上QQ阅读APP看书,第一时间看更新
Threat action – intrusion
This is a threat action where there is an attack on the computing system with the harmful intention of causing destruction. This includes the following:
- Trespass: Obtaining unauthorized access physically to sensitive information by overtaking the network/system's security
- Penetration: Obtaining unauthorized logical access to sensitive information by overtaking the network/system's security
- Reverse-engineering: Collecting sensitive information by stripping and analyzing the components of the system/network
- Cryptanalysis: The technique or process of deciphering an encrypted message without prior knowledge of the secret key