Índice
guia_glosario_ciberseguridad_0
guia_glosario_ciberseguridad_0
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
A<br />
D<br />
S<br />
E<br />
F<br />
C<br />
B<br />
INCIBE_PTE_AproxEmpresario_010_GlosarioCiberseguridad-2017-v1<br />
<strong>Índice</strong><br />
1. Introducción______________________________________________________________________ 6<br />
2. Definiciones______________________________________________________________________ 7<br />
2.1. A______________________________________________________________________________ 7<br />
2.1.1. Activo de información ................................................................................................................7<br />
2.1.2. Acuerdo de licencia ....................................................................................................................7<br />
2.1.3. Administración Electrónica .......................................................................................................7<br />
2.1.4. Adware ........................................................................................................................................7<br />
2.1.5. Agujero de seguridad .................................................................................................................8<br />
2.1.6. Cifrado ........................................................................................................................................8<br />
2.1.7. Antivirus ......................................................................................................................................8<br />
2.1.8. Análisis de riesgos.......................................................................................................................8<br />
2.1.9. Ataque diccionario......................................................................................................................9<br />
2.1.10. Ataque de fuerza bruta .............................................................................................................9<br />
2.1.11. Ataque mixto combinado ........................................................................................................9<br />
2.1.12. Ataque de repetición ................................................................................................................9<br />
2.1.13. Auditoría de seguridad .............................................................................................................10<br />
2.1.14. Autenticación ...........................................................................................................................10<br />
2.1.15. Autenticidad .............................................................................................................................10<br />
2.1.16. Autoridad de certificación .......................................................................................................10<br />
2.1.17. Autoridad de registro ...............................................................................................................10<br />
2.1.18. Autoridad de validación ...........................................................................................................10<br />
2.1.19. Aviso Legal ................................................................................................................................11<br />
2.2. B______________________________________________________________________________ 11<br />
2.2.1. B2B ..............................................................................................................................................11<br />
2.2.2. B2C ..............................................................................................................................................12<br />
2.2.3. Backdoor .....................................................................................................................................12<br />
2.2.4. Backup ........................................................................................................................................12<br />
2.2.5. BIA ...............................................................................................................................................12<br />
2.2.6. Biometría.....................................................................................................................................12<br />
2.2.7. Bluetooth ....................................................................................................................................13