21.02.2017 Views

Índice

guia_glosario_ciberseguridad_0

guia_glosario_ciberseguridad_0

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

A<br />

D<br />

S<br />

E<br />

F<br />

C<br />

B<br />

INCIBE_PTE_AproxEmpresario_010_GlosarioCiberseguridad-2017-v1<br />

<strong>Índice</strong><br />

1. Introducción______________________________________________________________________ 6<br />

2. Definiciones______________________________________________________________________ 7<br />

2.1. A______________________________________________________________________________ 7<br />

2.1.1. Activo de información ................................................................................................................7<br />

2.1.2. Acuerdo de licencia ....................................................................................................................7<br />

2.1.3. Administración Electrónica .......................................................................................................7<br />

2.1.4. Adware ........................................................................................................................................7<br />

2.1.5. Agujero de seguridad .................................................................................................................8<br />

2.1.6. Cifrado ........................................................................................................................................8<br />

2.1.7. Antivirus ......................................................................................................................................8<br />

2.1.8. Análisis de riesgos.......................................................................................................................8<br />

2.1.9. Ataque diccionario......................................................................................................................9<br />

2.1.10. Ataque de fuerza bruta .............................................................................................................9<br />

2.1.11. Ataque mixto combinado ........................................................................................................9<br />

2.1.12. Ataque de repetición ................................................................................................................9<br />

2.1.13. Auditoría de seguridad .............................................................................................................10<br />

2.1.14. Autenticación ...........................................................................................................................10<br />

2.1.15. Autenticidad .............................................................................................................................10<br />

2.1.16. Autoridad de certificación .......................................................................................................10<br />

2.1.17. Autoridad de registro ...............................................................................................................10<br />

2.1.18. Autoridad de validación ...........................................................................................................10<br />

2.1.19. Aviso Legal ................................................................................................................................11<br />

2.2. B______________________________________________________________________________ 11<br />

2.2.1. B2B ..............................................................................................................................................11<br />

2.2.2. B2C ..............................................................................................................................................12<br />

2.2.3. Backdoor .....................................................................................................................................12<br />

2.2.4. Backup ........................................................................................................................................12<br />

2.2.5. BIA ...............................................................................................................................................12<br />

2.2.6. Biometría.....................................................................................................................................12<br />

2.2.7. Bluetooth ....................................................................................................................................13

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!