……………………………………………………………… 3.21
brute force ………………………………………………………… 3.20
buffer overflow attack …………………………………………… 3.30
C
code execution attack ………………………………………… 3.28
command execution attack …………………………………… 3.27
communication log ……………………………………………… 3.51
critical data ………………………………………………………… 4.3
critical information system ………………………………………… 4.2
cross-site request forgery ………………………………………… 3.38
cross-site scripting attack ………………………………………… 3.26
cyber asset ………………………………………………………… 3.44
cyber attack incident ……………………………………………… 4.5
cyber facility fault incident ………………………………………… 4.8
cyber security incident ……………………………………………… 2.4
cyberspace situation awareness …………………………………… 4.15
D
DDoS attack ………………………………………………………… 3.36
Denial of Service …………………………………………………… 3.35
destructive program ……………………………………………… 3.9
device fingerprint ……………………………………………… 3.45
directory traversal attack ………………………………………… 3.31
disaster incident …………………………………………………… 4.9
disposal ………………………………………………………… 4.14
DNS hijack ………………………………………………………… 3.40
F
file download attack ……………………………………………… 3.34
file include attack …………………………………………………… 3.32
fileupload attack …………………………………………………… 3.33
flooding attack …………………………………………………… 3.37
H
hijack …………………………………………………………… 3.39
I
incident vulnerability ……………………………………………… 3.16
information content security incident ………………………… 4.7
information destroy incident …………………………………… 4.6
injection ………………………………………………………… 3.24
intrusion ……………………………………………………………… 2.3
L
log ………………………………………………………………… 3.47
M
malicious domainname ………………………………………… 3.11
malicious IP ………………………………………………………… 3.10
malware ………………………………………………………… 3.1
malware incident …………………………………………………… 4.4
management port remote connection log …………………… 3.52
N
network log ……………………………………………………… 3.49
network traffic …………………………………………………… 3.46
notification ……………………………………………………… 4.13
P
penetration ……………………………………………………… 3.19
phishing ………………………………………………………… 3.42
potential hazard …………………………………………………… 3.12
R
ransomware ………………………………………………………… 3.8
S
scan ……………………………………………………………… 3.17
sniff ……………………………………………………………… 3.18
social engineering attack ………………………………………… 3.43
spyware ……………………………………………………………… 3.7
SQL injection …………………………………………………… 3.25
system log ……………………………………………………… 3.48
T
target of cybersecurity protection ……………………………… 4.1
threat ……………………………………………………………… 4.10
threat information ……………………………………………… 4.11
traceability ……………………………………………………… 4.16
trojan horse ……………………………………………………… 3.4
U
universal vulnerability ……………………………………………… 3.15
URL jump attack …………………………………………………… 3.29
V
virus ………………………………………………………………… 3.2
vulnerability ……………………………………………………… 3.13
vulnerability exploit ……………………………………………… 3.23
vulnerability level ………………………………………………… 3.14
W
warning …………………………………………………………… 4.12
Web tamper ………………………………………………………… 3.41
GA/T 1717.1-2020 信息安全技術 網絡安全事件通報預警 第1部分:術語
推薦文章: