expand for answer

Implant

Electronic device or electronic equipment modification designed to gain unauthorized interception of informationbearing emanations.


Similar items:
Another term for sniffing. However, eavesdropping can include more than just capturing and recording network traffic. Eavesdropping also includes recording or listening to audio communications, faxes, radio signals, and so on. The unauthorized interception of informationbearing emanations through methods other than wiretapping.
[view]
(1) The accuracy, completeness and validity of information in accordance with business values and expectations. The property that data or information has not been modified or altered in an unauthorized manner. (2) A security service that allows verification that an unauthorized modification (including changes, insertions, deletions and duplications) has not occurred either maliciously or accidentally. See also data integrity. “Guarding against improper information modification or destruction, and includes ensuring information nonrepudiation and authenticity. ” (44 USC Sec. 3542)A state characterized by the assurance that modifications are not made by unauthorized users and authorized users do not make unauthorized modifications.
[view]
Protection of information systems against unauthorized access to or modification of information, whether in storage, processing or transit, and against the denial of service to authorized users, including those measures necessary to detect, document, and counter such threats. The protection of information systems against unauthorized access to or modification of information, whether in storage, processing, or transit, and against the denialofservice to authorized users or the provision of service to unauthorized users, including those measures necessary to detect, document, and counter such threats.
[view]
To verify the identity of a user, user device, or other entity, or the integrity of data stored, transmitted, or otherwise exposed to possible unauthorized modification in an automated information system, or establish the validity of a transmitted message. To verify the identity of a user, user device, or other entity, or the integrity of data stored, transmitted, or otherwise exposed to unauthorized modification in an information system, or to establish the validity of a transmission.
[view]
A technical measure that facilitates the interception of telecommunications traffic pursuant to the relevant national laws and regulations.
[view]


There are no comments yet.

Authentication required

You must log in to post a comment.

Log in