A self-replicating, self-propagating, self-contained program that uses networking mechanisms to spread itself.
An estimate of the effort or time needed by a potential adversary, with specified expertise and resources, to overcome a protective measure.
A list of entities that are considered trustworthy and are granted access or privileges.
A group responsible for refereeing an engagement between a Red Team of mock attackers and a Blue Team of actual defenders of information systems
A shortcoming or imperfection in software code, design, architecture, or deployment that, under proper conditions, could become a vulnerability or contribute to the introduction of vulnerabilities.