A method of erasing electronically stored data, cryptographic keys, and CSPs by altering or deleting the contents of the data storage to prevent recovery of the data.
- Browse Related Terms: Activation Data, Automated Key Transport, Critical Security Parameter, Cryptographic Boundary, Differential Power Analysis (DPA), Electronic Key Entry, firmware, IP Security (IPsec), Key Escrow, Key Escrow System, Key Establishment, Key Loader, Key Transport, Manual Key Transport, port, Split Knowledge, Zeroization
A program that is installed on a system to cause it to attack other systems.
- Browse Related Terms: agent, Backup, Boot Sector Virus, Computer Virus, Deleted File, Easter Egg, Exploit Code, File Infector Virus, handler, Macro Virus, malicious code, Mobile Code, Mobile Software Agent, Port Scanning, System Software, Trojan horse, Virus, Worm, Zombie
Also listed in: