Term | Description |
---|---|
Write access |
Permission to write to an object in an information system.
|
WWW |
World Wide Web; also shortened to Web. Although WWW is used by many as being synonymous with the Internet, the WWW is actually one of numerous services on the Internet. This service allows email, images, sound, and newsgroups.
|
X.500 |
The CITT and ISO standard for electronic directory services.
|
X.509 |
A standard that is part of the X. 500 specifications and defines the format of a public key certificate.
|
Zero Day Exploit |
An attack on a system that exploits vulnerabilities that are unknown to others. Typically, it indicates that a vulnerability known to one or more attackers isn’t known to the vendor. In some cases the vendor may know about the vulnerability but hasn’t written or released a patch for the vulnerability yet.
|
Zero fill |
To fill unused storage locations in an information system with the representation of the character denoting “0. ”
|
Zero Knowledge Proof |
A concept of communication whereby a specific type of information is exchanged but no real data is exchanged. Good examples of this idea are digital signatures and digital certificates.
|
Zero-Knowledge Teams |
These possess only primary information about an organization during a security assessment or penetration test.
|
Zzuf |
A software testing tool that automates the process of mutation fuzzing by manipulating input according to user specifications.
|
Certification and Accreditation |
1. Initiation and planning 2. Certification 3. Accreditation 4. Periodic monitoring |