GUÍA DE SEGURIDAD
(CCN-STIC-401)
Glosario y Abreviaturas
ENERO de 2016
Edita:
ã Editor y Centro Criptológico Nacional, 2016
NIPO: 002-15-018-4
Fecha de Edición: enero de 2016
José Antonio Mañas ha
participado en la elaboración y modificación del presente documento y sus
anexos.
LIMITACIÓN DE
RESPONSABILIDAD
El presente documento se proporciona
de acuerdo con los términos en él recogidos, rechazando expresamente cualquier
tipo de garantía implícita que se pueda encontrar relacionada. En ningún caso,
el Centro Criptológico Nacional puede ser considerado responsable del daño directo, indirecto, fortuito
o extraordinario derivado de la utilización de la información y software que se
indican incluso cuando se advierta de tal posibilidad.
AVISO LEGAL
Quedan rigurosamente prohibidas, sin la
autorización escrita del Centro
Criptológico Nacional, bajo las sanciones establecidas en las leyes, la
reproducción parcial o total de este documento por cualquier medio o
procedimiento, comprendidos la reprografía y el tratamiento informático, y la
distribución de ejemplares del mismo mediante alquiler o préstamo públicos.
PRÓLOGO
El uso masivo de las tecnologías de la
información y las telecomunicaciones (TIC), en todos los ámbitos de la
sociedad, ha creado un nuevo espacio, el ciberespacio, donde se producirán
conflictos y agresiones, y donde existen ciberamenazas que atentarán contra la
seguridad nacional, el estado de derecho, la prosperidad económica, el estado
de bienestar y el normal funcionamiento de la sociedad y de las
administraciones públicas.
La Ley 11/2002, de 6 de mayo, reguladora del
Centro Nacional de Inteligencia, encomienda al Centro Nacional de Inteligencia
el ejercicio de las funciones relativas a la seguridad de las tecnologías de la
información en su artículo 4.e), y de protección de la información clasificada
en su artículo 4.f), a la vez que confiere a su Secretario de Estado Director
la responsabilidad de dirigir el Centro Criptológico Nacional en su artículo
9.2.f).
Partiendo del conocimiento y la experiencia
del CNI sobre amenazas y vulnerabilidades en materia de riesgos emergentes, el
Centro realiza, a través de su Centro Criptológico Nacional, regulado por el
Real Decreto 421/2004, de 12 de marzo, diversas actividades directamente
relacionadas con la seguridad de las TIC, orientadas a la formación de personal
experto, a la aplicación de políticas y procedimientos de seguridad, y al
empleo de tecnologías de seguridad adecuadas.
Una de las funciones más destacables del
Centro Criptológico Nacional es la de elaborar y difundir normas,
instrucciones, guías y recomendaciones para garantizar la seguridad de los
sistemas de las tecnologías de la información y las comunicaciones de la
Administración, materializada en la existencia de la serie de documentos CCN-STIC.
Disponer de un marco de referencia que
establezca las condiciones necesarias de confianza en el uso de los medios
electrónicos es, además, uno de los principios que establece la ley 11/2007, de
22 de junio, de acceso electrónico de los ciudadanos a los servicios públicos,
en su artículo 42.2 sobre el Esquema Nacional de Seguridad (ENS).
Precisamente el Real Decreto 3/2010 de 8 de enero de desarrollo del
Esquema Nacional de Seguridad, modificado por el Real Decreto 951/2015, de 23
de octubre, fija los principios básicos y requisitos mínimos así como las medidas
de seguridad a implantar en los sistemas de la Administración, y promueve la
elaboración y difusión de guías de seguridad de las tecnologías de la
información y las comunicaciones por parte de CCN para facilitar un mejor
cumplimiento de dichos requisitos mínimos.
En
definitiva, la serie de documentos CCN-STIC se elabora para dar cumplimiento a
los cometidos del Centro Criptológico Nacional y a lo reflejado en el Esquema
Nacional de Seguridad, conscientes de la importancia que tiene el
establecimiento de un marco de referencia en esta materia que sirva de apoyo
para que el personal de la Administración lleve a cabo su difícil, y en ocasiones,
ingrata tarea de proporcionar seguridad a los sistemas de las TIC bajo su
responsabilidad.
Enero de 2016
Félix Sanz Roldán
Secretario de Estado
Director del Centro
Criptológico Nacional
ÍNDICE
1 INTRODUCCIÓN........................................................................................................................ 126
2 Términos............................................................................................................................... 126
2.1 A prueba de fallos........................................................................................................................................................ 126
2.1.1 A prueba de fallos............................................................................................................................................ 126
2.1.1 (en) Fail safe...................................................................................................................................................... 126
2.1.2 (en) fail soft....................................................................................................................................................... 126
2.1.1 (en) fail-safe...................................................................................................................................................... 126
2.1.2 (en) fail-secure.................................................................................................................................................. 126
2.1.3 (en) fail-soft....................................................................................................................................................... 126
2.1.4 (en) failure control........................................................................................................................................... 126
2.2 A5 - Cifrado de
voz GSM............................................................................................................................................. 127
2.2.1 A5 - Cifrado de voz GSM.................................................................................................................................. 127
2.2.2 (en) A5 - GSM voice encryption...................................................................................................................... 127
2.3 AAA -
Autenticación, Autorización y Registro......................................................................................................... 127
2.3.1 AAA - Autenticación, Autorización y Registro............................................................................................. 127
2.3.2 AAA..................................................................................................................................................................... 127
2.3.1 (en) AAA............................................................................................................................................................. 128
2.3.2 (en) authentication, authorization, and accounting
(AAA)....................................................................... 128
2.3.3 (en) AAA - Authentication, Authorisation and
Accounting....................................................................... 128
2.3.4 (fr) AAA............................................................................................................................................................... 129
2.4 Acceso............................................................................................................................................................................ 129
2.4.1 Acceso................................................................................................................................................................. 129
2.4.1 (en) Access......................................................................................................................................................... 129
2.4.2 (en) access......................................................................................................................................................... 129
2.4.3 (en) Access......................................................................................................................................................... 129
2.4.4 (fr) Accès............................................................................................................................................................ 130
2.5 Acceso fiable................................................................................................................................................................. 130
2.5.1 Vía fiable............................................................................................................................................................ 130
2.5.2 (en) trusted path............................................................................................................................................... 130
2.5.3 (en) trusted path............................................................................................................................................... 130
2.5.4 (en) Trusted Path.............................................................................................................................................. 130
2.5.5 (en) trusted path............................................................................................................................................... 130
2.5.6 (en) Trusted path.............................................................................................................................................. 131
2.6 Acceso no
autorizado.................................................................................................................................................. 131
2.6.1 Acceso no autorizado...................................................................................................................................... 131
2.6.2 (en) Unauthorized Access............................................................................................................................... 131
2.6.3 (en) Unauthorized Access............................................................................................................................... 131
2.6.4 (en) Unauthorized Access............................................................................................................................... 131
2.7 Acceso por red.............................................................................................................................................................. 131
2.7.1 Acceso por red................................................................................................................................................... 131
2.7.2 (en) Network Access........................................................................................................................................ 131
2.8 Aceptación del
riesgo................................................................................................................................................... 132
2.8.1 aceptación del riesgo....................................................................................................................................... 132
2.8.1 aceptación del riesgo:...................................................................................................................................... 132
2.8.2 aceptación de riesgos...................................................................................................................................... 132
2.8.3 (en) risk acceptance......................................................................................................................................... 132
2.8.4 (en) risk acceptance......................................................................................................................................... 132
2.8.5 (en) acceptable risk.......................................................................................................................................... 132
2.8.6 (fr) acceptation du risque................................................................................................................................ 133
2.8.7 (fr) Validation du
traitement des risques..................................................................................................... 133
2.9 AC puente...................................................................................................................................................................... 133
2.9.1 AC puente.......................................................................................................................................................... 133
2.9.2 (en) bridge CA................................................................................................................................................... 133
2.10 Acreditación............................................................................................................................................................ 133
2.10.1 Acreditar....................................................................................................................................................... 133
2.10.2 Acreditado.................................................................................................................................................... 133
2.10.3 Acreditación................................................................................................................................................. 133
2.10.4 Autoridad de Acreditación (AA)................................................................................................................ 134
2.10.5 Acreditación................................................................................................................................................. 134
2.10.6 Acreditación................................................................................................................................................. 134
2.10.7 (en) accreditation........................................................................................................................................ 134
2.10.8 (en) accreditation........................................................................................................................................ 134
2.10.9 (en) accreditation........................................................................................................................................ 134
2.10.10 (en) accreditation........................................................................................................................................ 134
2.10.11 (en) Accredited............................................................................................................................................ 135
2.10.12 (en) Accreditation....................................................................................................................................... 135
2.10.13 (en) What is security accreditation?........................................................................................................ 135
2.10.14 (en) Accreditation....................................................................................................................................... 135
2.10.15 (en) Approval / Accreditation................................................................................................................... 135
2.10.16 (en) accreditation........................................................................................................................................ 135
2.10.17 (fr) Accrédité................................................................................................................................................ 136
2.11 Activo....................................................................................................................................................................... 136
2.11.1 Activo............................................................................................................................................................ 136
2.11.2 activo............................................................................................................................................................. 136
2.11.3 Activo............................................................................................................................................................ 136
2.11.4 Activos........................................................................................................................................................... 136
2.11.5 Bien................................................................................................................................................................ 136
2.11.6 activo............................................................................................................................................................. 136
2.11.7 (en) asset...................................................................................................................................................... 137
2.11.8 (EN) Asset..................................................................................................................................................... 137
2.11.9 (en) asset...................................................................................................................................................... 137
2.11.10 (en) asset...................................................................................................................................................... 137
2.11.11 (en) asset...................................................................................................................................................... 137
2.11.12 (en) asset...................................................................................................................................................... 137
2.11.13 (en) Asset...................................................................................................................................................... 137
2.11.14 (en) assets.................................................................................................................................................... 138
2.11.15 (en) asset...................................................................................................................................................... 138
2.11.16 (en) Asset...................................................................................................................................................... 138
2.11.17 (en) Asset...................................................................................................................................................... 138
2.11.18 (en) Asset...................................................................................................................................................... 138
2.11.19 (en) Asset...................................................................................................................................................... 138
2.11.20 (en) Asset...................................................................................................................................................... 138
2.11.21 (en) Cyber Asset:......................................................................................................................................... 138
2.11.22 (en) Critical Cyber Asset:............................................................................................................................ 138
2.11.23 (en) Critical Digital Asset:.......................................................................................................................... 139
2.11.24 (en) Cyber Assets......................................................................................................................................... 139
2.11.25 (fr) Actif......................................................................................................................................................... 139
2.11.26 (fr) bien......................................................................................................................................................... 139
2.11.27 (fr) bien......................................................................................................................................................... 139
2.12 Actuación
responsable........................................................................................................................................... 139
2.12.1 responsable.................................................................................................................................................. 139
2.12.2 (en) Due diligence....................................................................................................................................... 139
2.12.3 (en) Due diligence....................................................................................................................................... 139
2.13 Acuerdo de
nivel de servicio (ANS)........................................................................................................................ 139
2.13.1 SLA................................................................................................................................................................. 140
2.13.2 (en) service level agreement..................................................................................................................... 140
2.13.3 Acuerdo de Nivel de Servicio (SLA)........................................................................................................... 140
2.13.4 SLA - Acuerdo de nivel de servicio............................................................................................................ 140
2.13.5 (en) Service level agreement (SLA)........................................................................................................... 140
2.13.6 (en) Service Level Agreement (SLA).......................................................................................................... 140
2.13.7 (en) Service level agreement (SLA)........................................................................................................... 140
2.13.8 (en) service-level agreement..................................................................................................................... 140
2.13.9 (fr) Accord sur les
niveaux de service (SLA)............................................................................................ 141
2.13.10 (fr) Contrat d´engagement
de service (CES)........................................................................................... 141
2.14 Acuerdo de
respaldo mutuo.................................................................................................................................. 141
2.14.1 Acuerdo de respaldo mutuo...................................................................................................................... 141
2.14.2 (en) Mutual backup agreement................................................................................................................ 141
2.15 Acuerdo de
Seguridad en Interconexiones........................................................................................................... 141
2.15.1 Acuerdo de Seguridad en Interconexiones............................................................................................. 141
2.15.1 Acuerdo de seguridad de interconexión................................................................................................. 142
2.15.1 (en) Interconnection Security Agreement (ISA)..................................................................................... 142
2.15.2 (en) What is an ISA?................................................................................................................................... 142
2.16 Acumulación de
privilegios.................................................................................................................................... 142
2.16.1 Acumulación de privilegios........................................................................................................................ 142
2.16.2 (en) Privilege creep..................................................................................................................................... 142
2.17 Administrador......................................................................................................................................................... 142
2.17.1 Administrador.............................................................................................................................................. 143
2.17.2 (en) administrator....................................................................................................................................... 143
2.17.3 (en) administrator....................................................................................................................................... 143
2.17.4 (en) Administrator...................................................................................................................................... 143
2.17.5 (en) Administrator...................................................................................................................................... 143
2.17.6 (en) Administrator...................................................................................................................................... 143
2.17.7 (en) security administrator........................................................................................................................ 143
2.18 Administrador
de seguridad.................................................................................................................................. 144
2.18.1 administrador de seguridad...................................................................................................................... 144
2.18.2 (en) Security administrator....................................................................................................................... 144
2.18.3 (fr) administrateur de sécurité.................................................................................................................. 144
2.19 Adware..................................................................................................................................................................... 144
2.19.1 Software Publicitario.................................................................................................................................. 144
2.19.2 Adware.......................................................................................................................................................... 144
2.19.3 Adware.......................................................................................................................................................... 144
2.19.4 (en) Adware.................................................................................................................................................. 145
2.19.5 (en) Adware.................................................................................................................................................. 145
2.19.6 (en) adware.................................................................................................................................................. 145
2.19.7 (en) Adware.................................................................................................................................................. 145
2.19.8 (en) Adware.................................................................................................................................................. 145
2.19.9 (fr) Adware................................................................................................................................................... 145
2.19.10 (fr) adware................................................................................................................................................... 145
2.19.11 (fr) Adware................................................................................................................................................... 146
2.20 AES - Advanced
Encryption Standard.................................................................................................................. 146
2.20.1 AES - Advanced Encryption Standard...................................................................................................... 146
2.20.2 (en) Advanced Encryption Standard (AES).............................................................................................. 146
2.20.3 (en) Advanced Encryption Standard (AES).............................................................................................. 146
2.20.4 (en) AES......................................................................................................................................................... 146
2.20.5 (en) AES......................................................................................................................................................... 146
2.20.6 (fr) AES.......................................................................................................................................................... 147
2.21 Agente externo........................................................................................................................................................ 147
2.21.1 Agente externo............................................................................................................................................ 147
2.21.2 (en) outsider................................................................................................................................................. 147
2.22 Agotamiento de
recursos...................................................................................................................................... 147
2.22.1 Agotamiento de recursos.......................................................................................................................... 147
2.22.2 (en) Resource Exhaustion.......................................................................................................................... 147
2.23 Agregación.............................................................................................................................................................. 148
2.23.1 agregación................................................................................................................................................... 148
2.23.2 (en) aggregation......................................................................................................................................... 148
2.24 Agregación de
datos............................................................................................................................................... 148
2.24.1 Agregación de datos................................................................................................................................... 148
2.24.2 (en) Data aggregation................................................................................................................................ 148
2.24.3 (en) Data Aggregation............................................................................................................................... 148
2.25 AH -
Authentication Header.................................................................................................................................. 148
2.25.1 AH - Authentication Header...................................................................................................................... 149
2.25.2 (en) Authentication Header (AH).............................................................................................................. 149
2.25.3 (en) AH - Authentication Header.............................................................................................................. 149
2.26 Air gap...................................................................................................................................................................... 149
2.26.1 Air gap........................................................................................................................................................... 149
2.26.2 (en) air gap................................................................................................................................................... 149
2.26.3 (en) Air gap................................................................................................................................................... 149
2.26.4 (en) Air-Gapped Network.......................................................................................................................... 149
2.27 ALARP – As Low as Reasonably
Practical............................................................................................................ 150
2.27.1 ALARP – Tan bajo como sea razonablemente práctico........................................................................ 150
2.27.2 (en) ALARP – As Low as Reasonably Practical........................................................................................ 150
2.28 Aleatorio................................................................................................................................................................. 150
2.28.1 Aleatorio....................................................................................................................................................... 150
2.28.2 Seudoaleatorio............................................................................................................................................ 150
2.28.3 Pseudoaleatorio.......................................................................................................................................... 150
2.28.4 (en) Random number................................................................................................................................. 150
2.29 Alerta....................................................................................................................................................................... 151
2.29.1 Alerta............................................................................................................................................................. 151
2.29.2 Alerta............................................................................................................................................................. 151
2.29.1 (en) alert....................................................................................................................................................... 151
2.29.2 (en) Alert....................................................................................................................................................... 151
2.29.3 (en) Alert....................................................................................................................................................... 151
2.29.4 (en) Alert....................................................................................................................................................... 151
2.29.5 (fr) Alerte...................................................................................................................................................... 151
2.30 Algoritmo................................................................................................................................................................ 151
2.30.1 Algoritmo...................................................................................................................................................... 151
2.30.2 (en) algorithm.............................................................................................................................................. 152
2.30.3 (en) Algorithm.............................................................................................................................................. 152
2.30.4 (fr) Algorithme............................................................................................................................................. 152
2.31 Algoritmo
criptográfico....................................................................................................................................... 152
2.31.1 Algoritmo criptográfico.............................................................................................................................. 152
2.31.2 (en) cryptographic algorithm.................................................................................................................... 152
2.31.3 (en) cryptographic algorithm.................................................................................................................... 152
2.31.4 (en) Cryptographic Algorithm................................................................................................................... 152
2.31.5 (en) Cryptographic algorithm................................................................................................................... 152
2.32 Algoritmo
criptográfico asimétrico.................................................................................................................... 153
2.32.1 algoritmo criptográfico asimétrico.......................................................................................................... 153
2.32.2 (en) Public key (asymmetric) cryptographic
algorithm........................................................................ 153
2.32.3 (en) asymmetric cryptographic algorithm.............................................................................................. 153
2.32.4 (fr) algorithme asymétrique de cryptographie...................................................................................... 153
2.33 Algoritmo
criptográfico simétrico...................................................................................................................... 153
2.33.1 algoritmo criptográfico simétrico............................................................................................................ 153
2.33.2 (en) Symmetric key algorithm................................................................................................................... 154
2.33.3 (en) Symmetric (secret-key based)
cryptographic algorithm.............................................................. 154
2.33.4 (en) symmetric encipherment algorithm................................................................................................ 154
2.33.5 (en) Symmetric cryptographic algorithm................................................................................................ 154
2.33.6 (fr) algorithme symétrique de cryptographie........................................................................................ 154
2.34 Algoritmo de
cálculo de códigos de autenticación de mensajes....................................................................... 154
2.34.1 (en) Message Authentication
Code (MAC) algorithm.......................................................................... 154
2.35 Algoritmo de
cifra.................................................................................................................................................. 155
2.35.1 Algoritmo de cifra....................................................................................................................................... 155
2.35.2 Algoritmo de cifra....................................................................................................................................... 155
2.35.3 Algoritmo Nacional de Cifra...................................................................................................................... 155
2.35.4 Algoritmo personalizable........................................................................................................................... 155
2.35.5 Algoritmo privatizable o personalizable................................................................................................. 155
2.35.6 (en) encryption algorithm.......................................................................................................................... 155
2.35.7 (en) encryption algorithm.......................................................................................................................... 156
2.35.8 (fr) Algorithme de chiffrement.................................................................................................................. 156
2.36 Algoritmo de
descifrado........................................................................................................................................ 156
2.36.1 Algoritmo de descifrado............................................................................................................................ 156
2.36.2 (en) decryption algorithm.......................................................................................................................... 156
2.37 Algoritmo
Diffie-Hellman..................................................................................................................................... 156
2.37.1 Intercambio exponencial DIFFIE-HELLMAN............................................................................................ 156
2.37.2 (en) Diffie-Hellman /
Diffie-Hellman-Merkle.......................................................................................... 156
2.37.3 (en) Diffie-Hellman Algorithm.................................................................................................................. 157
2.37.4 (en) Diffie-Hellman...................................................................................................................................... 157
2.38 Algoritmo
irreversible........................................................................................................................................... 157
2.38.1 Algoritmo irreversible................................................................................................................................. 157
2.38.2 Algoritmo irreversible................................................................................................................................. 157
2.39 Algoritmo
público.................................................................................................................................................. 157
2.39.1 Algoritmo público........................................................................................................................................ 157
2.39.2 (en) Public algorithm.................................................................................................................................. 157
2.40 Algoritmo
reversible.............................................................................................................................................. 157
2.40.1 Cifrado reversible........................................................................................................................................ 158
2.40.2 Algoritmo reversible................................................................................................................................... 158
2.40.3 (en) Reversible encryption......................................................................................................................... 158
2.41 Algoritmo
secreto.................................................................................................................................................. 158
2.41.1 Algoritmo secreto....................................................................................................................................... 158
2.41.2 (en) Secret algorithm.................................................................................................................................. 158
2.42 Alta
disponibilidad.................................................................................................................................................. 158
2.42.1 Alta disponibilidad...................................................................................................................................... 158
2.42.2 Alta Disponibilidad...................................................................................................................................... 158
2.42.3 (en) High availability.................................................................................................................................. 159
2.42.4 (en) High Availability.................................................................................................................................. 159
2.42.5 (fr) Haute disponibilité............................................................................................................................... 159
2.43 Amenaza................................................................................................................................................................... 159
2.43.1 amenaza:...................................................................................................................................................... 159
2.43.2 Amenaza....................................................................................................................................................... 159
2.43.3 Amenaza....................................................................................................................................................... 159
2.43.4 Amenaza....................................................................................................................................................... 160
2.43.5 Amenaza....................................................................................................................................................... 160
2.43.6 Motivación................................................................................................................................................... 160
2.43.7 Elemento peligroso..................................................................................................................................... 160
2.43.8 Amenazas..................................................................................................................................................... 160
2.43.9 amenaza....................................................................................................................................................... 160
2.43.10 Amenaza....................................................................................................................................................... 160
2.43.11 Amenaza....................................................................................................................................................... 160
2.43.12 amenaza....................................................................................................................................................... 161
2.43.13 (en) threat.................................................................................................................................................... 161
2.43.14 (en) Threat.................................................................................................................................................... 161
2.43.1 (en) Threat.................................................................................................................................................... 161
2.43.2 (en) Threat.................................................................................................................................................... 161
2.43.3 (en) Threat event......................................................................................................................................... 161
2.43.4 (en) THREAT................................................................................................................................................. 161
2.43.5 (en) threat.................................................................................................................................................... 162
2.43.6 (en) threat action........................................................................................................................................ 163
2.43.7 (en) threat agent......................................................................................................................................... 163
2.43.8 (en) threat analysis..................................................................................................................................... 163
2.43.9 (en) threat.................................................................................................................................................... 163
2.43.10 (en) threat agent......................................................................................................................................... 163
2.43.11 (en) Threat.................................................................................................................................................... 163
2.43.12 (en) Threat.................................................................................................................................................... 163
2.43.13 (en) Threat.................................................................................................................................................... 163
2.43.14 (en) Motivation............................................................................................................................................ 164
2.43.15 (en) Threat.................................................................................................................................................... 164
2.43.16 (en) Threat.................................................................................................................................................... 164
2.43.17 (en) Threat.................................................................................................................................................... 164
2.43.18 (en) threat.................................................................................................................................................... 164
2.43.19 (en) Threat.................................................................................................................................................... 164
2.43.20 (en) Threat.................................................................................................................................................... 164
2.43.21 (en) Threat.................................................................................................................................................... 164
2.43.22 (en) threat.................................................................................................................................................... 164
2.43.23 (en) Threat.................................................................................................................................................... 165
2.43.24 (en) Threat.................................................................................................................................................... 165
2.43.25 (en) threat analysis..................................................................................................................................... 165
2.43.26 (en) THREAT ASSESSMENT........................................................................................................................ 165
2.43.27 (en) Threat Assessment.............................................................................................................................. 165
2.43.28 (en) Threat Source....................................................................................................................................... 165
2.43.29 (en) Threat agent........................................................................................................................................ 165
2.43.30 (en) threat source....................................................................................................................................... 166
2.43.31 (en) Threat Model....................................................................................................................................... 166
2.43.32 (en) Threat Vector....................................................................................................................................... 166
2.43.33 (en) threat.................................................................................................................................................... 166
2.43.34 (en) Threat.................................................................................................................................................... 166
2.43.35 (en) Menace................................................................................................................................................. 166
2.43.36 (fr) Menace................................................................................................................................................... 166
2.43.37 (fr) Menace................................................................................................................................................... 167
2.43.38 (fr) Motivation............................................................................................................................................. 167
2.43.39 (fr) Élément menaçant............................................................................................................................... 167
2.43.40 (fr) menace................................................................................................................................................... 167
2.43.41 (fr) Source de menace................................................................................................................................ 167
2.43.42 (fr) Menace................................................................................................................................................... 167
2.44 Amenaza activa....................................................................................................................................................... 167
2.44.1 Amenaza activa........................................................................................................................................... 167
2.44.2 amenaza activa........................................................................................................................................... 168
2.44.3 (en) Active threat........................................................................................................................................ 168
2.44.4 (fr) menace active....................................................................................................................................... 168
2.45 Amenaza externa..................................................................................................................................................... 168
2.45.1 Amenaza externa........................................................................................................................................ 168
2.45.2 (en) outside(r) threat.................................................................................................................................. 168
2.46 Amenaza interna..................................................................................................................................................... 168
2.46.1 Amenaza interna......................................................................................................................................... 169
2.46.2 (en) inside(r) threat..................................................................................................................................... 169
2.46.1 (en) Internal threat..................................................................................................................................... 169
2.47 Amenaza pasiva........................................................................................................................................................ 169
2.47.1 Amenaza pasiva.......................................................................................................................................... 169
2.47.2 amenaza pasiva........................................................................................................................................... 169
2.47.3 (en) Passive threat...................................................................................................................................... 169
2.47.4 (fr) menace passive..................................................................................................................................... 169
2.48 Amenazas
Avanzadas Persistentes (APT).............................................................................................................. 169
2.48.1 Amenazas Avanzadas Persistentes (APT)............................................................................................... 170
2.48.2 (en) Advanced persistent threat (APT).................................................................................................... 170
2.48.3 (en) Advanced Persistent Threat.............................................................................................................. 170
2.48.4 (en) advanced persistent threat (APT).................................................................................................... 170
2.48.5 (en) Advanced Persistent Threats (APT).................................................................................................. 171
2.48.6 (en) Advanced persistent threat (APT).................................................................................................... 171
2.48.7 (en) APT: Advanced Persistent Threat..................................................................................................... 171
2.49 Ampliación............................................................................................................................................................... 171
2.49.1 Ampliación.................................................................................................................................................... 171
2.49.2 (en) Augmentation...................................................................................................................................... 171
2.50 Análisis de
fallos..................................................................................................................................................... 171
2.50.1 Análisis de fallos.......................................................................................................................................... 172
2.50.2 (en) Security Fault Analysis (SFA)............................................................................................................. 172
2.50.3 (en) security fault analysis......................................................................................................................... 172
2.50.4 (en) Fault analysis....................................................................................................................................... 172
2.50.5 (en) Fault Analysis....................................................................................................................................... 172
2.51 Análisis de
impacto en el negocio (BIA)................................................................................................................ 172
2.51.1 Análisis de Impacto del Negocio (BIA)..................................................................................................... 172
2.51.2 Análisis de impacto..................................................................................................................................... 172
2.51.3 Análisis de impacto en el negocio (BIA).................................................................................................. 172
2.51.4 (en) Business Impact Analysis (BIA)......................................................................................................... 173
2.51.5 (en) Business Impact Analysis (BIA)......................................................................................................... 173
2.51.6 (en) business impact analysis.................................................................................................................... 173
2.51.7 (en) What is a business impact analysis (BIA)?...................................................................................... 173
2.51.8 (en) Business impact analysis (BIA).......................................................................................................... 173
2.51.9 (EN) Business Impact Analysis (BIA)......................................................................................................... 173
2.51.10 (en) Business Impact Analysis (BIA)......................................................................................................... 173
2.51.11 (fr) Analyse d’impact sur
le business (BIA)............................................................................................. 174
2.52 Análisis de
paquetes TCP........................................................................................................................................ 174
2.52.1 Análisis de paquetes TCP........................................................................................................................... 174
2.52.2 (en) Passive Fingerprinting........................................................................................................................ 174
2.52.3 (en) TCP Fingerprinting.............................................................................................................................. 174
2.53 Análisis de
riesgos................................................................................................................................................... 174
2.53.1 análisis del riesgo........................................................................................................................................ 174
2.53.2 Análisis de riesgos....................................................................................................................................... 174
2.53.3 análisis del riesgo........................................................................................................................................ 175
2.53.4 análisis de riesgos....................................................................................................................................... 175
2.53.5 análisis de riesgos....................................................................................................................................... 175
2.53.6 (en) risk analysis.......................................................................................................................................... 175
2.53.7 (en) risk analysis.......................................................................................................................................... 175
2.53.1 (en) risk analysis.......................................................................................................................................... 175
2.53.2 (en) Risk analysis......................................................................................................................................... 175
2.53.3 (en) RISK ANALYSIS:.................................................................................................................................... 175
2.53.4 (en) risk analysis.......................................................................................................................................... 176
2.53.5 (en) risk analysis.......................................................................................................................................... 176
2.53.6 (en) risk analysis.......................................................................................................................................... 176
2.53.7 (en) Risk Analysis......................................................................................................................................... 176
2.53.8 (en) risk analysis.......................................................................................................................................... 176
2.53.9 (fr) analyse du risque.................................................................................................................................. 176
2.54 Análisis de
tiempos.................................................................................................................................................. 176
2.54.1 Análisis de tiempos..................................................................................................................................... 176
2.54.2 (en) Timing Analysis.................................................................................................................................... 177
2.55 Análisis de
tráfico................................................................................................................................................... 177
2.55.1 Análisis de tráfico........................................................................................................................................ 177
2.55.2 análisis del tráfico....................................................................................................................................... 177
2.55.3 (en) traffic analysis..................................................................................................................................... 177
2.55.4 (en) traffic analysis..................................................................................................................................... 177
2.55.5 (en) Traffic analysis..................................................................................................................................... 178
2.55.6 (fr) analyse du trafic................................................................................................................................... 178
2.56 Análisis de
vulnerabilidades................................................................................................................................... 178
2.57 Análisis
diferencial de consumo............................................................................................................................ 178
2.57.1 Análisis diferencial de consumo............................................................................................................... 178
2.57.2 (en) differential power analysis (DPA)..................................................................................................... 178
2.57.3 (en) Differential power analysis............................................................................................................... 178
2.58 Análisis
forense....................................................................................................................................................... 178
2.58.1 Herramientas forenses............................................................................................................................... 178
2.58.2 Análisis forense............................................................................................................................................ 179
2.58.3 (en) Computer forensics............................................................................................................................. 179
2.58.4 (en) Digital forensics................................................................................................................................... 179
2.58.5 (en) Forensic examination......................................................................................................................... 179
2.58.6 (en) forensics................................................................................................................................................ 179
2.58.7 (en) Computer Forensics............................................................................................................................ 179
2.58.8 (en) forensic copy........................................................................................................................................ 180
2.58.9 (en) Computer Forensics............................................................................................................................ 180
2.58.10 (en) Forensics............................................................................................................................................... 180
2.58.11 (en) Computer forensics............................................................................................................................. 180
2.58.12 (en) forensic-enabled intelligence............................................................................................................ 180
2.58.13 (fr) Informatique légale.............................................................................................................................. 180
2.59 Análisis
heurístico.................................................................................................................................................. 180
2.59.1 Análisis heurístico....................................................................................................................................... 181
2.59.2 (en) Heuristic analysis................................................................................................................................ 181
2.60 Análisis simple
de consumo.................................................................................................................................... 181
2.60.1 Análisis simple de consumo....................................................................................................................... 181
2.60.2 (en) simple power analysis (SPA)............................................................................................................. 181
2.60.3 (en) Simple power analysis........................................................................................................................ 181
2.61 Anonimato............................................................................................................................................................... 181
2.61.1 anonimato.................................................................................................................................................... 181
2.61.2 anónimo........................................................................................................................................................ 182
2.61.3 (en) anonymity............................................................................................................................................ 182
2.61.4 (en) anonymity............................................................................................................................................ 182
2.61.5 (en) Anonymity............................................................................................................................................ 182
2.62 Anonymizer.............................................................................................................................................................. 182
2.62.1 anonymizer................................................................................................................................................... 182
2.62.2 (en) anonymizer.......................................................................................................................................... 182
2.62.3 (en) Anonymizer (also see Anonymous remailer).................................................................................. 183
2.62.4 (en) Anonymizer.......................................................................................................................................... 183
2.62.5 (en) Anonymization and de-identification.............................................................................................. 183
2.62.6 (en) De-identification................................................................................................................................. 183
2.62.7 (fr) Anonymiseur......................................................................................................................................... 183
2.63 Anonymous
remailer.............................................................................................................................................. 183
2.63.1 Anonymous remailer.................................................................................................................................. 184
2.63.2 (en) Anonymous remailer (also see Anonymizer).................................................................................. 184
2.64 Anti
automatización............................................................................................................................................... 184
2.64.1 Anti automatización................................................................................................................................... 184
2.64.2 (en) Anti-Automation................................................................................................................................. 184
2.65 Anti-spam................................................................................................................................................................. 184
2.65.1 Anti-spam..................................................................................................................................................... 184
2.65.2 (en) Anti-spam............................................................................................................................................. 184
2.66 Anti-spoof................................................................................................................................................................ 184
2.66.1 Anti-spoof..................................................................................................................................................... 185
2.66.2 (en) anti-spoof............................................................................................................................................. 185
2.67 Anti-spyware........................................................................................................................................................... 185
2.67.1 Anti-spyware................................................................................................................................................ 185
2.67.2 (en) Anti-spyware........................................................................................................................................ 185
2.67.3 (fr) Antispyware........................................................................................................................................... 185
2.68 Anti-virus................................................................................................................................................................. 185
2.68.1 Antivirus........................................................................................................................................................ 185
2.68.2 Antivirus........................................................................................................................................................ 186
2.68.3 (en) Antivirus Software.............................................................................................................................. 186
2.68.4 (en) Anti-Virus.............................................................................................................................................. 186
2.68.5 (en) Anti-virus.............................................................................................................................................. 186
2.68.6 (fr) Antivirus................................................................................................................................................. 186
2.68.7 (fr) Antivirus................................................................................................................................................. 186
2.68.8 (fr) Antivirus................................................................................................................................................. 186
2.69 aostic........................................................................................................................................................................ 187
2.70 Apéndice................................................................................................................................................................... 187
2.70.1 Apéndice....................................................................................................................................................... 187
2.70.2 (en) Appendix............................................................................................................................................... 187
2.71 Aplicación................................................................................................................................................................ 187
2.71.1 Aplicación..................................................................................................................................................... 187
2.71.2 (en) application........................................................................................................................................... 187
2.72 Apreciación de
los riesgos...................................................................................................................................... 187
2.72.1 apreciación del riesgo................................................................................................................................ 187
2.72.2 apreciación del riesgo................................................................................................................................ 188
2.72.3 Análisis de riesgos / Evaluación de riesgos............................................................................................ 188
2.72.4 Gravamen de Riesgo................................................................................................................................... 188
2.72.5 (en) risk assessment................................................................................................................................... 188
2.72.6 (en) risk assessment................................................................................................................................... 188
2.72.7 (en) Risk Assessment.................................................................................................................................. 188
2.72.1 (en) Risk assessment................................................................................................................................... 188
2.72.2 (en) RISK ASSESSMENT............................................................................................................................... 189
2.72.3 (en) QUALITATIVE RISK ASSESSMENT METHODOLOGY........................................................................ 189
2.72.4 (en) QUANTITATIVE RISK ASSESSMENT METHODOLOGY.................................................................... 189
2.72.5 (en) SEMI-QUANTITATIVE RISK ASSESSMENT
METHODOLOGY.......................................................... 189
2.72.6 (en) Risk Assessment.................................................................................................................................. 189
2.72.7 (en) Risk assessment................................................................................................................................... 190
2.72.8 (en) Risk Analysis / Risk Assessment:...................................................................................................... 190
2.72.9 (en) Risk assessment................................................................................................................................... 190
2.72.10 Risk Analysis................................................................................................................................................. 190
2.72.11 (fr) appréciation du risque......................................................................................................................... 190
2.72.12 (fr) Analyse / Évaluation des risques....................................................................................................... 190
2.73 Árboles de
ataque................................................................................................................................................... 190
2.73.1 árbol de ataque........................................................................................................................................... 191
2.73.2 (en) attack tree............................................................................................................................................ 191
2.73.3 (en) attack tree............................................................................................................................................ 191
2.74 Árbol de
llamadas.................................................................................................................................................. 191
2.74.1 Árbol de llamadas....................................................................................................................................... 191
2.74.2 (en) Call Tree................................................................................................................................................ 191
2.75 Área
confidencial.................................................................................................................................................... 192
2.75.1 Área confidencial........................................................................................................................................ 192
2.75.2 (en) Sensitive Area:..................................................................................................................................... 192
2.75.3 (fr) Zone sensible......................................................................................................................................... 192
2.76 Área de acceso
controlado................................................................................................................................... 192
2.76.1 Área de acceso controlado........................................................................................................................ 192
2.76.2 (en) Controlled Area................................................................................................................................... 192
2.76.3 (en) controlled access area........................................................................................................................ 192
2.76.4 (en) controlled area.................................................................................................................................... 192
2.77 Arquitectura de
seguridad.................................................................................................................................... 193
2.77.1 Arquitectura de seguridad......................................................................................................................... 193
2.77.2 (en) security architecture........................................................................................................................... 193
2.77.3 (en) IT Security Architecture...................................................................................................................... 193
2.78 ASN.1 -
Abstract Syntax Notation One................................................................................................................ 193
2.78.1 ASN.1 - Abstract Syntax Notation One.................................................................................................... 193
2.78.2 (en) ASN.1 - Abstract Syntax Notation One............................................................................................ 193
2.79 Asociación de
seguridad (SA)................................................................................................................................. 193
2.79.1 Asociación de seguridad (SA).................................................................................................................... 194
2.79.2 (en) security association............................................................................................................................ 194
2.79.3 (en) security association............................................................................................................................ 194
2.79.4 (en) Security association (SA).................................................................................................................... 194
2.80 asymmetric_cipher.................................................................................................................................................. 194
2.80.1 (en) asymmetric cipher.............................................................................................................................. 194
2.80.2 (en) asymmetric cipher.............................................................................................................................. 195
2.81 Ataque...................................................................................................................................................................... 195
2.81.1 Ataque........................................................................................................................................................... 195
2.81.2 ataque........................................................................................................................................................... 195
2.81.3 Ataque........................................................................................................................................................... 195
2.81.4 Ataque........................................................................................................................................................... 195
2.81.5 Ataque........................................................................................................................................................... 195
2.81.6 (en) attack.................................................................................................................................................... 196
2.81.1 (en) Attack.................................................................................................................................................... 196
2.81.2 (en) attack.................................................................................................................................................... 196
2.81.3 (en) Attacker................................................................................................................................................ 197
2.81.4 (en) Attack.................................................................................................................................................... 197
2.81.5 (en) Attack.................................................................................................................................................... 197
2.81.6 (en) attack.................................................................................................................................................... 197
2.81.1 (en) attack.................................................................................................................................................... 197
2.81.2 (en) ATTACK PATH....................................................................................................................................... 197
2.81.3 (en) attack path........................................................................................................................................... 198
2.81.4 (en) attack pattern...................................................................................................................................... 198
2.81.5 (en) attacker................................................................................................................................................ 198
2.81.6 (en) Attack.................................................................................................................................................... 198
2.81.7 (en) Attacker................................................................................................................................................ 198
2.81.8 (en) Off-line Attack..................................................................................................................................... 198
2.81.9 (en) Online Attack....................................................................................................................................... 198
2.81.10 (en) Attack Surface..................................................................................................................................... 198
2.81.11 (en) Attack Vector....................................................................................................................................... 199
2.81.12 (fr) Attaque................................................................................................................................................... 199
2.81.13 (fr) Attaque................................................................................................................................................... 199
2.82 Ataque activo.......................................................................................................................................................... 199
2.82.1 Ataque activo............................................................................................................................................... 199
2.82.1 (en) active attack........................................................................................................................................ 199
2.82.1 (en) Active attack........................................................................................................................................ 199
2.83 Ataque
"encontrarse en el medio"........................................................................................................................ 199
2.83.1 Ataque
"encontrarse en el medio"........................................................................................................... 199
2.83.2 (en) Meet in the middle attack................................................................................................................. 200
2.84 Ataque con sólo
texto cifrado.............................................................................................................................. 200
2.84.1 Ataque con sólo texto cifrado................................................................................................................... 200
2.84.2 (en) ciphertext-only attack........................................................................................................................ 200
2.84.3 (en) Cyphertext only attack....................................................................................................................... 200
2.85 Ataque con
texto cifrado escogido...................................................................................................................... 200
2.85.1 Ataque con texto cifrado escogido.......................................................................................................... 200
2.85.2 (en) chosen-ciphertext attack................................................................................................................... 200
2.85.3 (en) Chosen cyphertext attack.................................................................................................................. 200
2.86 Ataque con
texto en claro conocido.................................................................................................................... 201
2.86.1 Ataque con
texto en claro conocido........................................................................................................ 201
2.86.2 (en) known-plaintext attack...................................................................................................................... 201
2.86.3 (en) Known plaintext attack...................................................................................................................... 201
2.87 Ataque con
texto en claro escogido..................................................................................................................... 201
2.87.1 Ataque con texto
en claro escogido......................................................................................................... 201
2.87.2 (en) chosen-plaintext attack..................................................................................................................... 202
2.87.3 (en) Chosen plaintext attack..................................................................................................................... 202
2.88 Ataque
controlado................................................................................................................................................ 202
2.88.1 Ataque controlado...................................................................................................................................... 202
2.88.2 Hacking Ético............................................................................................................................................... 202
2.88.3 (en) White hat.............................................................................................................................................. 202
2.88.4 (en) ethical hacker...................................................................................................................................... 202
2.88.5 (en) White Hat............................................................................................................................................. 203
2.89 Ataque del
cumpleaños.......................................................................................................................................... 203
2.89.1 Ataque del cumpleaños............................................................................................................................. 203
2.89.2 (en) birthday attack.................................................................................................................................... 203
2.89.3 (en) Birthday attack.................................................................................................................................... 203
2.90 Ataque dirigido....................................................................................................................................................... 203
2.90.1 Ataque dirigido............................................................................................................................................ 203
2.90.1 (EN) Targeted Attacks................................................................................................................................ 204
2.91 Ataque
distribuido.................................................................................................................................................. 204
2.91.1 Ataque distribuido...................................................................................................................................... 204
2.91.2 (en) distributed attack................................................................................................................................ 204
2.92 Ataque
exhaustivo.................................................................................................................................................. 204
2.93 Ataque pasivo.......................................................................................................................................................... 204
2.93.1 Ataque pasivo.............................................................................................................................................. 204
2.93.1 (en) Passive Attack...................................................................................................................................... 205
2.93.2 (en) passive attack...................................................................................................................................... 205
2.94 Ataque por
arranque en frio................................................................................................................................. 205
2.94.1 Ataque por arranque en frio..................................................................................................................... 205
2.94.2 Cold boot attack.......................................................................................................................................... 205
2.95 Ataque por
canal colateral.................................................................................................................................. 205
2.96 Ataque por
deslizamiento...................................................................................................................................... 205
2.96.1 Ataque por deslizamiento.......................................................................................................................... 205
2.96.2 (en) Slide sttack........................................................................................................................................... 205
2.97 Ataque por
diccionario.......................................................................................................................................... 206
2.97.1 Ataque de diccionario................................................................................................................................ 206
2.97.2 (en) dictionary attack................................................................................................................................. 206
2.97.3 (en) Dictionary Attack................................................................................................................................ 206
2.97.4 (en) dictionary attacks............................................................................................................................... 206
2.97.5 (en) Dictionary Attack................................................................................................................................ 207
2.97.6 (fr) Dictionnaire (Attaque par).................................................................................................................. 207
2.98 Ataque por
fuerza bruta........................................................................................................................................ 207
2.98.1 Ataque exhaustivo...................................................................................................................................... 207
2.98.2 (en) brute force............................................................................................................................................ 208
2.98.3 (en) Brute force attack............................................................................................................................... 208
2.98.4 (en) Brute Force........................................................................................................................................... 208
2.98.5 (en) Brute force............................................................................................................................................ 208
2.98.6 (en) Brute Force........................................................................................................................................... 208
2.99 Ataque por
microfragmentos de TCP/IP.............................................................................................................. 208
2.99.1 Ataque por
microfragmentos de TCP/IP................................................................................................. 208
2.99.2 (en) Tiny Fragment Attack......................................................................................................................... 208
2.100 Ataque por
superposición de fragmentos TCP.................................................................................................... 209
2.100.1 Ataque por
superposición de fragmentos TCP....................................................................................... 209
2.100.2 (en) Fragment Overlap Attack.................................................................................................................. 209
2.101 Ataques a la
criptografía...................................................................................................................................... 209
2.102 Ataques a la
validación de datos.......................................................................................................................... 210
2.102.1 Ataques a la
validación de datos............................................................................................................. 210
2.102.2 (en) Input Validation Attacks.................................................................................................................... 210
2.103 Ataques
algebraicos............................................................................................................................................... 210
2.103.1 Ataques algebraicos................................................................................................................................... 210
2.103.2 (en) Algebraic attack.................................................................................................................................. 210
2.104 Ataques de
reproducción....................................................................................................................................... 210
2.104.1 Ataques de reproducción........................................................................................................................... 210
2.104.2 (en) Replay Attack....................................................................................................................................... 210
2.104.3 (en) replay attack........................................................................................................................................ 211
2.104.4 (en) replay attack........................................................................................................................................ 211
2.104.5 (en) Replay Attacks..................................................................................................................................... 211
2.104.6 (en) Replay attack....................................................................................................................................... 211
2.105 Ataques por
inferencia........................................................................................................................................... 211
2.105.1 inferir............................................................................................................................................................. 211
2.105.2 Ataques por inferencia............................................................................................................................... 211
2.105.3 (en) inference............................................................................................................................................... 211
2.105.4 (en) Inference attacks................................................................................................................................. 211
2.106 Ataques por
monitorización.................................................................................................................................. 212
2.106.1 Ataques por monitorización...................................................................................................................... 212
2.106.2 (en) monitoring attacks............................................................................................................................. 212
2.107 Atributo................................................................................................................................................................... 212
2.107.1 Atributo......................................................................................................................................................... 212
2.107.2 (en) attribute................................................................................................................................................ 212
2.107.3 (en) Attribute............................................................................................................................................... 212
2.107.4 (en) Attribute............................................................................................................................................... 212
2.108 Atributo de
seguridad............................................................................................................................................ 213
2.108.1 Atributo de seguridad................................................................................................................................ 213
2.108.2 (en) security attribute................................................................................................................................ 213
2.109 Auditoría................................................................................................................................................................. 213
2.109.1 auditar.......................................................................................................................................................... 213
2.109.2 Auditoría....................................................................................................................................................... 213
2.109.3 Auditoría....................................................................................................................................................... 214
2.109.4 Auditoría....................................................................................................................................................... 214
2.109.5 auditoría....................................................................................................................................................... 214
2.109.6 Auditoría de sistemas de información..................................................................................................... 214
2.109.7 (en) audit...................................................................................................................................................... 214
2.109.1 (en) Audit...................................................................................................................................................... 215
2.109.2 (en) audit...................................................................................................................................................... 215
2.109.3 (en) Audit...................................................................................................................................................... 215
2.109.4 (en) Audit...................................................................................................................................................... 215
2.109.5 (en) Audit and audit trails.......................................................................................................................... 215
2.109.6 (en) Audit tools............................................................................................................................................ 216
2.109.7 (en) Auditing................................................................................................................................................ 216
2.109.8 (en) Auditor.................................................................................................................................................. 216
2.109.9 (fr) Audit....................................................................................................................................................... 216
2.109.10 (fr) Audit....................................................................................................................................................... 216
2.110 Auditoría de
seguridad........................................................................................................................................... 216
2.110.1 Auditoría de la seguridad.......................................................................................................................... 216
2.110.2 Auditoría de seguridad............................................................................................................................... 216
2.110.3 Auditoría de seguridad............................................................................................................................... 217
2.110.4 Auditoría de seguridad............................................................................................................................... 217
2.110.5 auditoría de seguridad............................................................................................................................... 217
2.110.6 Auditoría de
seguridad de sistemas de información............................................................................ 217
2.110.7 (en) security audit....................................................................................................................................... 217
2.110.8 (en) Security audit....................................................................................................................................... 218
2.110.9 (en) Security audit....................................................................................................................................... 218
2.110.10 (fr) audit de sécurité................................................................................................................................... 218
2.111 Autenticación.......................................................................................................................................................... 218
2.111.1 Autenticación............................................................................................................................................... 218
2.111.2 Autenticación............................................................................................................................................... 219
2.111.3 Autenticación............................................................................................................................................... 219
2.111.4 autenticación............................................................................................................................................... 219
2.111.5 Autenticación............................................................................................................................................... 219
2.111.6 Autenticación............................................................................................................................................... 219
2.111.7 Autenticación............................................................................................................................................... 219
2.111.8 Autenticación............................................................................................................................................... 219
2.111.9 Autenticación............................................................................................................................................... 219
2.111.10 Autenticación simple.................................................................................................................................. 220
2.111.11 Autentificación............................................................................................................................................ 220
2.111.12 Autenticación (simple) o autentificación................................................................................................ 220
2.111.13 autenticación............................................................................................................................................... 220
2.111.1 Datos confidenciales de autenticación.................................................................................................... 220
2.111.2 (en) authentication..................................................................................................................................... 220
2.111.3 (en) authenticate........................................................................................................................................ 220
2.111.1 (en) authentication..................................................................................................................................... 221
2.111.2 (en) Authentication..................................................................................................................................... 221
2.111.3 (en) Authentication Protocol..................................................................................................................... 221
2.111.4 (en) authenticate........................................................................................................................................ 221
2.111.1 (en) Authentication..................................................................................................................................... 221
2.111.2 (en) Authentication mechanism............................................................................................................... 221
2.111.3 (en) authentication protocol..................................................................................................................... 221
2.111.4 (en) authentication..................................................................................................................................... 221
2.111.5 (en) Authentication..................................................................................................................................... 222
2.111.6 (en) Authentication..................................................................................................................................... 222
2.111.7 (en) Authentication..................................................................................................................................... 222
2.111.8 (en) Authentication..................................................................................................................................... 222
2.111.9 (en) Authentication..................................................................................................................................... 222
2.111.10 (en) Simple authentication........................................................................................................................ 222
2.111.11 (en) authentication..................................................................................................................................... 223
2.111.12 (en) Authentication..................................................................................................................................... 223
2.111.13 (en) Authentication..................................................................................................................................... 223
2.111.14 (en) authentication..................................................................................................................................... 223
2.111.15 (en) Mutual entity authentication........................................................................................................... 223
2.111.16 (en) Authenticated Identity....................................................................................................................... 223
2.111.17 (en) Authentication..................................................................................................................................... 223
2.111.18 (en) authentication..................................................................................................................................... 223
2.111.19 (en) authentication..................................................................................................................................... 223
2.111.20 (en) Sensitive Authentication Data:......................................................................................................... 223
2.111.21 (en) authentication..................................................................................................................................... 224
2.111.22 (en) Authentication..................................................................................................................................... 224
2.111.23 (en) Authentication..................................................................................................................................... 224
2.111.24 (en) Authentication..................................................................................................................................... 224
2.111.25 (en)Authentication and Authorization.................................................................................................... 224
2.111.26 (fr) authentification.................................................................................................................................... 225
2.111.27 (fr) Authentification.................................................................................................................................... 225
2.111.28 (fr) Authentification mutuelle................................................................................................................... 225
2.111.29 (fr) authentification.................................................................................................................................... 225
2.111.30 (fr) Authentification.................................................................................................................................... 225
2.112 Autenticación con
2 elementos............................................................................................................................. 225
2.112.1 Autenticación con 2 elementos................................................................................................................ 226
2.112.2 Autenticación de dos factores.................................................................................................................. 226
2.112.3 (en) Two-factor authentication................................................................................................................ 226
2.112.4 (en) Two-Factor Authentication............................................................................................................... 226
2.112.5 (fr) Authentification à deux facteurs....................................................................................................... 226
2.113 Autenticación con
tres elementos........................................................................................................................ 226
2.113.1 Autenticación con tres elementos............................................................................................................ 226
2.113.2 (en) Three-Factor Authentication............................................................................................................. 227
2.114 Autenticación de
la otra parte.............................................................................................................................. 227
2.114.1 Autenticación de la otra parte.................................................................................................................. 227
2.114.2 autenticación de entidad par.................................................................................................................... 227
2.114.3 (en) peer-entity authentication................................................................................................................ 227
2.114.4 (en) Peer-entity authentication................................................................................................................ 227
2.114.5 (fr) authentification de l'entité homologue............................................................................................ 227
2.115 Autenticación de
una entidad................................................................................................................................ 227
2.115.1 Autenticación de una entidad................................................................................................................... 227
2.115.2 Autenticación de una entidad homologada........................................................................................... 228
2.115.3 (en) Entity authentication.......................................................................................................................... 228
2.115.4 (en) Unilateral authentication.................................................................................................................. 228
2.115.5 (en) Mutual authentication (two-way authentication)........................................................................ 228
2.116 Autenticación
fuerte.............................................................................................................................................. 228
2.116.1 autenticación fuerte................................................................................................................................... 228
2.116.1 Autenticación fuerte................................................................................................................................... 228
2.116.2 Autenticación
compleja o fuerte (strong)............................................................................................... 228
2.116.3 (en) strong authentication........................................................................................................................ 229
2.116.4 (fr) authentification forte.......................................................................................................................... 229
2.117 Autenticación
multifactor.................................................................................................................................... 229
2.117.1 Autenticación multifactor.......................................................................................................................... 229
2.117.2 (en) Multi-Factor......................................................................................................................................... 229
2.117.3 (en) Multifactor Authentication............................................................................................................... 229
2.118 Autenticación
simple.............................................................................................................................................. 230
2.118.1 autenticación simple.................................................................................................................................. 230
2.118.2 (en) simple authentication........................................................................................................................ 230
2.118.3 (fr) authentification simple....................................................................................................................... 230
2.119 Autenticador........................................................................................................................................................... 230
2.119.1 Autenticador................................................................................................................................................ 230
2.119.2 (en) Authenticator....................................................................................................................................... 230
2.119.3 (en) Authenticator....................................................................................................................................... 230
2.120 Autenticar............................................................................................................................................................... 230
2.120.1 Autenticar..................................................................................................................................................... 231
2.120.2 (en) Authenticate........................................................................................................................................ 231
2.120.3 (en) authenticate........................................................................................................................................ 231
2.120.4 (en) Authenticate........................................................................................................................................ 231
2.120.5 (en) Authenticate........................................................................................................................................ 231
2.121 Autenticidad............................................................................................................................................................ 231
2.121.1 auténtico....................................................................................................................................................... 231
2.121.2 Autenticidad................................................................................................................................................. 231
2.121.3 autenticidad................................................................................................................................................. 231
2.121.4 (en) authenticity.......................................................................................................................................... 231
2.121.5 (en) authenticity.......................................................................................................................................... 232
2.121.6 (en) authenticity.......................................................................................................................................... 232
2.121.7 (en) Authenticity.......................................................................................................................................... 232
2.121.8 (en) Authenticity.......................................................................................................................................... 232
2.121.9 (en) Authenticity.......................................................................................................................................... 232
2.121.10 (en) Authenticity.......................................................................................................................................... 232
2.121.11 (fr) Authenticité........................................................................................................................................... 232
2.122 Autenticidad del
origen de la información.......................................................................................................... 232
2.122.1 Autenticación de origen de datos............................................................................................................ 232
2.122.2 autenticación
del origen de los datos...................................................................................................... 232
2.122.3 (en) data origin authentication................................................................................................................ 233
2.122.4 (en) data origin authentication................................................................................................................ 233
2.122.5 (en) data origin authentication................................................................................................................ 233
2.122.6 (en) data origin authentication................................................................................................................ 233
2.122.7 (en) data origin authentication................................................................................................................ 233
2.122.8 (fr) authentification de
l'origine des données........................................................................................ 233
2.123 Autoridad................................................................................................................................................................ 233
2.123.1 autoridad...................................................................................................................................................... 233
2.123.2 (en) Authority............................................................................................................................................... 233
2.123.3 (fr) autorité................................................................................................................................................... 234
2.124 Autoridad de
atributo............................................................................................................................................ 234
2.124.1 Autoridad de atributo................................................................................................................................ 234
2.124.2 autoridad de
atributo (AA, attribute authority).................................................................................... 234
2.124.3 (en) attribute authority (AA)..................................................................................................................... 234
2.124.4 (en) Attribute authority.............................................................................................................................. 234
2.124.5 (en) Attribute authority (AA)..................................................................................................................... 234
2.124.6 (fr) autorité d'attribut (AA)........................................................................................................................ 234
2.125 Autoridad de
certificación (AC)............................................................................................................................ 234
2.125.1 Autoridad de Certificación......................................................................................................................... 235
2.125.2 autoridad de certificación......................................................................................................................... 235
2.125.3 Autoridad de certificación (AC)................................................................................................................. 235
2.125.4 Autoridad de certificación......................................................................................................................... 235
2.125.5 autoridad de certificación......................................................................................................................... 235
2.125.1 (en) Certification authority (CA)............................................................................................................... 235
2.125.2 (en) certification authority (CA)................................................................................................................ 235
2.125.3 (en) Certification authority........................................................................................................................ 236
2.125.4 (en) certification authority........................................................................................................................ 236
2.125.5 (en) Certification authority........................................................................................................................ 236
2.125.6 (en) Certification authority........................................................................................................................ 236
2.125.7 (fr) autorité de certification...................................................................................................................... 236
2.125.8 (fr) autorité de certification...................................................................................................................... 236
2.125.9 (fr) AC (Autorité de
Certification)............................................................................................................. 236
2.125.10 (fr) Autorité de
certification...................................................................................................................... 236
2.126 Autoridad de
certificación raíz............................................................................................................................. 236
2.126.1 Autoridad de certificación raíz.................................................................................................................. 237
2.126.2 (en) Root Certification Authority.............................................................................................................. 237
2.127 Autoridad de
dominio de seguridad...................................................................................................................... 237
2.127.1 autoridad de dominio de seguridad........................................................................................................ 237
2.127.2 (en) Security domain authority................................................................................................................. 237
2.127.3 (fr) autorité du domaine
de sécurité........................................................................................................ 237
2.128 Autoridad de
evaluación........................................................................................................................................ 237
2.128.1 Autoridad de evaluación............................................................................................................................ 237
2.128.2 (en) evaluation authority........................................................................................................................... 237
2.129 Autoridad de
registro............................................................................................................................................ 238
2.129.1 Autoridad de registro................................................................................................................................. 238
2.129.2 (en) Registration Authority (RA)............................................................................................................... 238
2.129.3 (en) registration authority (RA)................................................................................................................ 238
2.129.4 (en) Registration Authority........................................................................................................................ 238
2.129.5 (fr) Autorité d'enregistrement.................................................................................................................. 238
2.130 Autoridad de
seguridad......................................................................................................................................... 239
2.130.1 autoridad de seguridad.............................................................................................................................. 239
2.130.2 (en) Security Authority............................................................................................................................... 239
2.130.3 (en) Security authority................................................................................................................................ 239
2.130.4 (fr) autorité de sécurité.............................................................................................................................. 239
2.131 Autoridad de
sellado de tiempo............................................................................................................................. 239
2.131.1 autoridad de sellado de tiempo................................................................................................................ 239
2.131.2 (en) Time-stamping authority (TSA)........................................................................................................ 239
2.131.3 (en) Time-stamping authority................................................................................................................... 239
2.132 Autoridad de
validación........................................................................................................................................ 239
2.132.1 Autoridades de validación......................................................................................................................... 240
2.132.2 (en) Validation authority........................................................................................................................... 240
2.133 Autorización........................................................................................................................................................... 240
2.133.1 Autorización................................................................................................................................................. 240
2.133.2 Autorización................................................................................................................................................. 240
2.133.3 Autorización................................................................................................................................................. 240
2.133.4 Autorización................................................................................................................................................. 241
2.133.5 autorización................................................................................................................................................. 241
2.133.6 (en) Authorization....................................................................................................................................... 241
2.133.7 (en) authorization....................................................................................................................................... 241
2.133.8 (en) authorization....................................................................................................................................... 241
2.133.9 (en) Authorization....................................................................................................................................... 242
2.133.10 (en) authorised user................................................................................................................................... 242
2.133.11 (en) Authorisation....................................................................................................................................... 242
2.133.12 (en) authorization....................................................................................................................................... 242
2.133.13 (en) authorization....................................................................................................................................... 242
2.133.14 (en) Authorization....................................................................................................................................... 242
2.133.15 (EN) Authorized Person.............................................................................................................................. 242
2.133.16 (en) Authorization....................................................................................................................................... 242
2.133.17 (en) authorization....................................................................................................................................... 242
2.133.18 (fr) autorisation........................................................................................................................................... 243
2.133.19 (fr) Autorisation........................................................................................................................................... 243
2.133.20 (fr) Autorisation........................................................................................................................................... 243
2.134 Autorización para
operar...................................................................................................................................... 243
2.134.1 Autorización para operar........................................................................................................................... 243
2.134.2 (en) Authorization (to operate)................................................................................................................ 243
2.134.3 (en) Authorization Boundary..................................................................................................................... 243
2.134.4 (en) Authorizing Official............................................................................................................................. 244
2.134.1 (en) Approval to Operate (ATO)............................................................................................................... 244
2.134.2 (en) authorization (to operate)................................................................................................................. 244
2.134.3 (en) interim approval to operate (IATO)................................................................................................. 244
2.135 Autoservicio de
Recuperación de contraseña...................................................................................................... 244
2.135.1 Autoservicio de Recuperación de contraseña........................................................................................ 244
2.135.2 (en) Self-service password reset (SSPR)................................................................................................... 245
2.136 BackOrifice.............................................................................................................................................................. 245
2.136.1 BackOrifice................................................................................................................................................... 245
2.136.2 (en) BackOrifice........................................................................................................................................... 245
2.136.3 (en) BackOrifice........................................................................................................................................... 246
2.137 Barrido de
puertos.................................................................................................................................................. 246
2.137.1 Escanear - puertos, direcciones IP............................................................................................................ 246
2.137.2 (en) port scanning....................................................................................................................................... 246
2.137.3 (en) scanning............................................................................................................................................... 246
2.137.4 (en) port scan............................................................................................................................................... 246
2.137.5 (en) Port Scanning....................................................................................................................................... 246
2.137.6 (en) Port Scan............................................................................................................................................... 246
2.137.7 (fr) Port scanning........................................................................................................................................ 247
2.138 Barrido IP................................................................................................................................................................ 247
2.138.1 Escanear - puertos, direcciones IP............................................................................................................ 247
2.138.2 (en) ping sweep........................................................................................................................................... 247
2.139 Base de datos de
gestión de la configuración (CMDB)....................................................................................... 247
2.139.1 Base de datos
de gestión de la configuración (CMDB)......................................................................... 248
2.139.2 (en) Configuration Management
Database (CMDB)............................................................................ 248
2.139.3 (fr) Gestion des
Configurations (CMDB).................................................................................................. 248
2.140 Base fiable de
procesamiento................................................................................................................................. 248
2.140.1 Base fiable de cálculo................................................................................................................................. 248
2.140.2 (en) Trusted Computing Base (TCB)......................................................................................................... 248
2.140.3 (en) trusted computing base (TCB).......................................................................................................... 248
2.140.4 (en) Trusted computing base.................................................................................................................... 248
2.141 Bastión..................................................................................................................................................................... 249
2.141.1 Bastión.......................................................................................................................................................... 249
2.141.2 (en) bastion host......................................................................................................................................... 249
2.141.3 (en) bastion host......................................................................................................................................... 249
2.141.4 (en) Bastion host......................................................................................................................................... 249
2.141.5 (en) Bastion Host......................................................................................................................................... 249
2.141.6 (fr) Bastion.................................................................................................................................................... 250
2.142 Bastionado.............................................................................................................................................................. 250
2.142.1 Bastionado................................................................................................................................................... 250
2.142.2 (en) harden................................................................................................................................................... 250
2.142.3 (en) Hardening............................................................................................................................................. 250
2.143 Basura (buscar
entre la)........................................................................................................................................ 250
2.143.1 Basura (buscar entre la)............................................................................................................................. 250
2.143.2 (en) Dumpster diving.................................................................................................................................. 250
2.143.3 (en) Dumpster Diving................................................................................................................................. 250
2.143.4 (en) dumpster diving.................................................................................................................................. 251
2.144 Basuring en
memoria.............................................................................................................................................. 251
2.144.1 Basuring en memoria................................................................................................................................. 251
2.144.2 (en) memory scavenging........................................................................................................................... 251
2.145 BER - Basic
Encoding Rules.................................................................................................................................... 251
2.145.1 BER - Basic Encoding Rules........................................................................................................................ 251
2.145.2 (en) BER - Basic Encoding Rules................................................................................................................ 252
2.146 Big endian................................................................................................................................................................. 252
2.146.1 Big endian..................................................................................................................................................... 252
2.146.2 (en) Big endian............................................................................................................................................ 252
2.146.3 (en) big-endian............................................................................................................................................ 252
2.147 Biometría................................................................................................................................................................. 252
2.147.1 Dispositivo biométrico................................................................................................................................ 252
2.147.2 Biométrico.................................................................................................................................................... 252
2.147.3 (en) biometrics............................................................................................................................................. 252
2.147.4 (en) Biometrics............................................................................................................................................. 252
2.147.1 (en) Biometrics............................................................................................................................................. 253
2.147.2 (en) biometric authentication................................................................................................................... 253
2.147.3 (en) Biometrics............................................................................................................................................. 253
2.147.4 (en) biometric verification......................................................................................................................... 253
2.147.5 (en) biometrics-enabled intelligence....................................................................................................... 253
2.147.6 (fr) Biométrie................................................................................................................................................ 254
2.147.7 (fr) Biométrie................................................................................................................................................ 254
2.148 Blowfish................................................................................................................................................................... 254
2.148.1 Blowfish........................................................................................................................................................ 254
2.148.2 (en) Blowfish................................................................................................................................................ 254
2.148.3 (en) Blowfish................................................................................................................................................ 254
2.148.4 (fr) Blowfish.................................................................................................................................................. 254
2.149 Bomba lógica........................................................................................................................................................... 255
2.149.1 Bomba lógica............................................................................................................................................... 255
2.149.2 Bomba lógica............................................................................................................................................... 255
2.149.3 (en) Logic Bomb:.......................................................................................................................................... 255
2.149.1 (en) logic bomb............................................................................................................................................ 255
2.149.2 (en) time bomb............................................................................................................................................ 255
2.149.3 (en) logic bomb............................................................................................................................................ 255
2.150 Borrado................................................................................................................................................................... 255
2.150.1 Borrado......................................................................................................................................................... 256
2.150.2 Borrado......................................................................................................................................................... 256
2.150.3 (en) erasure.................................................................................................................................................. 256
2.150.4 (en) Clearing................................................................................................................................................. 256
2.150.1 (en) Erasure.................................................................................................................................................. 256
2.151 Borrado Seguro...................................................................................................................................................... 256
2.151.1 Limpieza segura........................................................................................................................................... 256
2.151.2 (en) Secure Wipe:........................................................................................................................................ 256
2.152 Botnet...................................................................................................................................................................... 256
2.152.1 Botnet............................................................................................................................................................ 257
2.152.2 Botnet............................................................................................................................................................ 257
2.152.3 botnet............................................................................................................................................................ 257
2.152.4 (en) Botnet................................................................................................................................................... 257
2.152.5 (en) Botnets.................................................................................................................................................. 257
2.152.6 (en) Botnet:.................................................................................................................................................. 258
2.152.7 (en) botnet.................................................................................................................................................... 258
2.152.1 (en) Botnet................................................................................................................................................... 258
2.152.2 (en) Botnet................................................................................................................................................... 258
2.152.3 (fr) botnet..................................................................................................................................................... 258
2.153 Bug........................................................................................................................................................................... 259
2.153.1 bug................................................................................................................................................................. 259
2.153.2 (en) bug (implementation)........................................................................................................................ 259
2.153.3 (en) bugs....................................................................................................................................................... 259
2.153.4 (en) bug......................................................................................................................................................... 259
2.154 Bulo.......................................................................................................................................................................... 259
2.154.1 Bulo................................................................................................................................................................ 259
2.154.2 (en) Hoax email........................................................................................................................................... 259
2.154.3 (fr) canular.................................................................................................................................................... 260
2.154.4 (fr) canular.................................................................................................................................................... 260
2.155 Bypass....................................................................................................................................................................... 260
2.155.1 Modo de soslayo
(By-pass mode)............................................................................................................. 260
2.155.2 Bypass........................................................................................................................................................... 260
2.155.3 (en) non-bypassability (of the TSF).......................................................................................................... 260
2.155.4 (en) Bypass capability................................................................................................................................. 261
2.156 Caballo de Troya..................................................................................................................................................... 261
2.156.1 caballo de Troya.......................................................................................................................................... 261
2.156.2 Troyano......................................................................................................................................................... 261
2.156.3 Troyano......................................................................................................................................................... 261
2.156.4 Caballo de Troya......................................................................................................................................... 261
2.156.5 (en) Trojan.................................................................................................................................................... 261
2.156.6 (en) Trojan horse......................................................................................................................................... 262
2.156.7 (en) Trojan horse......................................................................................................................................... 262
2.156.8 (en) trojan horse.......................................................................................................................................... 262
2.156.9 (en) Trojan Horse........................................................................................................................................ 262
2.156.10 (en) Trojan Horse........................................................................................................................................ 262
2.156.11 (en) Trojan horse......................................................................................................................................... 262
2.156.12 (en) Trojan:................................................................................................................................................... 262
2.156.13 (en) Trojan Horse........................................................................................................................................ 262
2.156.14 (en) Trojan Horses....................................................................................................................................... 263
2.156.15 (en) Trojan horse......................................................................................................................................... 263
2.156.16 (en) Trojan Horse........................................................................................................................................ 263
2.156.17 (en) Trojan.................................................................................................................................................... 263
2.156.18 Trojan............................................................................................................................................................ 263
2.156.19 (fr) Cheval de Troie..................................................................................................................................... 263
2.156.20 (fr) Cheval de Troie..................................................................................................................................... 264
2.157 Cadena de
certificación.......................................................................................................................................... 264
2.157.1 trayecto de certificación............................................................................................................................ 264
2.157.2 Trayectoria de certificación....................................................................................................................... 264
2.157.3 (en) certification path................................................................................................................................. 264
2.157.4 (en) Certification path................................................................................................................................ 264
2.157.5 (en) path discovery..................................................................................................................................... 265
2.157.6 (fr) itinéraire de certification..................................................................................................................... 265
2.158 Cadena de
certificados de seguridad..................................................................................................................... 265
2.158.1 cadena de certificados de seguridad....................................................................................................... 265
2.158.2 (en) security certificate chain.................................................................................................................... 265
2.158.3 (fr) chaîne de certificat
de sécurité.......................................................................................................... 265
2.159 Cadena de
custodia................................................................................................................................................. 265
2.159.1 Cadena de custodia.................................................................................................................................... 265
2.159.2 (en) chain of custody.................................................................................................................................. 265
2.159.3 (en) chain of custody.................................................................................................................................. 266
2.159.4 (en) chain of custody.................................................................................................................................. 266
2.159.5 (en) chain of evidence................................................................................................................................ 266
2.160 Cadena de
delegación............................................................................................................................................. 266
2.160.1 Cadena de delegación................................................................................................................................ 266
2.160.2 trayecto de delegación............................................................................................................................... 266
2.160.3 (en) Delegation path.................................................................................................................................. 266
2.160.4 (fr) itinéraire de délégation....................................................................................................................... 267
2.161 caesar_cipher.......................................................................................................................................................... 267
2.161.1 (en) Caesar cipher....................................................................................................................................... 267
2.162 Cámara de
seguridad electrónica......................................................................................................................... 267
2.162.1 Cámara de seguridad electrónica............................................................................................................ 267
2.162.2 bóvedas electrónicas.................................................................................................................................. 267
2.162.3 (en) Electronic Vaulting.............................................................................................................................. 267
2.163 Cambio...................................................................................................................................................................... 267
2.163.1 Cambio.......................................................................................................................................................... 268
2.163.2 (en) Change.................................................................................................................................................. 268
2.163.3 (fr) Changement.......................................................................................................................................... 268
2.164 Cambio de clave....................................................................................................................................................... 268
2.164.1 Cambio de clave.......................................................................................................................................... 268
2.164.2 Redigitación de clave.................................................................................................................................. 268
2.164.1 (en) Re-keying.............................................................................................................................................. 268
2.164.2 (en) re-key.................................................................................................................................................... 268
2.164.3 (en) automatic remote rekeying............................................................................................................... 268
2.164.4 (en) manual remote rekeying................................................................................................................... 269
2.164.5 (en) Over-The-Air Rekeying (OTAR)......................................................................................................... 269
2.164.6 (en) remote rekeying.................................................................................................................................. 269
2.164.1 (en) rekey...................................................................................................................................................... 269
2.164.2 (fr) Changement de clé............................................................................................................................... 269
2.165 Camelia..................................................................................................................................................................... 269
2.165.1 Camelia......................................................................................................................................................... 269
2.165.2 (en) Camelia................................................................................................................................................. 269
2.166 can............................................................................................................................................................................ 270
2.166.1 (en) can......................................................................................................................................................... 270
2.167 Canal confiable....................................................................................................................................................... 270
2.167.1 Canal confiable............................................................................................................................................ 270
2.167.2 (en) trusted channel................................................................................................................................... 270
2.167.3 (en) trusted channel................................................................................................................................... 270
2.168 Canal encubierto.................................................................................................................................................... 271
2.168.1 Canal oculto................................................................................................................................................. 271
2.168.2 Canal subliminal.......................................................................................................................................... 271
2.168.1 (en) Covert channel..................................................................................................................................... 271
2.168.2 (en) Covert channel analysis..................................................................................................................... 271
2.168.3 (en) Covert storage channel...................................................................................................................... 271
2.168.4 (en) Covert timing channel........................................................................................................................ 271
2.168.5 (en) covert channel..................................................................................................................................... 272
2.168.6 (en) covert storage channel...................................................................................................................... 272
2.168.7 (en) covert timing channel........................................................................................................................ 272
2.168.8 (en) covert channel..................................................................................................................................... 272
2.168.9 (en) Covert channel..................................................................................................................................... 272
2.168.10 (en) Covert channel..................................................................................................................................... 272
2.168.11 (en) Covert Storage Channel..................................................................................................................... 272
2.168.12 (en) Covert Timing Channel....................................................................................................................... 273
2.169 Canister.................................................................................................................................................................... 273
2.169.1 Canister......................................................................................................................................................... 273
2.169.2 (en) canister................................................................................................................................................. 273
2.170 Capacidad................................................................................................................................................................. 273
2.170.1 Capacidad..................................................................................................................................................... 273
2.170.2 capacidad..................................................................................................................................................... 273
2.170.3 (en) Capability.............................................................................................................................................. 273
2.170.4 (fr) capacité.................................................................................................................................................. 273
2.171 Capacidad de
supervivencia.................................................................................................................................... 273
2.171.1 Capacidad de supervivencia...................................................................................................................... 273
2.171.2 (en) survivability.......................................................................................................................................... 274
2.171.3 (en) Survivability.......................................................................................................................................... 274
2.172 CAPEC....................................................................................................................................................................... 274
2.172.1 CAPEC............................................................................................................................................................ 274
2.172.2 (en) CAPEC.................................................................................................................................................... 274
2.173 CAPI - Cryptographic
Application Programming Interface............................................................................... 274
2.173.1 CAPI - Cryptographic Application Programming Interface.................................................................. 274
2.173.2 (en) cryptographic application programming interface (CAPI).......................................................... 275
2.174 CAPTCHA................................................................................................................................................................. 275
2.174.1 CAPTCHA....................................................................................................................................................... 275
2.174.2 (en) Completely Automated Public Turing test to tell Computers and Humans
Apart (CAPTCHA) 275
2.174.3 (en) CAPTCHA.............................................................................................................................................. 275
2.175 Captura del
teclado................................................................................................................................................ 276
2.175.1 Keylogger...................................................................................................................................................... 276
2.175.2 Capturador de
pulsaciones de teclado.................................................................................................... 276
2.175.3 (en) Key logger............................................................................................................................................. 276
2.175.4 (en) Key logger............................................................................................................................................. 276
2.175.5 (en) Keystroke Logger................................................................................................................................. 276
2.175.6 (en) Keystroke logging (often called keylogging).................................................................................. 277
2.175.7 (en) Keylogger.............................................................................................................................................. 277
2.175.8 (en) keylogger.............................................................................................................................................. 277
2.175.9 (fr) Keylogger............................................................................................................................................... 277
2.176 Cargador de
claves................................................................................................................................................. 277
2.176.1 Cargador de claves..................................................................................................................................... 277
2.176.2 (en) key loader............................................................................................................................................. 278
2.176.3 (en) key loader............................................................................................................................................. 278
2.176.4 (en) Key loader............................................................................................................................................. 278
2.177 Carga remota de
claves.......................................................................................................................................... 278
2.177.1 Carga remota de claves............................................................................................................................. 278
2.177.2 Carga remota de claves............................................................................................................................. 278
2.177.3 (en) Remote key load.................................................................................................................................. 278
2.178 Cartas nigerianas.................................................................................................................................................... 278
2.178.1 Cartas nigerianas........................................................................................................................................ 278
2.178.2 (en) Nigerian letter scams......................................................................................................................... 279
2.179 CAST......................................................................................................................................................................... 279
2.179.1 CAST............................................................................................................................................................... 279
2.179.2 CAST-256 (o CAST6).................................................................................................................................... 279
2.179.3 CAST-128 (o también, CAST5)................................................................................................................... 280
2.179.4 (en) CAST...................................................................................................................................................... 280
2.180 Categoría de un
sistema de información.............................................................................................................. 280
2.180.1 Categoría de un sistema............................................................................................................................ 280
2.180.2 (en) Security Category................................................................................................................................ 280
2.180.3 (en) Security Categorization...................................................................................................................... 280
2.180.4 (en) security category................................................................................................................................. 281
2.181 CBC - Cipher
block chaining................................................................................................................................... 281
2.181.1 CBC - Cipher block chaining....................................................................................................................... 281
2.181.2 (en) cipher block chaining (CBC)............................................................................................................... 281
2.181.3 (en) CBC - Cipher block chaining............................................................................................................... 281
2.182 CCM - Counter with Cipher
Block Chaining-Message Authentication Code................................................... 282
2.182.1 CCM - Counter with Cipher Block Chaining-Message Authentication Code..................................... 282
2.182.2 (en) Counter with Cipher Block Chaining-Message Authentication Code......................................... 282
2.182.3 (en) CCM - Counter with Cipher Block Chaining-Message Authentication Code............................. 282
2.183 Ceguera.................................................................................................................................................................... 282
2.183.1 Ceguera......................................................................................................................................................... 282
2.183.2 (en) Blinding................................................................................................................................................. 282
2.184 Centro de
distribución de claves........................................................................................................................... 282
2.184.1 Centro de distribución de claves............................................................................................................... 283
2.184.2 Centro de distribución de claves............................................................................................................... 283
2.184.3 Centro de
gestión o distribución de claves............................................................................................. 283
2.184.1 (en) key distribution center (KDC)............................................................................................................ 283
2.184.2 (en) key distribution center (KDC)............................................................................................................ 283
2.184.3 (en) key center............................................................................................................................................. 283
2.185 Centro de
generación de claves............................................................................................................................. 283
2.185.1 Centro de generación de claves................................................................................................................ 283
2.185.2 (en) Trusted Key Generation Centre KGC................................................................................................ 283
2.186 Centro de
operaciones de seguridad..................................................................................................................... 284
2.186.1 Centro de operaciones de seguridad....................................................................................................... 284
2.186.2 SOC – Security Operations Center............................................................................................................ 284
2.187 CER - Canonical
Encoding Rules........................................................................................................................... 284
2.187.1 CER - Canonical Encoding Rules................................................................................................................ 284
2.187.2 (en) CER - Canonical Encoding Rules....................................................................................................... 284
2.188 CERT - Equipo de
reacción rápida ante incidentes informáticos........................................................................ 284
2.188.1 CERT - Equipo
de reacción rápida ante incidentes informáticos........................................................ 285
2.188.2 (en) Computer Emergency Response Team (CERT)............................................................................... 285
2.188.3 (en) computer emergency response team (CERT)................................................................................. 285
2.188.4 (en) Computer Emergency Response Team (CERT):.............................................................................. 285
2.188.1 (en) Computer Incident Response Team (CIRT)..................................................................................... 285
2.188.2 (en) computer security incident response team (CSIRT)...................................................................... 285
2.188.3 (en) Computer Security Incident Response Team (CSIRT).................................................................... 286
2.188.4 (en) CERT - Computer Emergency Response Team............................................................................... 286
2.188.5 (en) CERT (Computer Emergency Response Team)............................................................................... 286
2.188.6 (en) CSIRT (Computer Security and Incident Response Team)............................................................ 286
2.188.7 (en) Computer Emergency Response Team (CERT)............................................................................... 286
2.188.8 (fr) CERT (Computer Emergency and Response Team)........................................................................ 286
2.188.9 (fr) CERT - Computer Emergency Response Team................................................................................. 287
2.188.10 (fr) CERT/A.................................................................................................................................................... 287
2.189 Certificación............................................................................................................................................................ 287
2.189.1 certificación.................................................................................................................................................. 287
2.189.2 Certificación................................................................................................................................................. 287
2.189.3 Certificación de la Seguridad.................................................................................................................... 287
2.189.4 Certificación................................................................................................................................................. 287
2.189.5 Certificación................................................................................................................................................. 288
2.189.6 Certificación................................................................................................................................................. 288
2.189.7 (en) certification.......................................................................................................................................... 288
2.189.8 (en) certification.......................................................................................................................................... 288
2.189.9 (en) certification.......................................................................................................................................... 288
2.189.10 (en) Certification......................................................................................................................................... 289
2.189.11 (en) Certification......................................................................................................................................... 289
2.189.12 (en) What is security certification?.......................................................................................................... 289
2.189.13 (en) Certification......................................................................................................................................... 289
2.189.14 (en) Certification......................................................................................................................................... 289
2.189.15 (fr) Certification........................................................................................................................................... 289
2.190 Certificado............................................................................................................................................................... 289
2.190.1 Certificado Digital....................................................................................................................................... 290
2.190.2 Certificado.................................................................................................................................................... 290
2.190.3 Certificado digital........................................................................................................................................ 290
2.190.4 Certificado de clave pública...................................................................................................................... 290
2.190.1 (en) Certificate............................................................................................................................................. 290
2.190.2 (en) digital certificate................................................................................................................................. 291
2.190.3 (en) certificate............................................................................................................................................. 291
2.190.4 (en) Certificate............................................................................................................................................. 291
2.190.5 (en) Certificate / Certification Report...................................................................................................... 291
2.190.6 (fr) Certificat électronique......................................................................................................................... 291
2.191 Certificado
autoexpedido....................................................................................................................................... 291
2.191.1 certificado de atributo autoexpedido...................................................................................................... 291
2.191.2 certificado autoexpedido........................................................................................................................... 291
2.191.3 certificado autofirmado............................................................................................................................. 292
2.191.4 (en) self-issued AC....................................................................................................................................... 292
2.191.5 (en) self-issued certificate.......................................................................................................................... 292
2.191.6 (en) self-signed certificate......................................................................................................................... 292
2.191.7 (fr) certificat
d'autorité de certification autoémis................................................................................ 292
2.191.8 (fr) certificat autoémis............................................................................................................................... 292
2.191.9 (fr) certificat autosigné.............................................................................................................................. 292
2.192 Certificado
cruzado............................................................................................................................................... 293
2.192.1 certificado cruzado..................................................................................................................................... 293
2.192.2 (en) cross-certificate................................................................................................................................... 293
2.192.3 (en) cross-certificate................................................................................................................................... 293
2.192.4 (en) cross-certification............................................................................................................................... 293
2.192.5 (en) Cross-certificate.................................................................................................................................. 293
2.192.6 (en) Cross-certificate.................................................................................................................................. 294
2.192.7 (fr) certificat croisé..................................................................................................................................... 294
2.193 Certificado de AC.................................................................................................................................................... 294
2.193.1 certificado de
autoridad de certificación; certificado de CA............................................................... 294
2.193.2 (en) CA certificate....................................................................................................................................... 294
2.193.3 (en) CA-certificate....................................................................................................................................... 294
2.193.4 (fr) certificat d'autorité de certification.................................................................................................. 294
2.194 Certificado de
atributo.......................................................................................................................................... 294
2.194.1 certificado de atributo (AC, attribute certificate).................................................................................. 295
2.194.2 (en) attribute certificate............................................................................................................................ 295
2.194.3 (en) attribute certificate............................................................................................................................ 295
2.194.4 (fr) certificat
d'attribut (AC, attribute certificate)................................................................................. 295
2.195 Certificado de
autenticación................................................................................................................................. 295
2.195.1 Certificado de autenticación..................................................................................................................... 295
2.195.2 (en) Authentication certificate.................................................................................................................. 295
2.196 certificado de
autenticación de sitio web............................................................................................................. 295
2.196.1 certificado de autenticación
de sitio web............................................................................................... 296
2.196.2 certificado
cualificado de autenticación de sitio web.......................................................................... 296
2.196.3 (en) certificate for website authentication'............................................................................................ 296
2.196.4 (en) qualified certificate for website authentication............................................................................ 296
2.196.5 (fr) certificat
d'authentification de site internet.................................................................................... 296
2.196.6 (fr) certificat qualifié
d'authentification de site internet..................................................................... 296
2.197 Certificado de
autoridad....................................................................................................................................... 296
2.197.1 certificado de autoridad............................................................................................................................ 296
2.197.2 (en) Authority certificate........................................................................................................................... 297
2.197.3 (fr) certificat d'autorité.............................................................................................................................. 297
2.198 Certificado de
clave pública................................................................................................................................... 297
2.198.1 certificado de clave pública....................................................................................................................... 297
2.198.2 (en) public-key certificate.......................................................................................................................... 297
2.198.3 (en) Public key certificate.......................................................................................................................... 297
2.198.4 (en) Public key certificate.......................................................................................................................... 297
2.198.5 (en) Public key certificate.......................................................................................................................... 297
2.198.6 (en) Public key certificate.......................................................................................................................... 298
2.198.7 (en) Public key certificate.......................................................................................................................... 298
2.198.8 (fr) certificat de clé publique..................................................................................................................... 298
2.198.9 (fr) Certificat de clés publique................................................................................................................... 298
2.198.10 (fr) Certificat de clés publique................................................................................................................... 298
2.199 certificado de
firma electrónica........................................................................................................................... 298
2.199.1 certificado de firma electrónica................................................................................................................ 298
2.199.2 certificado cualificado de firma electrónica........................................................................................... 299
2.199.3 certificado electrónico................................................................................................................................ 299
2.199.4 certificados reconocidos............................................................................................................................ 299
2.199.5 (en) certificate for electronic signature................................................................................................... 299
2.199.6 (en) qualified certificate for electronic signature.................................................................................. 299
2.199.7 (en) Certificate............................................................................................................................................. 300
2.199.8 (en) Qualified certificate............................................................................................................................ 300
2.199.9 (fr) certificat de signature électronique.................................................................................................. 300
2.199.10 (fr) certificat qualifié
de signature électronique.................................................................................... 300
2.200 Certificado de
revocación...................................................................................................................................... 300
2.200.1 certificado de revocación........................................................................................................................... 300
2.200.2 (en) Revocation certificate........................................................................................................................ 301
2.200.3 (fr) certificat de révocation....................................................................................................................... 301
2.201 Certificado de
seguridad........................................................................................................................................ 301
2.201.1 certificado de seguridad............................................................................................................................ 301
2.201.2 (en) security certificate.............................................................................................................................. 301
2.201.3 (fr) certificat de sécurité............................................................................................................................ 301
2.202 Certificado X.509.................................................................................................................................................... 302
2.202.1 Certificado de usuario................................................................................................................................ 302
2.202.2 (en) X.509 Public Key Certificate............................................................................................................... 302
2.202.3 (en) X.509 public key certificate............................................................................................................... 302
2.202.4 (en) Self-signed certificate......................................................................................................................... 302
2.202.5 (en) Self-issued AC....................................................................................................................................... 303
2.202.6 (en) Self-issued certificate......................................................................................................................... 303
2.202.7 (en) Self-signed certificate......................................................................................................................... 303
2.203 CFB - Cipher
feedback mode.................................................................................................................................... 303
2.203.1 CFB - Cipher feedback mode..................................................................................................................... 303
2.203.2 (en) cipher feedback (CFB)......................................................................................................................... 304
2.203.3 (en) CFB - Cipher feedback mode............................................................................................................. 304
2.204 CHAP -
Challenge-Handshake Authentication Protocol................................................................................... 304
2.204.1 CHAP - Challenge-Handshake Authentication Protocol....................................................................... 304
2.204.2 (en) Challenge-Response Protocol........................................................................................................... 304
2.204.3 (en) Challenge Handshake Authentication Protocol (CHAP)............................................................... 304
2.204.4 (en) Challenge-Handshake Authentication Protocol - CHAP............................................................... 305
2.204.5 (en) CHAP (Challenge Handshake Authentication Protocol)............................................................... 305
2.204.6 (en) Challenge-Handshake Authentication Protocol (CHAP)............................................................... 305
2.204.7 (fr) CHAP - Challenge-Handshake Authentication Protocol................................................................ 305
2.205 Ciberamenaza........................................................................................................................................................... 305
2.205.1 Ciberamenaza.............................................................................................................................................. 305
2.205.2 (en) Cyber threat information................................................................................................................... 306
2.205.3 (en) Cyber threat intelligence................................................................................................................... 306
2.206 Ciberataque............................................................................................................................................................. 307
2.206.1 Ciberataque.................................................................................................................................................. 307
2.206.2 Ciberataque.................................................................................................................................................. 307
2.206.3 (en) Cyber Attack......................................................................................................................................... 307
2.206.4 (en) Cyber attack......................................................................................................................................... 307
2.206.5 (en) cyber attack......................................................................................................................................... 307
2.206.6 (en) cyberattack.......................................................................................................................................... 307
2.206.7 NATO AC/322-N(2014)0072...................................................................................................................... 307
2.206.8 (en) Cyber Attack......................................................................................................................................... 307
2.206.9 (en) cyber attack......................................................................................................................................... 308
2.207 Ciberconflicto......................................................................................................................................................... 308
2.207.1 Ciberguerra.................................................................................................................................................. 308
2.207.2 (en) Cyber Conflict....................................................................................................................................... 308
2.208 Cibercrisis................................................................................................................................................................. 308
2.208.1 Cibercrisis..................................................................................................................................................... 308
2.208.2 (en) cyber crisis............................................................................................................................................ 308
2.209 Ciberdefensa............................................................................................................................................................ 308
2.209.1 Ciberdefensa................................................................................................................................................ 308
2.209.2 (en) Cyber Defence...................................................................................................................................... 308
2.209.3 (en) Active Cyber Defence.......................................................................................................................... 309
2.209.4 (en) Passive Cyber Defence:...................................................................................................................... 309
2.209.5 (en) cyber defence....................................................................................................................................... 309
2.209.6 (en) Cyber Defense...................................................................................................................................... 309
2.209.7 (en) Cyber Defensive Countermeasure.................................................................................................... 309
2.209.8 (en) Cyber Defensive Capability................................................................................................................ 309
2.210 Ciberdelincuencia.................................................................................................................................................... 309
2.210.1 ciberdelincuencia........................................................................................................................................ 309
2.210.2 ciberdelincuente.......................................................................................................................................... 310
2.211 Ciberdelito............................................................................................................................................................... 310
2.211.1 Ciberdelito.................................................................................................................................................... 310
2.211.2 (en) Cybercrime........................................................................................................................................... 310
2.211.3 (en) Cybersecurity crime............................................................................................................................ 310
2.211.4 Cybercrime................................................................................................................................................... 310
2.211.5 (en) Cyber crime (or
computer crime)..................................................................................................... 310
2.211.6 (en) Cyber Crime.......................................................................................................................................... 311
2.211.7 (en) cybercrime............................................................................................................................................ 311
2.212 Ciberespacio............................................................................................................................................................. 311
2.212.1 Ciberespacio................................................................................................................................................. 311
2.212.2 ciberespacio................................................................................................................................................. 311
2.212.3 Ciberespacio................................................................................................................................................. 311
2.212.4 Ciberespacio................................................................................................................................................. 311
2.212.5 (en) Cyberspace........................................................................................................................................... 312
2.212.6 (en) Cyberspace:.......................................................................................................................................... 312
2.212.7 (en) Cyberspace........................................................................................................................................... 312
2.212.8 (en) the Cyberspace.................................................................................................................................... 312
2.212.9 (en) Cyber space.......................................................................................................................................... 312
2.212.10 (en) cyberspace........................................................................................................................................... 312
2.212.11 (en) cyberspace........................................................................................................................................... 312
2.212.12 (en) Cyberspace........................................................................................................................................... 312
2.212.13 (en) Critical Cyberspace............................................................................................................................. 313
2.212.14 (en) Cyberspace........................................................................................................................................... 313
2.212.15 (en) cyberspace........................................................................................................................................... 313
2.212.16 (en) cyberspace........................................................................................................................................... 313
2.213 ciberespionaje.......................................................................................................................................................... 313
2.213.1 (en) cyber Espionage.................................................................................................................................. 313
2.213.2 (en) cyber espionage.................................................................................................................................. 313
2.213.3 (en) Cyberespionage................................................................................................................................... 313
2.214 Ciberincidente.......................................................................................................................................................... 314
2.214.1 Ciberincidente.............................................................................................................................................. 314
2.214.2 (en) cyber event........................................................................................................................................... 314
2.214.3 (en) cyber incident...................................................................................................................................... 314
2.214.4 (en) Cybersecurity Event............................................................................................................................ 314
2.214.5 (en) Cyber Security Incident....................................................................................................................... 314
2.214.6 (en) cyber incident...................................................................................................................................... 314
2.215 Ciberinfraestructura............................................................................................................................................. 315
2.215.1 Ciberinfraestructura................................................................................................................................... 315
2.215.2 (en) Cyber Infrastructure:.......................................................................................................................... 315
2.215.3 (en) Cyber Infrastructure........................................................................................................................... 315
2.215.4 (en) Critical Cyber Infrastructure.............................................................................................................. 315
2.216 Ciberinteligencia..................................................................................................................................................... 315
2.216.1 Ciberinteligencia.......................................................................................................................................... 315
2.216.2 (en) Cyber Intelligence............................................................................................................................... 315
2.217 Ciberofensiva........................................................................................................................................................... 315
2.217.1 Ciberofensiva............................................................................................................................................... 315
2.217.2 (en) Cyber Offensive................................................................................................................................... 316
2.217.1 (en) Cyber Offensive Capability................................................................................................................ 316
2.218 Ciberoperaciones..................................................................................................................................................... 316
2.218.1 Ciberoperaciones......................................................................................................................................... 316
2.218.2 (en) Cyber Operations:............................................................................................................................... 316
2.219 Ciberreconocimiento.............................................................................................................................................. 316
2.219.1 Ciberreconocimiento.................................................................................................................................. 316
2.219.2 (en) Cyber Reconnaissance:...................................................................................................................... 316
2.220 Ciberseguridad........................................................................................................................................................ 316
2.220.1 Ciberseguridad............................................................................................................................................ 316
2.220.2 ciberseguridad............................................................................................................................................. 317
2.220.3 Ciberseguridad............................................................................................................................................ 317
2.220.4 Cyber Security.............................................................................................................................................. 317
2.220.5 (en) Cybersecurity....................................................................................................................................... 317
2.220.1 (en) Cybersecurity....................................................................................................................................... 317
2.220.2 (en) cyber-security...................................................................................................................................... 317
2.220.3 (en) Cybersecurity purpose........................................................................................................................ 317
2.220.4 (en) Cybersecurity system.......................................................................................................................... 318
2.220.5 (en) Cybersecurity....................................................................................................................................... 318
2.220.6 (en) Cybersafety.......................................................................................................................................... 318
2.220.7 (en) Cybersecurity....................................................................................................................................... 319
2.220.8 (en) Cyber security...................................................................................................................................... 319
2.220.9 (en) Cyber security and civilian and military cyber security................................................................ 319
2.220.10 (en) Cybersecurity....................................................................................................................................... 319
2.220.11 (en) cybersecurity........................................................................................................................................ 319
2.220.12 (en) cyber security....................................................................................................................................... 319
2.221 Ciberterrorismo...................................................................................................................................................... 320
2.221.1 Ciberterrorismo........................................................................................................................................... 320
2.221.2 (en) Cyber Terrorism................................................................................................................................... 320
2.221.3 (en) Cyber Terrorism................................................................................................................................... 320
2.222 Ciclo de Deming....................................................................................................................................................... 320
2.222.1 Ciclo de Deming........................................................................................................................................... 320
2.222.2 Planificar, Realizar, Comprobar, Actuar.................................................................................................. 320
2.222.3 (en) Deming Cycle....................................................................................................................................... 321
2.222.4 (en) Plan-Do-Check-Act.............................................................................................................................. 321
2.222.5 (fr) Cycle de Deming................................................................................................................................... 321
2.222.6 (fr) Modèle
Planifier-Faire-Vérifier-Agir (PDCA).................................................................................... 321
2.223 Cifrado..................................................................................................................................................................... 321
2.223.1 cifrado........................................................................................................................................................... 321
2.223.2 Cifrado........................................................................................................................................................... 322
2.223.3 Cifra o cifrado.............................................................................................................................................. 322
2.223.4 Cifra............................................................................................................................................................... 322
2.223.5 Cifra de alto nivel........................................................................................................................................ 322
2.223.6 Cifra de bajo nivel....................................................................................................................................... 322
2.223.7 Cifra
encubierta o mensaje disimulado o esteganografía................................................................... 322
2.223.8 Cifra
estratégica o de alto nivel................................................................................................................ 322
2.223.9 Cifra táctica o
de bajo nivel....................................................................................................................... 322
2.223.10 cifrado........................................................................................................................................................... 323
2.223.11 (en) encipherment....................................................................................................................................... 323
2.223.12 (en) Encipherment....................................................................................................................................... 323
2.223.13 (en) Encipherment....................................................................................................................................... 323
2.223.14 (en) Encipherment....................................................................................................................................... 323
2.223.15 (en) encipherment or encryption.............................................................................................................. 323
2.223.16 (en) Encryption:........................................................................................................................................... 323
2.223.17 (fr) Cryptage................................................................................................................................................. 323
2.223.18 (fr) Chiffrement............................................................................................................................................ 324
2.223.19 (fr) chiffrement............................................................................................................................................ 324
2.224 Cifrado analógico
de voz....................................................................................................................................... 324
2.224.1 Cifrado analógico de voz........................................................................................................................... 324
2.224.2 Cifrado
analógico de la voz (scrambling)................................................................................................ 324
2.224.3 (en) Analog voice
encryption (scrambling)............................................................................................. 324
2.225 Cifrado
asimétrico.................................................................................................................................................. 324
2.225.1 Criptosistema asimétrico........................................................................................................................... 325
2.225.2 Cifra asimétrica (one-way system).......................................................................................................... 325
2.225.3 (en) asymmetric cryptography................................................................................................................. 325
2.225.4 (en) asymmetric encryption system......................................................................................................... 325
2.226 Cifrado
autenticado............................................................................................................................................... 325
2.226.1 Cifrado autenticado.................................................................................................................................... 325
2.226.2 (en) Authenticated encryption.................................................................................................................. 325
2.226.3 (en) Authenticated encryption.................................................................................................................. 325
2.227 Cifrado
autosíncrono............................................................................................................................................ 325
2.227.1 Cifrado autosíncrono.................................................................................................................................. 326
2.227.2 (en) self-synchronous stream cipher........................................................................................................ 326
2.228 Cifrado de
archivos................................................................................................................................................ 326
2.228.1 Cifrado a nivel de archivo.......................................................................................................................... 326
2.228.2 (en) File-Level Encryption:......................................................................................................................... 326
2.228.3 (fr) Cryptage au niveau fichier.................................................................................................................. 326
2.229 Cifrado de
columnas en bases de datos................................................................................................................ 326
2.229.1 Cifrado de
bases de datos a nivel de columna....................................................................................... 326
2.229.2 (en) Column-Level Database Encryption................................................................................................. 326
2.229.3 (fr) Cryptage de base de données au niveau de colonne..................................................................... 327
2.230 Cifrado de disco...................................................................................................................................................... 327
2.230.1 Cifrado de disco........................................................................................................................................... 327
2.230.2 (en) Disk Encryption:................................................................................................................................... 327
2.230.3 (fr) Cryptage par disque............................................................................................................................. 327
2.231 Cifrado de flujo...................................................................................................................................................... 327
2.231.1 Cifrado de flujo............................................................................................................................................ 327
2.231.2 Cifra en flujo................................................................................................................................................. 328
2.231.3 Cifra en serie
ó en flujo.............................................................................................................................. 328
2.231.4 (en) stream cipher....................................................................................................................................... 328
2.231.5 (en) stream cipher....................................................................................................................................... 328
2.231.6 (en) synchronous stream cipher............................................................................................................... 328
2.232 Cifrado de flujo
síncrono...................................................................................................................................... 328
2.232.1 Cifrado de flujo síncrono............................................................................................................................ 328
2.232.2 (en) synchronization................................................................................................................................... 329
2.232.3 (en) synchronous stream cipher............................................................................................................... 329
2.233 Cifrado del
enlace................................................................................................................................................... 329
2.233.1 Cifrado a nivel de enlace............................................................................................................................ 329
2.233.2 Cifrado de enlace........................................................................................................................................ 329
2.233.3 Cifrado de enlace a enlace (link-by-link)................................................................................................. 329
2.233.4 cifrado enlace por enlace........................................................................................................................... 329
2.233.5 (en) link encryption..................................................................................................................................... 329
2.233.6 (en) link encryption..................................................................................................................................... 330
2.233.7 (en) Link-by-link encipherment................................................................................................................. 330
2.233.8 (fr) chiffrement de
liaison (liaison par liaison)....................................................................................... 330
2.234 Cifrado de texto
con auto-clave........................................................................................................................... 330
2.234.1 Cifrado de
texto con auto-clave o autosíncrono o con realimentación............................................. 330
2.234.2 (en) Cipher text auto-key (CTAK).............................................................................................................. 330
2.235 Cifrado de voz......................................................................................................................................................... 330
2.236 Cifrado digital
de voz............................................................................................................................................. 330
2.236.1 Cifrado digital de la voz............................................................................................................................. 331
2.236.2 Cifrado digital de la voz............................................................................................................................. 331
2.236.3 (en) Digital voice encryption..................................................................................................................... 331
2.237 Cifrado en bloque................................................................................................................................................... 331
2.237.1 Cifrado en bloque........................................................................................................................................ 331
2.237.2 Cifra en bloque............................................................................................................................................ 331
2.237.3 (en) block cipher.......................................................................................................................................... 332
2.237.4 (en) Block encryption.................................................................................................................................. 332
2.237.5 (en) block cipher.......................................................................................................................................... 332
2.238 Cifrado extremo a
extremo.................................................................................................................................... 332
2.238.1 Cifrado extremo a extremo....................................................................................................................... 332
2.238.2 Cifrado extremo a extremo....................................................................................................................... 332
2.238.3 Cifrado punto a punto................................................................................................................................ 332
2.238.4 cifrado de extremo a extremo.................................................................................................................. 332
2.238.5 (en) end-to-end encryption....................................................................................................................... 333
2.238.6 (en) end-to-end encryption....................................................................................................................... 333
2.238.7 (en) End-to-end encryption....................................................................................................................... 333
2.238.8 (en) End-to-end encipherment.................................................................................................................. 333
2.238.9 (fr) chiffrement de bout
en bout............................................................................................................... 333
2.239 Cifrado
irreversible................................................................................................................................................ 333
2.239.1 Cifrado irreversible..................................................................................................................................... 333
2.239.2 (en) one-way encryption............................................................................................................................ 333
2.239.3 (en) One-Way Encryption.......................................................................................................................... 333
2.240 Cifrado masivo........................................................................................................................................................ 334
2.240.1 Cifrado masivo............................................................................................................................................. 334
2.240.2 Cifrado de grupo o masivo........................................................................................................................ 334
2.240.3 (en) bulk encryption.................................................................................................................................... 334
2.240.4 (en) bulk encryption.................................................................................................................................... 334
2.240.5 (en) Bulk encryption.................................................................................................................................... 334
2.240.6 (en) Bulk encryption.................................................................................................................................... 334
2.241 Cifrador................................................................................................................................................................... 334
2.241.1 Cifrador......................................................................................................................................................... 334
2.241.1 (en) Cipher.................................................................................................................................................... 334
2.241.2 (en) cipher.................................................................................................................................................... 334
2.241.3 (en) cipher.................................................................................................................................................... 335
2.242 Cifrado
reversible................................................................................................................................................... 335
2.243 Cifrado simétrico.................................................................................................................................................... 335
2.243.1 Cifrado simétrico......................................................................................................................................... 335
2.243.2 Criptosistema simétrico............................................................................................................................. 335
2.243.3 Técnicas criptográficas simétricas........................................................................................................... 335
2.243.4 Cifra de clave
secreta o Cifra simétrica................................................................................................... 335
2.243.5 (en) symmetric cryptography.................................................................................................................... 335
2.243.6 (fr) Chiffrement symétrique....................................................................................................................... 336
2.244 Cifrado Vernam...................................................................................................................................................... 336
2.244.1 Cifrado Vernam........................................................................................................................................... 336
2.244.2 (en) Vernam cipher..................................................................................................................................... 336
2.245 Cifrar....................................................................................................................................................................... 336
2.245.1 cifrar.............................................................................................................................................................. 336
2.245.1 (en) encipher................................................................................................................................................ 337
2.245.2 (en) encipher................................................................................................................................................ 337
2.245.3 (en) Encipher................................................................................................................................................ 337
2.245.4 (fr) chiffer...................................................................................................................................................... 337
2.246 Comunicación del
riesgo........................................................................................................................................ 337
2.246.1 comunicación y consulta............................................................................................................................ 337
2.246.2 (en) risk communication and consultation............................................................................................. 337
2.246.3 (en) RISK COMMUNICATION..................................................................................................................... 338
2.247 Clasificación............................................................................................................................................................ 338
2.247.1 Clasificación................................................................................................................................................. 338
2.247.2 (en) classification........................................................................................................................................ 338
2.248 Clasificar................................................................................................................................................................. 338
2.248.1 Clasificar....................................................................................................................................................... 339
2.248.2 (en) classify................................................................................................................................................... 339
2.249 Clave......................................................................................................................................................................... 339
2.249.1 Clave criptográfica...................................................................................................................................... 339
2.249.2 Clave.............................................................................................................................................................. 339
2.249.3 clave.............................................................................................................................................................. 339
2.249.1 (en) key......................................................................................................................................................... 339
2.249.2 (en) key......................................................................................................................................................... 339
2.249.3 (en) key......................................................................................................................................................... 339
2.249.4 (en) Key......................................................................................................................................................... 340
2.249.5 (en) Key......................................................................................................................................................... 340
2.249.6 (en) Key......................................................................................................................................................... 340
2.249.7 (en) Key......................................................................................................................................................... 340
2.249.8 (fr) Clés cryptographiques......................................................................................................................... 340
2.249.9 (fr) clé............................................................................................................................................................ 340
2.249.10 (fr) Clé / Clef (électronique)....................................................................................................................... 340
2.250 Clave auto-clave..................................................................................................................................................... 340
2.250.1 Cifrado autoclave........................................................................................................................................ 341
2.250.2 Clave auto-clave.......................................................................................................................................... 341
2.250.1 (en) key-auto-key (KAK)............................................................................................................................. 341
2.250.2 (en) key-auto-key (KAK)............................................................................................................................. 341
2.251 Clave
criptográfica................................................................................................................................................ 341
2.251.1 Clave criptográfica...................................................................................................................................... 341
2.251.2 (en) Cryptographic key (key)..................................................................................................................... 341
2.251.3 (en) cryptographic key............................................................................................................................... 342
2.251.4 (en) Cryptographic key............................................................................................................................... 342
2.252 Clave custodiada..................................................................................................................................................... 342
2.252.1 Clave custodiada......................................................................................................................................... 342
2.252.2 (en) Escrow Passwords............................................................................................................................... 343
2.253 Clave de arranque.................................................................................................................................................. 343
2.253.1 Clave de arranque....................................................................................................................................... 343
2.253.1 (en) Cryptographic ignition key (CIK)....................................................................................................... 343
2.253.2 (en) master cryptographic ignition key................................................................................................... 343
2.253.3 (en) cryptographic ignition key (CIK)....................................................................................................... 343
2.254 Clave débil................................................................................................................................................................ 343
2.254.1 Clave débil.................................................................................................................................................... 343
2.254.2 (en) weak key............................................................................................................................................... 343
2.254.3 (en) Weak key.............................................................................................................................................. 344
2.255 Clave de cifrado
de claves...................................................................................................................................... 344
2.255.1 Clave de cifrado de claves......................................................................................................................... 344
2.255.2 Clave de cifrado de claves......................................................................................................................... 344
2.255.1 (en) key-encryption-key (KEK)................................................................................................................... 344
2.255.2 (en) key-encrypting key (KEK)................................................................................................................... 344
2.255.3 (en) Key encrypting key.............................................................................................................................. 344
2.255.4 (en) key encryption key.............................................................................................................................. 344
2.255.5 (en) Key encrypting key.............................................................................................................................. 344
2.256 Clave de sesión......................................................................................................................................................... 345
2.256.1 Clave de sesión............................................................................................................................................ 345
2.256.2 Clave de sesión............................................................................................................................................ 345
2.256.3 (en) session key........................................................................................................................................... 345
2.256.4 (en) Session Key........................................................................................................................................... 345
2.257 Clave de un solo
uso............................................................................................................................................... 345
2.257.1 Clave de uso único...................................................................................................................................... 345
2.257.2 (en) One-time key........................................................................................................................................ 345
2.258 Clave efímera........................................................................................................................................................... 346
2.258.1 Clave efímera............................................................................................................................................... 346
2.258.2 (en) ephemeral............................................................................................................................................ 346
2.258.3 (en) Ephemeral key..................................................................................................................................... 346
2.259 Clave fragmentada................................................................................................................................................. 346
2.259.1 Esquema umbral......................................................................................................................................... 346
2.259.2 (en) split key................................................................................................................................................. 346
2.259.3 (en) Key splitting......................................................................................................................................... 346
2.259.4 (en) Split Key................................................................................................................................................ 347
2.260 Clave maestra.......................................................................................................................................................... 347
2.260.1 Clave maestra.............................................................................................................................................. 347
2.260.2 Clave maestra o primaria.......................................................................................................................... 347
2.261 Clave para
envolver claves.................................................................................................................................... 347
2.261.1 Clave para envolver claves........................................................................................................................ 347
2.261.2 (en) Key wrapping....................................................................................................................................... 347
2.261.3 (en) Key wrapping key................................................................................................................................ 347
2.262 Clave privada........................................................................................................................................................... 347
2.262.1 Clave privada............................................................................................................................................... 348
2.262.2 clave privada................................................................................................................................................ 348
2.262.3 (en) private key............................................................................................................................................ 348
2.262.4 (en) Private key............................................................................................................................................ 348
2.262.5 (en) private key............................................................................................................................................ 348
2.262.6 (en) Private key; secret key (deprecated)............................................................................................... 349
2.262.7 (en) Private key or private number.......................................................................................................... 349
2.262.8 (en) Private key............................................................................................................................................ 349
2.262.9 (en) Private key............................................................................................................................................ 349
2.262.10 (en) private key............................................................................................................................................ 349
2.262.11 (en) Private Key........................................................................................................................................... 349
2.262.12 (fr) clé privée................................................................................................................................................ 349
2.262.13 (fr) Clé privée............................................................................................................................................... 349
2.263 Clave pública........................................................................................................................................................... 349
2.263.1 clave pública................................................................................................................................................ 350
2.263.2 Clave pública................................................................................................................................................ 350
2.263.3 clave pública................................................................................................................................................ 350
2.263.4 (en) public key.............................................................................................................................................. 350
2.263.5 (en) public key.............................................................................................................................................. 350
2.263.6 (en) Public key.............................................................................................................................................. 350
2.263.7 (en) public key.............................................................................................................................................. 350
2.263.8 (en) Public Key............................................................................................................................................. 351
2.263.9 (en) Public key or public number.............................................................................................................. 351
2.263.10 (en) Public key.............................................................................................................................................. 351
2.263.11 (en) Public key.............................................................................................................................................. 351
2.263.12 (en) Public Key............................................................................................................................................. 351
2.263.13 (fr) clé publique........................................................................................................................................... 351
2.263.14 (fr) Clé publique........................................................................................................................................... 351
2.263.15 (fr) clé publique........................................................................................................................................... 351
2.264 Clave secreta........................................................................................................................................................... 352
2.264.1 Clave secreta................................................................................................................................................ 352
2.264.2 clave secreta................................................................................................................................................ 352
2.264.3 (en) secret key.............................................................................................................................................. 352
2.264.4 (en) secret key.............................................................................................................................................. 352
2.264.5 (en) Secret key............................................................................................................................................. 352
2.264.6 (en) secret key.............................................................................................................................................. 352
2.264.7 (en) Secret key............................................................................................................................................. 352
2.264.8 (en) Private key; secret key (deprecated)............................................................................................... 352
2.264.9 (en) Secret key............................................................................................................................................. 353
2.264.10 (en) Secret key............................................................................................................................................. 353
2.264.11 (en) Secret key............................................................................................................................................. 353
2.264.12 (en) Secret key............................................................................................................................................. 353
2.264.13 (fr) clé secrète.............................................................................................................................................. 353
2.265 Claves
encapsuladas............................................................................................................................................... 353
2.265.1 Claves encapsuladas................................................................................................................................... 353
2.265.2 (en) key encapsulation............................................................................................................................... 353
2.266 Clave simétrica........................................................................................................................................................ 353
2.266.1 Clave simétrica............................................................................................................................................ 354
2.266.2 (en) symmetric key...................................................................................................................................... 354
2.266.3 (en) symmetric key...................................................................................................................................... 354
2.266.4 (en) Symmetric key..................................................................................................................................... 354
2.267 CMAC
authentication mode.................................................................................................................................. 354
2.267.1 CMAC authentication mode...................................................................................................................... 354
2.267.2 (en) CMAC authentication mode.............................................................................................................. 354
2.267.3 (en) CMAC.................................................................................................................................................... 354
2.268 CMS -
Cryptographic Message Syntax.................................................................................................................. 354
2.268.1 CMS - Cryptographic Message Syntax..................................................................................................... 355
2.268.2 (en) Cryptographic
Message Syntax (CMS)............................................................................................ 355
2.268.3 (en) CMS - Cryptographic Message Syntax............................................................................................ 355
2.269 Codificación
segura................................................................................................................................................ 355
2.269.1 Codificación segura..................................................................................................................................... 355
2.269.2 (en) Secure Coding:..................................................................................................................................... 355
2.269.3 (fr) Codage sécurisé.................................................................................................................................... 355
2.270 Codificar.................................................................................................................................................................. 355
2.270.1 codificar........................................................................................................................................................ 355
2.270.2 (en) encode................................................................................................................................................... 355
2.271 Código...................................................................................................................................................................... 356
2.271.1 Código........................................................................................................................................................... 356
2.271.1 (en) code....................................................................................................................................................... 356
2.271.2 (en) code....................................................................................................................................................... 356
2.271.3 (en) Code...................................................................................................................................................... 356
2.271.4 (en) Codemaker........................................................................................................................................... 356
2.271.5 (en) Codebreaker......................................................................................................................................... 357
2.272 Código dañino......................................................................................................................................................... 357
2.272.1 Software malicioso o malware................................................................................................................. 357
2.272.2 Malware malicious software.................................................................................................................... 357
2.272.3 Código malicioso......................................................................................................................................... 357
2.272.4 (en) Malicious Software / Malware:........................................................................................................ 357
2.272.5 (en) Malicious code..................................................................................................................................... 358
2.272.6 (en) Malware............................................................................................................................................... 358
2.272.7 (en) Malicious Logic:................................................................................................................................... 358
2.272.8 (en) Malicious Code.................................................................................................................................... 358
2.272.9 (en) Malware............................................................................................................................................... 358
2.272.10 (en) malicious code..................................................................................................................................... 358
2.272.11 (en) malicious applets................................................................................................................................ 359
2.272.12 (en) malicious logic..................................................................................................................................... 359
2.272.13 (en) malware................................................................................................................................................ 359
2.272.14 (en) Malware............................................................................................................................................... 359
2.272.15 (en) Malicious Code.................................................................................................................................... 359
2.272.16 (en) Malware............................................................................................................................................... 359
2.272.17 (en) Malware............................................................................................................................................... 359
2.272.18 (en) Malicious software............................................................................................................................. 359
2.272.19 (en) Malware............................................................................................................................................... 360
2.272.20 (en) malware................................................................................................................................................ 360
2.272.21 (fr) Logiciel malveillant / maliciel............................................................................................................. 360
2.272.22 (fr) Malware................................................................................................................................................. 360
2.272.23 (fr) Malware................................................................................................................................................. 360
2.273 Código de
autenticación de mensajes.................................................................................................................... 360
2.273.1 Código de autenticación de mensajes..................................................................................................... 361
2.273.2 Código de autenticación de mensaje....................................................................................................... 361
2.273.1 (en) message authentication code........................................................................................................... 361
2.273.2 (en) Message
Authentication Code (MAC), message authentication code...................................... 361
2.273.3 (en) Message
authentication code (MAC).............................................................................................. 361
2.273.4 (en) authentication code........................................................................................................................... 361
2.273.5 (en) Authentication code........................................................................................................................... 362
2.273.6 (en) Message
authentication code (MAC).............................................................................................. 362
2.274 Código de
detección de errores............................................................................................................................. 362
2.274.1 Código de detección de errores................................................................................................................ 362
2.274.2 (en) error detection code........................................................................................................................... 362
2.274.3 (en) error detection code........................................................................................................................... 362
2.275 Cold standby............................................................................................................................................................ 362
2.275.1 Recuperación Gradual................................................................................................................................ 362
2.275.2 (en) Cold Standby........................................................................................................................................ 362
2.275.3 (en) Gradual Recovery................................................................................................................................ 362
2.275.4 (fr) Reprise graduelle.................................................................................................................................. 363
2.276 Código móvil........................................................................................................................................................... 363
2.276.1 Código móvil................................................................................................................................................ 363
2.276.2 (en) Mobile Code......................................................................................................................................... 363
2.276.3 (en) Mobile Code Technologies................................................................................................................ 363
2.277 COF – Ciphering Offset........................................................................................................................................... 363
2.277.1 COF – Ciphering Offset............................................................................................................................... 363
2.277.2 (en) COF – Ciphering Offset....................................................................................................................... 363
2.278 Colisión.................................................................................................................................................................... 364
2.278.1 Colisión.......................................................................................................................................................... 364
2.278.2 (en) Collision................................................................................................................................................. 364
2.278.3 (en) Collision................................................................................................................................................. 364
2.279 Comité de
seguridad de la información................................................................................................................ 364
2.279.1 Comité de
Seguridad de la Información.................................................................................................. 364
2.279.2 (en) Committee on Information Security................................................................................................ 364
2.280 Comp 128-1.............................................................................................................................................................. 364
2.280.1 Comp128-1................................................................................................................................................... 365
2.280.2 (en) Comp128-1........................................................................................................................................... 365
2.281 Compartimentación................................................................................................................................................ 365
2.281.1 Compartimentación.................................................................................................................................... 365
2.281.2 Compartimentación.................................................................................................................................... 365
2.281.3 (en) Compartmentalization....................................................................................................................... 365
2.281.4 (en) Compartmentalization....................................................................................................................... 365
2.282 Compartimento....................................................................................................................................................... 365
2.282.1 Compartimento........................................................................................................................................... 365
2.282.2 (en) compartment....................................................................................................................................... 366
2.283 Compatibilidad
electromagnética......................................................................................................................... 366
2.283.1 Compatibilidad electromagnética............................................................................................................ 366
2.283.2 (en) Electromagnetic compatibility.......................................................................................................... 366
2.284 Comprometer.......................................................................................................................................................... 366
2.284.1 estar o poner en compromiso................................................................................................................... 366
2.284.2 Comprometer............................................................................................................................................... 366
2.284.3 Compromiso de
seguridad o comprometimiento de seguridad......................................................... 366
2.284.4 (en) compromise......................................................................................................................................... 366
2.284.5 data breach.................................................................................................................................................. 367
2.284.1 (en) Compromise......................................................................................................................................... 367
2.284.2 (en) security compromise.......................................................................................................................... 367
2.284.3 (en) data compromise................................................................................................................................ 367
2.284.4 (en) Compromise......................................................................................................................................... 367
2.284.5 (en) compromise......................................................................................................................................... 367
2.284.6 (en) Compromise......................................................................................................................................... 368
2.284.7 (en) Compromise......................................................................................................................................... 368
2.284.8 (en) Compromise......................................................................................................................................... 368
2.284.9 (en) Compromise......................................................................................................................................... 368
2.284.10 (fr) Incident de sécurité.............................................................................................................................. 368
2.285 Compusec................................................................................................................................................................. 368
2.285.1 Seguridad de
los ordenadores (COMPUSEC).......................................................................................... 369
2.285.1 (en) Computer security (COMPUSEC)...................................................................................................... 369
2.285.2 (en) computer security (COMPUSEC)....................................................................................................... 369
2.286 Concentrador......................................................................................................................................................... 369
2.286.1 Concentrador............................................................................................................................................... 369
2.286.2 (en) hub......................................................................................................................................................... 369
2.286.3 (en) Hub........................................................................................................................................................ 369
2.287 Concepto de
operación........................................................................................................................................... 369
2.287.1 Concepto de operación.............................................................................................................................. 369
2.287.2 (en) concept of operations (CONOP)....................................................................................................... 370
2.287.3 Security Concept of Operations (Security CONOP)................................................................................ 370
2.288 Concesiones de
seguridad...................................................................................................................................... 370
2.288.1 Concesiones de seguridad......................................................................................................................... 370
2.288.2 (en) Security Trade-Offs............................................................................................................................. 370
2.289 Concienciación
(en seguridad)............................................................................................................................... 370
2.289.1 Concienciación (en seguridad).................................................................................................................. 370
2.289.2 Concienciación (en seguridad).................................................................................................................. 370
2.289.3 (en) What is security awareness?............................................................................................................ 371
2.290 Confianza................................................................................................................................................................. 371
2.290.1 confianza...................................................................................................................................................... 371
2.290.2 Confianza...................................................................................................................................................... 371
2.290.3 fiduciario....................................................................................................................................................... 371
2.290.4 confianza...................................................................................................................................................... 372
2.290.5 (en) trustworthiness................................................................................................................................... 372
2.290.6 (en) trust....................................................................................................................................................... 372
2.290.7 (en) Trust...................................................................................................................................................... 372
2.290.8 (en) Trust...................................................................................................................................................... 372
2.290.9 (en) Trust...................................................................................................................................................... 372
2.290.10 (en) Hierarchical trust................................................................................................................................ 372
2.290.11 (en) trusted IT product............................................................................................................................... 373
2.290.12 (fr) confiance................................................................................................................................................ 373
2.290.13 (fr) confiance................................................................................................................................................ 373
2.291 Confidencialidad..................................................................................................................................................... 373
2.291.1 Confidencialidad.......................................................................................................................................... 373
2.291.2 confidencialidad.......................................................................................................................................... 373
2.291.3 Confidencialidad.......................................................................................................................................... 373
2.291.4 confidencialidad de los datos.................................................................................................................... 373
2.291.5 Confidencialidad.......................................................................................................................................... 373
2.291.6 Confidencialidad.......................................................................................................................................... 374
2.291.7 Confidencialidad
del tráfico de datos (Traffic flow confidentiality)................................................... 374
2.291.8 Confidencialidad.......................................................................................................................................... 374
2.291.9 confidencialidad.......................................................................................................................................... 374
2.291.1 (en) confidentiality...................................................................................................................................... 374
2.291.2 (en) Confidentiality..................................................................................................................................... 374
2.291.1 (en) Confidentiality..................................................................................................................................... 374
2.291.2 (en) data confidentiality............................................................................................................................ 375
2.291.3 (en) Confidentiality..................................................................................................................................... 375
2.291.4 (en) Confidentiality..................................................................................................................................... 375
2.291.5 (en) Confidentiality..................................................................................................................................... 375
2.291.6 (en) Confidentiality..................................................................................................................................... 375
2.291.7 (en) Confidentiality..................................................................................................................................... 375
2.291.8 (en) Data confidentiality............................................................................................................................ 375
2.291.9 (en) Confidentiality..................................................................................................................................... 375
2.291.10 (en) Confidentiality..................................................................................................................................... 376
2.291.11 (en) confidentiality...................................................................................................................................... 376
2.291.12 (en) Data confidentiality............................................................................................................................ 376
2.291.13 (en) Confidentiality..................................................................................................................................... 376
2.291.14 (en) confidentiality...................................................................................................................................... 376
2.291.15 (en) Confidentiality..................................................................................................................................... 376
2.291.16 (en) Confidentiality..................................................................................................................................... 376
2.291.17 (en) Confidentiality..................................................................................................................................... 376
2.291.18 (en) confidentiality...................................................................................................................................... 376
2.291.19 (en) confidentiality...................................................................................................................................... 377
2.291.20 (en) Confidentiality..................................................................................................................................... 377
2.291.21 (fr) Confidentialité....................................................................................................................................... 377
2.291.22 (fr) confidentialité des données................................................................................................................ 377
2.291.23 (fr) Confidentialité....................................................................................................................................... 377
2.291.24 (fr) Confidentialité....................................................................................................................................... 377
2.291.25 (fr) Confidentialité....................................................................................................................................... 377
2.292 Confidencialidad
del tráfico de datos.................................................................................................................. 377
2.292.1 Confidencialidad del tráfico de datos...................................................................................................... 377
2.292.2 confidencialidad del flujo de tráfico........................................................................................................ 378
2.292.3 (en) traffic-flow confidentiality (TFC)...................................................................................................... 378
2.292.4 (en) traffic flow confidentiality................................................................................................................. 378
2.292.5 (en) Traffic flow confidentiality................................................................................................................ 378
2.292.6 (fr) confidentialité du
flux de données.................................................................................................... 378
2.293 Configuración......................................................................................................................................................... 378
2.293.1 Configuración............................................................................................................................................... 378
2.293.2 Elemento de Configuración [Configuration Item] (CI).......................................................................... 378
2.293.3 Configuración............................................................................................................................................... 379
2.293.4 (en) Configuration....................................................................................................................................... 379
2.293.5 (en) Configuration Item (CI)...................................................................................................................... 379
2.293.6 (en) Configuration....................................................................................................................................... 379
2.293.7 (fr) Configuration........................................................................................................................................ 379
2.293.8 (fr) Elément de
Configuration (CI)............................................................................................................ 379
2.294 Conformidad........................................................................................................................................................... 379
2.294.1 Conformidad................................................................................................................................................ 379
2.294.2 Conformidad................................................................................................................................................ 380
2.294.3 (en) conformity............................................................................................................................................ 380
2.294.4 (en) Compliance........................................................................................................................................... 380
2.294.5 (en) Compliance........................................................................................................................................... 380
2.294.6 (en) regularoty compliance....................................................................................................................... 380
2.294.7 (fr) Conformité............................................................................................................................................. 380
2.295 Confusión................................................................................................................................................................ 380
2.295.1 Confusión...................................................................................................................................................... 380
2.295.2 Confusión...................................................................................................................................................... 381
2.295.3 (en) Confusion.............................................................................................................................................. 381
2.296 Conocimiento nulo
(técnica de)............................................................................................................................ 381
2.296.1 Técnica de conocimiento nulo.................................................................................................................. 381
2.296.2 Conocimiento cero...................................................................................................................................... 381
2.296.3 (en) Zero-knowledge Password Protocol................................................................................................ 381
2.296.4 (en) zero-knowledge proof........................................................................................................................ 381
2.296.5 (en) zero-knowledge................................................................................................................................... 381
2.296.6 (en) Zero-knowledge proof........................................................................................................................ 382
2.297 Conocimiento
parcial............................................................................................................................................. 382
2.297.1 Conocimiento parcial.................................................................................................................................. 382
2.297.2 Conocimiento parcial.................................................................................................................................. 382
2.297.3 Conocimiento parcial.................................................................................................................................. 382
2.297.4 (en) split knowledge................................................................................................................................... 382
2.297.5 (en) split knowledge................................................................................................................................... 383
2.297.6 (en) Split knowledge................................................................................................................................... 383
2.297.7 (en) split knowledge................................................................................................................................... 383
2.297.8 (en) Split knowledge................................................................................................................................... 383
2.297.9 (en) Split knowledge................................................................................................................................... 383
2.297.10 (fr) Fractionnement des connaissances.................................................................................................. 383
2.298 consecuencia........................................................................................................................................................... 383
2.298.1 Consecuencia............................................................................................................................................... 384
2.298.2 consecuencia................................................................................................................................................ 384
2.298.3 (en) consequence........................................................................................................................................ 384
2.298.4 (en) consequence........................................................................................................................................ 384
2.298.5 (en) CONSEQUENCE.................................................................................................................................... 384
2.298.6 (en) CONSEQUENCE ASSESSMENT........................................................................................................... 385
2.298.7 (en) ECONOMIC CONSEQUENCE:............................................................................................................. 385
2.298.8 (en) HUMAN CONSEQUENCE.................................................................................................................... 385
2.298.9 (en) MISSION CONSEQUENCE:.................................................................................................................. 385
2.298.10 (en) PSYCHOLOGICAL CONSEQUENCE:.................................................................................................... 385
2.298.11 (en) threat consequence............................................................................................................................ 385
2.298.12 (fr) conséquence.......................................................................................................................................... 386
2.299 Constructor de virus.............................................................................................................................................. 386
2.299.1 Constructor de virus.................................................................................................................................... 386
2.299.2 (en) Virus builder......................................................................................................................................... 386
2.300 Contención.............................................................................................................................................................. 386
2.300.1 contención.................................................................................................................................................... 386
2.300.2 (en) Containment........................................................................................................................................ 386
2.301 Contenido activo.................................................................................................................................................... 386
2.301.1 Contenido activo......................................................................................................................................... 386
2.301.2 (en) active content...................................................................................................................................... 387
2.301.3 (en) Active Content..................................................................................................................................... 387
2.302 Continuidad............................................................................................................................................................. 387
2.302.1 Continuidad.................................................................................................................................................. 387
2.302.2 (en) business continuity............................................................................................................................. 387
2.302.3 (en) Continuity............................................................................................................................................. 387
2.303 Contra medida......................................................................................................................................................... 387
2.303.1 Medidas de seguridad................................................................................................................................ 388
2.303.1 (en) Countermeasure.................................................................................................................................. 388
2.303.2 Contramedida.............................................................................................................................................. 388
2.303.3 (en) COUNTERMEASURE............................................................................................................................ 388
2.303.4 (en) countermeasure.................................................................................................................................. 388
2.303.5 (en) Countermeasure.................................................................................................................................. 388
2.303.1 (en) Countermeasure.................................................................................................................................. 388
2.303.2 (en) Countermeasure.................................................................................................................................. 389
2.303.3 (en) Countermeasure.................................................................................................................................. 389
2.303.4 (en) Countermeasure.................................................................................................................................. 389
2.303.5 (fr) Contre-mesure...................................................................................................................................... 389
2.304 Contraseña.............................................................................................................................................................. 389
2.304.1 contraseña................................................................................................................................................... 389
2.304.2 Contraseña................................................................................................................................................... 389
2.304.3 Contraseña o clave de acceso................................................................................................................... 389
2.304.4 Contraseña desechable.............................................................................................................................. 390
2.304.5 contraseña................................................................................................................................................... 390
2.304.6 (en) password.............................................................................................................................................. 390
2.304.1 (en) password.............................................................................................................................................. 390
2.304.2 (en) password.............................................................................................................................................. 390
2.304.3 (en) Password.............................................................................................................................................. 390
2.304.4 (en) Password.............................................................................................................................................. 391
2.304.5 (en) password.............................................................................................................................................. 391
2.304.6 (en) Password.............................................................................................................................................. 391
2.304.7 (en) Password.............................................................................................................................................. 391
2.304.8 (en) Password.............................................................................................................................................. 391
2.304.9 (en) Escrow Passwords............................................................................................................................... 391
2.304.10 (fr) mot de passe......................................................................................................................................... 391
2.304.11 (fr) Mot de passe......................................................................................................................................... 391
2.304.12 (fr) Mot de passe......................................................................................................................................... 391
2.305 Contraseña de un
solo uso.................................................................................................................................... 392
2.305.1 Contraseña desechable.............................................................................................................................. 392
2.305.2 (en) one-time password, One-Time Password (OTP)............................................................................ 392
2.305.3 (en) One-time password - OTP.................................................................................................................. 392
2.305.4 (fr) Mot de passe dynamique.................................................................................................................... 392
2.305.5 (fr) Mot de passe non
re-jouable.............................................................................................................. 393
2.306 Contraseña
predeterminada.................................................................................................................................. 393
2.306.1 Contraseña predeterminada..................................................................................................................... 393
2.306.2 (en) Default Password:............................................................................................................................... 393
2.306.3 (fr) Mot de passe par défaut..................................................................................................................... 393
2.307 Control.................................................................................................................................................................... 393
2.307.1 Control.......................................................................................................................................................... 394
2.307.2 control........................................................................................................................................................... 394
2.307.3 Control.......................................................................................................................................................... 394
2.307.4 Control.......................................................................................................................................................... 394
2.307.5 Control.......................................................................................................................................................... 394
2.307.6 (en) control................................................................................................................................................... 394
2.307.7 (en) control................................................................................................................................................... 395
2.307.8 (en) security controls.................................................................................................................................. 395
2.307.9 (en) security controls.................................................................................................................................. 395
2.307.10 (en) Control.................................................................................................................................................. 395
2.307.11 (en) Control.................................................................................................................................................. 395
2.307.12 (en) Security controls.................................................................................................................................. 395
2.307.13 (en) security control baseline.................................................................................................................... 395
2.307.14 (en) Security Control Baseline................................................................................................................... 396
2.307.15 (en) Security Controls................................................................................................................................. 396
2.307.16 (en) Security control................................................................................................................................... 396
2.307.17 (en) Security Control Assessment............................................................................................................. 396
2.307.18 (en) security control assessment.............................................................................................................. 396
2.307.19 (fr) Contrôle.................................................................................................................................................. 396
2.307.20 (fr) moyen de maîtrise................................................................................................................................ 396
2.307.21 (fr) Contrôle.................................................................................................................................................. 397
2.307.22 (fr) Contrôle de sécurité............................................................................................................................. 397
2.308 Control de acceso................................................................................................................................................... 397
2.308.1 Control de acceso........................................................................................................................................ 397
2.308.2 Control de acceso........................................................................................................................................ 397
2.308.3 Control de accesos...................................................................................................................................... 397
2.308.4 Control de Acceso........................................................................................................................................ 397
2.308.5 Control de acceso........................................................................................................................................ 397
2.308.6 Control de acceso........................................................................................................................................ 398
2.308.7 Modelo de control de accesos.................................................................................................................. 398
2.308.8 Control de acceso........................................................................................................................................ 398
2.308.9 control de acceso........................................................................................................................................ 398
2.308.10 (EN) access control...................................................................................................................................... 398
2.308.1 (en) Access control...................................................................................................................................... 398
2.308.1 (en) access control mechanism................................................................................................................. 398
2.308.2 (en) Acess Control....................................................................................................................................... 399
2.308.3 (en) access control...................................................................................................................................... 399
2.308.4 (en) Access control...................................................................................................................................... 399
2.308.5 (en) Access control...................................................................................................................................... 399
2.308.6 (en) access control...................................................................................................................................... 399
2.308.7 (en) access control...................................................................................................................................... 399
2.308.8 (en) Access control...................................................................................................................................... 399
2.308.9 (en) access control...................................................................................................................................... 400
2.308.10 (en) Access control...................................................................................................................................... 400
2.308.11 (en) Access Control..................................................................................................................................... 400
2.308.12 (en) Access Control..................................................................................................................................... 400
2.308.13 (fr) Contrôle d’accès................................................................................................................................... 400
2.308.14 (fr) contrôle d'accès.................................................................................................................................... 400
2.308.15 (fr) Contrôle d'accès.................................................................................................................................... 400
2.309 Control de acceso
basado en atributos............................................................................................................... 400
2.309.1 Control de
acceso basado en atributos................................................................................................... 401
2.309.2 (en) Attribute-Based Access Control........................................................................................................ 401
2.310 Control de acceso
basado en identidad................................................................................................................ 401
2.310.1 Control de
acceso basado en identidad.................................................................................................. 401
2.310.2 (en) Identity-Based Access Control.......................................................................................................... 401
2.310.3 (en) identity-based access control........................................................................................................... 401
2.311 Control de acceso
basado en políticas................................................................................................................. 401
2.311.1 Control de
acceso basado en políticas.................................................................................................... 401
2.311.2 (en) Policy Based Access Control (PBAC)................................................................................................. 402
2.312 Control de acceso
basado en reglas..................................................................................................................... 402
2.312.1 Control de
acceso basado en reglas........................................................................................................ 402
2.312.2 (en) Rule Set Based Access Control (RSBAC)........................................................................................... 402
2.313 Control de acceso
discrecional............................................................................................................................. 402
2.313.1 Control de acceso discrecional.................................................................................................................. 402
2.313.1 (en) Discretionary access control (DAC).................................................................................................. 402
2.313.2 (en) discretionary access control.............................................................................................................. 403
2.313.3 (en) Discretionary access control............................................................................................................. 403
2.313.4 (en) Discretionary Access Control (DAC)................................................................................................. 403
2.314 Control de acceso
obligatorio.............................................................................................................................. 403
2.314.1 Control de acceso obligatorio................................................................................................................... 403
2.314.2 Control de acceso obligatorio................................................................................................................... 404
2.314.1 (en) mandatory access control (MAC)..................................................................................................... 404
2.314.2 (en) mandatory access control................................................................................................................. 404
2.314.3 (en) Mandatory access control................................................................................................................. 404
2.314.4 (en) Mandatory Access Control (MAC).................................................................................................... 404
2.315 Control de acceso
por roles.................................................................................................................................. 404
2.315.1 Control de acceso por roles....................................................................................................................... 405
2.315.2 (en) Role-Based Access Control................................................................................................................ 405
2.315.3 (en) Role-Based Access Control (RBAC)................................................................................................... 405
2.315.4 (en) role-based access control.................................................................................................................. 405
2.315.5 (en) RBAC...................................................................................................................................................... 405
2.315.6 (en) Role-based access control................................................................................................................. 405
2.315.7 (en) Role Based Access Control................................................................................................................. 405
2.316 Controles
compensatorios.................................................................................................................................... 406
2.316.1 Controles de compensación...................................................................................................................... 406
2.316.2 (en) Compensating Controls:.................................................................................................................... 406
2.316.3 (en) Compensating Controls:.................................................................................................................... 406
2.316.4 (en) compensating security control......................................................................................................... 407
2.316.5 (en) Compensating Security Controls...................................................................................................... 407
2.316.6 (fr) Contrôles compensatoires.................................................................................................................. 407
2.317 Control de
configuración..................................................................................................................................... 407
2.317.1 Control de Configuración........................................................................................................................... 407
2.317.2 Gestión de la configuración....................................................................................................................... 408
2.317.3 Control de configuración........................................................................................................................... 408
2.317.1 (en) configuration control......................................................................................................................... 408
2.317.2 (en) configuration control......................................................................................................................... 408
2.317.3 (en) Configuration Control......................................................................................................................... 408
2.317.4 (en) Configuration control......................................................................................................................... 408
2.317.5 (fr) Contrôle des configurations................................................................................................................ 408
2.318 Control de
encaminamiento.................................................................................................................................. 408
2.318.1 Control de encaminamiento...................................................................................................................... 408
2.318.2 control de encaminamiento...................................................................................................................... 409
2.318.3 (en) routing control..................................................................................................................................... 409
2.318.4 (fr) contrôle de routage............................................................................................................................. 409
2.319 Control de
gestión................................................................................................................................................. 409
2.319.1 Control de gestión....................................................................................................................................... 409
2.319.2 (en) Management Controls....................................................................................................................... 409
2.320 Control dual........................................................................................................................................................... 409
2.320.1 Control dual.................................................................................................................................................. 409
2.320.2 (en) Dual Control:........................................................................................................................................ 409
2.320.3 (en) dual control.......................................................................................................................................... 410
2.320.4 (fr) Double contrôle.................................................................................................................................... 410
2.321 Control general...................................................................................................................................................... 410
2.321.1 Control general............................................................................................................................................ 410
2.321.2 Control general............................................................................................................................................ 410
2.321.3 (en) General control.................................................................................................................................... 410
2.322 Control interno...................................................................................................................................................... 410
2.322.1 Control interno............................................................................................................................................ 411
2.322.2 Control Interno............................................................................................................................................ 411
2.322.3 (en) Internal control.................................................................................................................................... 411
2.323 Control operativo.................................................................................................................................................. 411
2.323.1 Control operativo........................................................................................................................................ 411
2.323.2 (en) Operational Controls.......................................................................................................................... 411
2.324 Control
preventivo................................................................................................................................................ 411
2.324.1 Control preventivo...................................................................................................................................... 411
2.324.2 (en) Preventive control............................................................................................................................... 411
2.325 Control que
detecta............................................................................................................................................... 412
2.325.1 Control que detecta.................................................................................................................................... 412
2.325.2 Control de detección................................................................................................................................... 412
2.325.3 (en) Detective control................................................................................................................................. 412
2.326 Control técnico...................................................................................................................................................... 412
2.326.1 Control técnico............................................................................................................................................. 412
2.326.2 (en) Technical Controls............................................................................................................................... 412
2.327 Cookie....................................................................................................................................................................... 412
2.327.1 Cookie............................................................................................................................................................ 412
2.327.2 (en) Cookie................................................................................................................................................... 412
2.327.3 (en) cookie.................................................................................................................................................... 413
2.327.4 (en) cookie.................................................................................................................................................... 413
2.327.5 (en) Cookie................................................................................................................................................... 413
2.327.6 (en) Session Cookies.................................................................................................................................... 413
2.327.7 (en) Persistent Cookie................................................................................................................................. 413
2.327.8 (en) Cookie................................................................................................................................................... 413
2.327.9 (en) Cookie manipulation.......................................................................................................................... 413
2.328 Copia de
seguridad.................................................................................................................................................. 414
2.328.1 Copia de seguridad..................................................................................................................................... 414
2.328.2 Copia de Seguridad..................................................................................................................................... 414
2.328.3 Copia de respaldo....................................................................................................................................... 414
2.328.4 Copia de seguridad..................................................................................................................................... 414
2.328.5 (en) Backup.................................................................................................................................................. 414
2.328.1 (en) Backup.................................................................................................................................................. 414
2.328.2 (en) back up.................................................................................................................................................. 414
2.328.3 (en) Backup.................................................................................................................................................. 414
2.328.4 (en) Backup.................................................................................................................................................. 415
2.328.5 (fr) Sauvegarde............................................................................................................................................ 415
2.328.6 (fr) Copie de sauvegarde
(Backup)........................................................................................................... 415
2.329 Corrección............................................................................................................................................................... 415
2.329.1 Corrección..................................................................................................................................................... 415
2.329.2 (en) correctness........................................................................................................................................... 415
2.329.3 (en) Correctness.......................................................................................................................................... 415
2.330 Correspondencia
de políticas................................................................................................................................. 415
2.330.1 correspondencia de políticas.................................................................................................................... 415
2.330.2 (en) Policy mapping.................................................................................................................................... 415
2.330.3 (fr) mappage de politique.......................................................................................................................... 416
2.331 Cortafuegos............................................................................................................................................................ 416
2.331.1 Firewall......................................................................................................................................................... 416
2.331.2 firewall.......................................................................................................................................................... 416
2.331.3 Cortafuegos.................................................................................................................................................. 416
2.331.4 Cortafuegos.................................................................................................................................................. 416
2.331.5 Cortafuegos.................................................................................................................................................. 417
2.331.6 Cortafuegos de sistema............................................................................................................................. 417
2.331.7 Cortafuegos personal................................................................................................................................. 417
2.331.8 Cortafuegos transparente......................................................................................................................... 417
2.331.9 Cortafuegos virtuales................................................................................................................................. 417
2.331.10 Cortafuegos.................................................................................................................................................. 417
2.331.1 (en) firewall.................................................................................................................................................. 417
2.331.2 (en) firewall.................................................................................................................................................. 417
2.331.3 (en) Firewall................................................................................................................................................. 418
2.331.4 (en) firewall.................................................................................................................................................. 418
2.331.5 (en) Firewall................................................................................................................................................. 418
2.331.6 (en) Firewall................................................................................................................................................. 418
2.331.7 (en) Web Application Firewall.................................................................................................................. 418
2.331.8 (en) Application firewall............................................................................................................................. 418
2.331.9 (en) Firewall................................................................................................................................................. 418
2.331.10 (en) Next-Generation Firewalls (NGFWs)............................................................................................... 419
2.331.11 (en) Next-generation firewall (NGFW):................................................................................................... 419
2.331.12 (en) Deep-Packet Inspection..................................................................................................................... 419
2.331.13 (fr) Pare-feu.................................................................................................................................................. 419
2.331.14 (fr) Pare-feu.................................................................................................................................................. 419
2.332 Cortafuegos
personal............................................................................................................................................ 419
2.332.1 Cortafuegos personal................................................................................................................................. 419
2.332.2 (en) Personal Firewalls............................................................................................................................... 420
2.333 CPS - Declaración
de Prácticas de Certificación................................................................................................. 420
2.333.1 declaración de práctica de certificación................................................................................................. 420
2.333.1 (en) Certification Practice Statement (CPS)............................................................................................ 420
2.333.2 (en) certification
practice statement (CPS)............................................................................................. 420
2.333.3 (en) Certification Practice Statement...................................................................................................... 420
2.333.4 (en) Certification
practice statement (CPS)............................................................................................ 420
2.333.5 (fr) déclaration de
pratique de certification........................................................................................... 420
2.334 Cracker..................................................................................................................................................................... 420
2.334.1 Cracker.......................................................................................................................................................... 421
2.334.2 Cracker.......................................................................................................................................................... 421
2.334.3 (en) cracker.................................................................................................................................................. 421
2.334.4 (en) Cracker.................................................................................................................................................. 421
2.334.5 (en) Black hat............................................................................................................................................... 421
2.334.6 (en) black hat............................................................................................................................................... 422
2.334.7 (en) Cracker.................................................................................................................................................. 422
2.334.8 (fr) Cracker................................................................................................................................................... 422
2.335 Credencial................................................................................................................................................................ 422
2.335.1 Credenciales de autenticación.................................................................................................................. 422
2.335.2 Credencial..................................................................................................................................................... 423
2.335.3 credenciales................................................................................................................................................. 423
2.335.4 (en) Authentication Credentials............................................................................................................... 423
2.335.5 (en) Credential............................................................................................................................................. 423
2.335.6 (en) Credential Service Provider (CSP)..................................................................................................... 423
2.335.1 (en) Credential............................................................................................................................................. 423
2.335.2 (en) credential............................................................................................................................................. 423
2.335.3 (en) Credentials........................................................................................................................................... 424
2.335.4 (fr) Éléments d’authentification............................................................................................................... 424
2.335.5 (fr) justificatif d'identité............................................................................................................................. 424
2.336 Criba de
seguridad.................................................................................................................................................. 424
2.336.1 criba de seguridad...................................................................................................................................... 424
2.336.2 (en) Security screening............................................................................................................................... 424
2.336.3 (fr) Enquête de sécurité.............................................................................................................................. 424
2.337 Criptoanálisis.......................................................................................................................................................... 424
2.337.1 Criptoanálisis............................................................................................................................................... 424
2.337.2 Criptoanálisis............................................................................................................................................... 425
2.337.3 Criptoanalista o descriptador................................................................................................................... 425
2.337.4 criptoanálisis (o análisis criptográfico)................................................................................................... 425
2.337.1 (en) Cryptanalysis........................................................................................................................................ 425
2.337.2 (en) cryptanalysis........................................................................................................................................ 425
2.337.3 (en) Cryptanalysis........................................................................................................................................ 425
2.337.4 (en) Cryptanalysis........................................................................................................................................ 425
2.337.5 (en) Cryptanalysis........................................................................................................................................ 426
2.337.6 (en) Cryptanalysis........................................................................................................................................ 426
2.337.7 (en) Cryptanalysis........................................................................................................................................ 426
2.337.8 (fr) analyse cryptographique.................................................................................................................... 426
2.337.9 (fr) Cryptanalyse.......................................................................................................................................... 426
2.338 Criptoanálisis
diferencial....................................................................................................................................... 426
2.338.1 Criptoanálisis diferencial........................................................................................................................... 426
2.338.2 (en) Differential cryptanalysis................................................................................................................... 427
2.339 Criptoanálisis
lineal............................................................................................................................................... 427
2.339.1 Criptoanálisis lineal..................................................................................................................................... 427
2.339.2 (en) Linear cryptanalysis............................................................................................................................ 427
2.340 Criptocustodio........................................................................................................................................................ 427
2.340.1 Criptocustodio............................................................................................................................................. 427
2.340.2 Custodio cripto............................................................................................................................................ 427
2.340.3 (en) crypto officer........................................................................................................................................ 428
2.340.4 (en) Crypto officer....................................................................................................................................... 428
2.341 Criptófono............................................................................................................................................................... 428
2.341.1 Criptófono.................................................................................................................................................... 428
2.341.2 Criptofonía................................................................................................................................................... 428
2.341.3 (en) Cryptophone........................................................................................................................................ 428
2.342 Criptografía............................................................................................................................................................ 428
2.342.1 Criptografía.................................................................................................................................................. 428
2.342.2 Criptografía.................................................................................................................................................. 428
2.342.3 Criptografía.................................................................................................................................................. 429
2.342.4 criptografía.................................................................................................................................................. 429
2.342.1 (en) Cryptography....................................................................................................................................... 429
2.342.2 (en) cryptography....................................................................................................................................... 429
2.342.3 (en) Cryptography....................................................................................................................................... 429
2.342.4 (en) Cryptography....................................................................................................................................... 429
2.342.5 (en) Cryptography....................................................................................................................................... 430
2.342.6 (fr) Cryptographie....................................................................................................................................... 430
2.342.7 (fr) cryptographie........................................................................................................................................ 430
2.342.8 (fr) Cryptographie....................................................................................................................................... 430
2.343 Criptografía
cuántica............................................................................................................................................ 430
2.343.1 Criptografía cuántica.................................................................................................................................. 430
2.343.2 (en) Quantum cryptography..................................................................................................................... 430
2.344 Criptografía de
clave pública................................................................................................................................ 431
2.344.1 Cifra de clave pública................................................................................................................................. 431
2.344.2 (en) Public Key Cryptography (PKC)......................................................................................................... 431
2.344.3 (en) Public key cryptography..................................................................................................................... 431
2.344.4 (fr) Crypto-système à clé
publique (ou asymétrique)........................................................................... 431
2.345 Criptografía de
clave secreta................................................................................................................................ 432
2.345.1 Cifra de clave
secreta o Cifra simétrica................................................................................................... 432
2.345.2 (en) secret-key cryptography.................................................................................................................... 432
2.345.3 (en) Secret key (symmetric) cryptographic algorithm.......................................................................... 432
2.346 Criptografía de
curvas elípticas............................................................................................................................ 432
2.346.1 ECC................................................................................................................................................................. 432
2.346.2 Curva elíptica............................................................................................................................................... 432
2.346.3 (en) ECC......................................................................................................................................................... 432
2.346.4 (en) ECC (Elliptic Curve Cryptosystem).................................................................................................... 433
2.346.5 (fr) ECC.......................................................................................................................................................... 433
2.347 Criptografía
robusta.............................................................................................................................................. 433
2.347.1 Criptografía sólida...................................................................................................................................... 433
2.347.2 (en) Strong Cryptography.......................................................................................................................... 433
2.347.3 (fr) Cryptographie robuste......................................................................................................................... 434
2.348 Criptograma............................................................................................................................................................ 434
2.348.1 Criptograma................................................................................................................................................. 434
2.348.2 Criptograma................................................................................................................................................. 434
2.348.3 criptograma (o texto cifrado)................................................................................................................... 434
2.348.4 (en) Cryptogram.......................................................................................................................................... 434
2.349 Criptología.............................................................................................................................................................. 435
2.349.1 Criptología.................................................................................................................................................... 435
2.349.2 Criptología.................................................................................................................................................... 435
2.349.3 Criptología.................................................................................................................................................... 435
2.349.4 Criptólogo..................................................................................................................................................... 435
2.349.1 (en) Cryptology............................................................................................................................................ 435
2.349.2 (en) cryptology............................................................................................................................................. 435
2.349.3 (en) Cryptology............................................................................................................................................ 435
2.349.4 (en) Cryptologist.......................................................................................................................................... 435
2.349.5 (en) Cryptology............................................................................................................................................ 436
2.349.6 (fr) Cryptologie............................................................................................................................................ 436
2.350 Criptológico............................................................................................................................................................ 436
2.350.1 Criptológico.................................................................................................................................................. 436
2.351 Criptosistema.......................................................................................................................................................... 436
2.351.1 sistema criptográfico, criptosistema....................................................................................................... 436
2.351.2 Criptosistema............................................................................................................................................... 436
2.351.3 Criptosistema cuántico.............................................................................................................................. 436
2.351.4 Criptosistema
de uso único (one-time-cryptosystem).......................................................................... 436
2.351.5 Criptosistema electrónico.......................................................................................................................... 436
2.351.6 Criptosistema manual................................................................................................................................ 436
2.351.7 Criptosistema mecánico............................................................................................................................. 437
2.351.8 Criptosistema probabilístico..................................................................................................................... 437
2.351.9 (en) cryptographic system......................................................................................................................... 437
2.351.10 (en) cryptographic system, cryptosystem............................................................................................... 437
2.351.11 (en) Cryptosystem....................................................................................................................................... 437
2.351.12 (fr) système de chiffrement....................................................................................................................... 437
2.352 Criptosistema de
un solo uso................................................................................................................................. 437
2.352.1 Criptosistema de un solo uso.................................................................................................................... 437
2.352.2 (en) one-time cryptosystem...................................................................................................................... 438
2.353 Criterios comunes................................................................................................................................................... 438
2.353.1 Criterios comunes....................................................................................................................................... 439
2.353.2 (en) Common Criteria................................................................................................................................. 440
2.353.3 (en) Common criteria................................................................................................................................. 440
2.353.4 (en) Common Criteria................................................................................................................................. 440
2.354 Criterios de
evaluación de riesgos........................................................................................................................ 440
2.354.1 criterios de riesgo:...................................................................................................................................... 441
2.354.2 Criterios de evaluación de riesgos............................................................................................................ 441
2.354.3 criterios de riesgo........................................................................................................................................ 441
2.354.4 (en) risk criteria........................................................................................................................................... 441
2.354.5 (en) Risk criteria.......................................................................................................................................... 441
2.354.6 (fr) critères de risque.................................................................................................................................. 441
2.355 Criticidad................................................................................................................................................................. 441
2.355.1 Criticidad....................................................................................................................................................... 441
2.355.2 (en) criticality level...................................................................................................................................... 442
2.355.3 (en) Critical Assets....................................................................................................................................... 442
2.356 CRL completa........................................................................................................................................................... 442
2.356.1 CRL completa............................................................................................................................................... 442
2.356.2 (en) Full CRL.................................................................................................................................................. 442
2.356.3 (fr) liste CRL complète................................................................................................................................ 442
2.357 CRL incremental...................................................................................................................................................... 442
2.357.1 CRL incremental.......................................................................................................................................... 442
2.357.2 (en) delta CRL............................................................................................................................................... 443
2.357.3 (en) Delta-CRL.............................................................................................................................................. 443
2.357.4 (fr) liste CRL delta (liste dCRL)................................................................................................................... 443
2.358 CRL indirecto........................................................................................................................................................... 443
2.358.1 CRL indirecto................................................................................................................................................ 443
2.358.2 (en) Indirect CRL.......................................................................................................................................... 443
2.358.3 (fr) liste CRL indirecte................................................................................................................................. 443
2.359 cross-site
request forgery..................................................................................................................................... 443
2.359.1 Falsificación de solicitudes entre distintos sitios (CSRF)....................................................................... 444
2.359.2 Cross Site Request Forgery........................................................................................................................ 444
2.359.3 (en) Cross-Site Request Forgery (CSRF):.................................................................................................. 444
2.359.4 (en) Cross-site request forgery................................................................................................................. 444
2.359.5 (fr) Attaques Cross-Site Request Forgery (CSRF)................................................................................... 444
2.360 Cross site
scripting................................................................................................................................................. 444
2.360.1 Lenguaje de comandos entre distintos sitios (XSS)............................................................................... 445
2.360.2 XSS................................................................................................................................................................. 445
2.360.3 XSS (Cross-site Scripting)............................................................................................................................ 445
2.360.4 Vulnerabilidad CROSS-SITE-SCRIPTING................................................................................................... 445
2.360.5 (en) Cross Site Scripting (XSS)................................................................................................................... 445
2.360.6 (en) Cross-site scripting (XSS).................................................................................................................... 446
2.360.7 (en) Cross-site scripting (XSS).................................................................................................................... 446
2.360.8 (en) Cross-Site Scripting............................................................................................................................. 446
2.360.9 (fr) Attaques Cross-Site Scripting (XSS)................................................................................................... 446
2.361 Cross-zone
scripting............................................................................................................................................... 446
2.361.1 Cross-zone scripting.................................................................................................................................... 446
2.361.2 (en) Cross-zone scripting............................................................................................................................ 447
2.361.3 (en) Cross-zone scripting............................................................................................................................ 447
2.362 Cryptoki.................................................................................................................................................................... 447
2.362.1 Cryptoki......................................................................................................................................................... 447
2.362.2 (en) Cryptoki................................................................................................................................................. 448
2.363 CTR - Cifrado
modo con contador....................................................................................................................... 448
2.363.1 CTR - Cifrado modo con contador............................................................................................................ 448
2.363.2 (en) counter mode (CTR)............................................................................................................................ 448
2.363.3 (en) CTR - Counter encryption mode........................................................................................................ 448
2.364 Cuadro de mando
integral..................................................................................................................................... 448
2.364.1 Cuadro de mando integral........................................................................................................................ 448
2.364.2 Marcador de puntuación balanceado..................................................................................................... 449
2.364.3 (en) Balanced scorecard............................................................................................................................ 449
2.365 Cuarentena.............................................................................................................................................................. 449
2.365.1 cuarentena................................................................................................................................................... 449
2.365.2 Cuarentena................................................................................................................................................... 449
2.365.3 (en) Quarantining....................................................................................................................................... 450
2.365.4 (en) quarentine............................................................................................................................................ 450
2.365.5 (en) Quarantine........................................................................................................................................... 450
2.365.6 (en) Quarantining a computer.................................................................................................................. 450
2.365.7 (en) Quarantine........................................................................................................................................... 450
2.366 Cuentas
predeterminadas...................................................................................................................................... 450
2.366.1 Cuentas predeterminadas......................................................................................................................... 450
2.366.2 (en) Default Accounts................................................................................................................................. 451
2.366.3 (fr) Compte par défaut............................................................................................................................... 451
2.367 Custodio................................................................................................................................................................... 451
2.367.1 Encargado del tratamiento....................................................................................................................... 451
2.367.2 Responsable de seguridad......................................................................................................................... 451
2.367.3 (en) custodian.............................................................................................................................................. 451
2.367.4 (en) Data Custodian.................................................................................................................................... 452
2.368 CVE........................................................................................................................................................................... 452
2.368.1 CVE................................................................................................................................................................. 452
2.368.2 (en) CVE........................................................................................................................................................ 452
2.368.3 (fr) CVE.......................................................................................................................................................... 452
2.369 CVSS......................................................................................................................................................................... 452
2.369.1 CVSS............................................................................................................................................................... 453
2.369.2 (en) CVSS....................................................................................................................................................... 453
2.369.3 (fr) CVSS........................................................................................................................................................ 453
2.370 cwin.......................................................................................................................................................................... 453
2.370.1 (en) CWIN - Critical infrastructure Warning Information Network.................................................... 453
2.371 Cyberslacking.......................................................................................................................................................... 453
2.371.1 perder el tiempo.......................................................................................................................................... 453
2.371.2 (en) Cyberslacking....................................................................................................................................... 454
2.371.3 (en) Cyberslacking....................................................................................................................................... 454
2.372 Daño......................................................................................................................................................................... 454
2.372.1 dañar............................................................................................................................................................. 454
2.372.2 (en) damage................................................................................................................................................. 454
2.372.3 (en) Potential damage............................................................................................................................... 454
2.373 Datos........................................................................................................................................................................ 454
2.373.1 Datos............................................................................................................................................................. 454
2.373.2 (en) data....................................................................................................................................................... 455
2.373.3 (en) data....................................................................................................................................................... 455
2.373.4 (en) Data / Information.............................................................................................................................. 455
2.374 Datos de carácter
personal................................................................................................................................... 455
2.374.1 Datos de carácter personal....................................................................................................................... 455
2.374.2 Información de identificación personal................................................................................................... 455
2.374.3 Persona identificable.................................................................................................................................. 455
2.374.4 (en) Personally Identifiable Information:................................................................................................ 455
2.374.5 (en) Personally Identifiable Information (PII)......................................................................................... 456
2.374.6 (en) personally identifiable information (PII)......................................................................................... 456
2.374.7 (fr) Informations permettant une identification personnelle.............................................................. 456
2.375 Datos de creación
de firma.................................................................................................................................... 456
2.375.1 datos de creación de firma........................................................................................................................ 456
2.375.2 (en) Signature-creation data..................................................................................................................... 456
2.376 datos de
validación................................................................................................................................................. 456
2.376.1 datos de validación..................................................................................................................................... 457
2.376.2 (en) validation data.................................................................................................................................... 457
2.376.3 (fr) données de validation.......................................................................................................................... 457
2.377 Datos de
verificación de firma............................................................................................................................... 457
2.377.1 datos de
verificación de firma.................................................................................................................. 457
2.377.2 (en) Signature-verification-data............................................................................................................... 457
2.378 De-anonymization................................................................................................................................................... 457
2.378.1 Desanonimizar............................................................................................................................................. 457
2.378.2 (en) de-anonymization (deanonymization)............................................................................................ 457
2.379 Declaración de
aplicabilidad.................................................................................................................................. 458
2.379.1 Declaración de aplicabilidad..................................................................................................................... 458
2.380 Declaración de
Requisitos de Seguridad.............................................................................................................. 458
2.380.1 Declaración de Requisitos de Seguridad................................................................................................. 458
2.380.2 Declaración de
Requisitos de Seguridad de la Interconexión.............................................................. 458
2.381 Declaración de
seguridad...................................................................................................................................... 458
2.381.1 Declaración de seguridad.......................................................................................................................... 458
2.381.2 (en) Security Target (ST)............................................................................................................................ 458
2.382 Declarante de
privilegios....................................................................................................................................... 459
2.382.1 asertor de privilegios.................................................................................................................................. 459
2.382.2 (en) Privilege asserter................................................................................................................................. 459
2.382.3 (fr) déclarant de privilège.......................................................................................................................... 459
2.383 Decripción................................................................................................................................................................ 459
2.383.1 decripción..................................................................................................................................................... 459
2.383.2 (en) Decryption............................................................................................................................................ 459
2.383.3 (en) decryption............................................................................................................................................ 459
2.384 decrypt..................................................................................................................................................................... 459
2.384.1 (en) decrypt.................................................................................................................................................. 459
2.384.2 (en) decrypt.................................................................................................................................................. 460
2.384.3 (fr) Décrypter............................................................................................................................................... 460
2.385 Defacement.............................................................................................................................................................. 460
2.385.1 desfigurar..................................................................................................................................................... 460
2.385.2 (en) Defacement.......................................................................................................................................... 460
2.385.3 (fr) Defacement........................................................................................................................................... 460
2.386 Defecto (en
programas)......................................................................................................................................... 460
2.386.1 Defecto (en programas)............................................................................................................................. 460
2.386.2 (en) defect (software)................................................................................................................................. 460
2.387 Defensa en
profundidad......................................................................................................................................... 461
2.387.1 Defensa en profundidad............................................................................................................................ 461
2.387.2 (en) Defense in depth................................................................................................................................. 461
2.387.3 (en) Defense-in-depth................................................................................................................................. 461
2.387.4 (en) Defense-in-depth................................................................................................................................. 461
2.387.5 (en) defense-in-breadth............................................................................................................................. 461
2.387.6 (en) defense in depth.................................................................................................................................. 461
2.387.7 (en) Defense In-Depth................................................................................................................................ 461
2.387.8 (en) defense in depth.................................................................................................................................. 462
2.388 Delegación............................................................................................................................................................... 462
2.388.1 delegar.......................................................................................................................................................... 462
2.388.2 delegación.................................................................................................................................................... 462
2.388.3 (en) Delegation............................................................................................................................................ 462
2.388.4 (fr) délégation.............................................................................................................................................. 462
2.389 Denegación de
servicio........................................................................................................................................... 462
2.389.1 Denegación de servicio.............................................................................................................................. 462
2.389.2 Denegación de servicio.............................................................................................................................. 463
2.389.3 Denegación de servicio.............................................................................................................................. 463
2.389.4 negación (o denegación) de servicio....................................................................................................... 463
2.389.5 (en) Denial of Service (DoS):...................................................................................................................... 463
2.389.6 (en) Denial of service.................................................................................................................................. 463
2.389.7 (en) Denial of service (DOS) attack.......................................................................................................... 464
2.389.1 (en) Denial of service.................................................................................................................................. 464
2.389.2 (en) denial of service.................................................................................................................................. 464
2.389.3 (en) Denial of service.................................................................................................................................. 464
2.389.4 (en) Denial of Service - DoS....................................................................................................................... 464
2.389.5 (en) Denial of Service (DoS)....................................................................................................................... 464
2.389.6 (en) denial of service.................................................................................................................................. 464
2.389.7 (en) denial of service.................................................................................................................................. 464
2.389.8 (en) denial of service.................................................................................................................................. 465
2.389.9 (en) Denial of service.................................................................................................................................. 465
2.389.10 (en) Denial of Service (DoS)....................................................................................................................... 465
2.389.11 (en) Denial of Service.................................................................................................................................. 465
2.389.12 (en) Denial of Service Protection.............................................................................................................. 465
2.389.13 (fr) déni de service....................................................................................................................................... 465
2.389.14 (fr) Déni de service (DoS)........................................................................................................................... 466
2.389.15 (fr) refus de service ou
déni de service.................................................................................................... 466
2.389.16 (fr) Déni de service...................................................................................................................................... 466
2.390 Denegación de
servicio distribuida........................................................................................................................ 466
2.390.1 Denegación de servicio distribuida.......................................................................................................... 466
2.390.2 Denegación de servicio distribuida.......................................................................................................... 466
2.390.3 (en) Distributed Denial of Service (DDoS):.............................................................................................. 466
2.390.4 (en) Distributed Denial of Service (DDoS)............................................................................................... 467
2.390.5 (en) Distributed Denial of Service (DDoS)............................................................................................... 467
2.390.6 (en) Distributed denial of service............................................................................................................. 467
2.390.7 (en) Distributed Denial of Service (DDoS) Attack................................................................................... 467
2.390.8 (en) Distributed denial of service............................................................................................................. 467
2.390.9 (en) DDoS - Distributed Denial of Service................................................................................................ 467
2.390.10 (fr) DDoS (Distributed Denial of services)............................................................................................... 467
2.390.11 (fr) Déni de service distribué..................................................................................................................... 467
2.391 Depósito de
claves................................................................................................................................................... 468
2.391.1 Depósito de claves...................................................................................................................................... 468
2.391.2 (en) key escrow............................................................................................................................................ 468
2.391.3 (en) key escrow system.............................................................................................................................. 468
2.391.4 (en) key escrow............................................................................................................................................ 468
2.392 DER -
Distinguished Encoding Rules..................................................................................................................... 469
2.393 DER -
Distinguished Encoding Rules..................................................................................................................... 469
2.393.1 (en) DER - Distinguished Encoding Rules................................................................................................ 469
2.393.2 (en) distinguished encoding rules............................................................................................................ 469
2.394 Derecho de acceso................................................................................................................................................... 469
2.394.1 Derechos de acceso.................................................................................................................................... 469
2.394.2 (en) Access right.......................................................................................................................................... 469
2.395 Derivación de una
clave a partir de otra.............................................................................................................. 469
2.395.1 Derivación de
una clave a partir de otra................................................................................................. 470
2.395.2 (en) Key derivation...................................................................................................................................... 470
2.395.3 (en) key derivation function...................................................................................................................... 470
2.395.4 (en) Key derivation function...................................................................................................................... 470
2.396 Derrame................................................................................................................................................................... 470
2.396.1 Derrame........................................................................................................................................................ 470
2.396.2 (en) spillage.................................................................................................................................................. 470
2.397 Desastre................................................................................................................................................................... 470
2.397.1 catástrofe..................................................................................................................................................... 470
2.397.2 catástrofe..................................................................................................................................................... 471
2.397.3 (en) Disaster................................................................................................................................................. 471
2.397.4 (en) disaster................................................................................................................................................. 471
2.397.5 (en) Disaster................................................................................................................................................. 471
2.398 Desastre natural.................................................................................................................................................... 471
2.398.1 Desastre natural.......................................................................................................................................... 471
2.398.2 (en) Natural disaster................................................................................................................................... 471
2.399 Desbordamiento de
memoria................................................................................................................................. 471
2.399.1 Desbordamiento de buffer........................................................................................................................ 471
2.399.2 Desbordamiento de búfer.......................................................................................................................... 472
2.399.3 Desbordamiento de memoria................................................................................................................... 472
2.399.4 (en) buffer overflow.................................................................................................................................... 472
2.399.5 (en) Buffer overflow.................................................................................................................................... 473
2.399.6 (en) Buffer overrun..................................................................................................................................... 473
2.399.7 (en) Buffer overflow.................................................................................................................................... 473
2.399.8 (en) Buffer overrun..................................................................................................................................... 473
2.399.9 (en) Buffer overflow.................................................................................................................................... 473
2.399.10 (en) Buffer overflow.................................................................................................................................... 473
2.399.11 (en) Buffer Overflow................................................................................................................................... 474
2.399.12 (en) overflow buffers.................................................................................................................................. 474
2.399.13 (fr) Saturation de la mémoire tampon.................................................................................................... 474
2.399.14 (fr) Débordement de tampon.................................................................................................................... 475
2.399.15 (fr) débordement de pile............................................................................................................................ 475
2.400 Descifrado............................................................................................................................................................... 475
2.400.1 Descifrado.................................................................................................................................................... 475
2.400.2 descifrado..................................................................................................................................................... 475
2.400.3 (en) decipherment....................................................................................................................................... 475
2.400.4 (en) decipherment....................................................................................................................................... 475
2.400.5 (en) Decipherment (decryption)............................................................................................................... 476
2.400.6 (en) Decipherment...................................................................................................................................... 476
2.400.7 (en) Decipherment or decryption............................................................................................................. 476
2.400.8 (fr) déchiffrement........................................................................................................................................ 476
2.401 Descifrar.................................................................................................................................................................. 476
2.401.1 descifrar........................................................................................................................................................ 476
2.401.2 Descifrar....................................................................................................................................................... 476
2.401.1 (en) decipher................................................................................................................................................ 476
2.401.2 (en) decipher................................................................................................................................................ 476
2.401.3 (en) Decipher................................................................................................................................................ 476
2.402 Desclasificación...................................................................................................................................................... 477
2.402.1 Desclasificación........................................................................................................................................... 477
2.402.2 (en) declassification.................................................................................................................................... 477
2.402.3 (en) Declassification................................................................................................................................... 477
2.403 Desclasificar............................................................................................................................................................ 477
2.403.1 Desclasificar................................................................................................................................................. 477
2.403.2 (en) declassify.............................................................................................................................................. 477
2.404 Descodificar............................................................................................................................................................ 477
2.404.1 descodificar.................................................................................................................................................. 477
2.404.2 Descodificar.................................................................................................................................................. 478
2.404.3 (en) decode................................................................................................................................................... 478
2.405 Descriptar................................................................................................................................................................ 478
2.405.1 Descriptar..................................................................................................................................................... 478
2.405.2 Descriptar..................................................................................................................................................... 478
2.406 DES - Data
Encryption Standard........................................................................................................................... 478
2.406.1 DES - Data Encryption Standard............................................................................................................... 478
2.406.2 DES................................................................................................................................................................. 478
2.406.1 (en) data encryption standard DES.......................................................................................................... 479
2.406.2 DES................................................................................................................................................................. 479
2.406.3 (en) Data Encryption Standard - DES....................................................................................................... 479
2.406.4 (en) DES......................................................................................................................................................... 479
2.406.5 (fr) DES (Data Encryption
Standard / ANSI X3.92)................................................................................. 479
2.406.6 (fr) DES - Data
Encryption Standard........................................................................................................ 479
2.407 Descubrimiento
electrónico.................................................................................................................................. 480
2.407.1 Descubrimiento electrónico...................................................................................................................... 480
2.407.2 (en) electronic discovery............................................................................................................................ 480
2.407.3 (en) E-discovery........................................................................................................................................... 480
2.408 Desduplicación........................................................................................................................................................ 480
2.408.1 Desduplicación............................................................................................................................................. 480
2.408.2 (en) Data deduplication............................................................................................................................. 481
2.409 Desencriptar............................................................................................................................................................ 481
2.409.1 Desencriptar................................................................................................................................................. 481
2.410 Desinfección............................................................................................................................................................ 481
2.410.1 Desinfección................................................................................................................................................. 481
2.410.2 (en) Disinfecting.......................................................................................................................................... 481
2.410.3 (en) Disinfection.......................................................................................................................................... 481
2.410.4 (fr) Utilitaire de désinfection..................................................................................................................... 481
2.411 Desmagnetizador.................................................................................................................................................... 482
2.411.1 Desmagnetizador........................................................................................................................................ 482
2.411.2 Destrucción magnética.............................................................................................................................. 482
2.411.1 (en) Degauss................................................................................................................................................ 482
2.411.2 (en) degauss................................................................................................................................................. 482
2.411.3 (en) degausser............................................................................................................................................. 482
2.411.4 (en) Degauss................................................................................................................................................ 482
2.411.5 (en) Degaussing........................................................................................................................................... 482
2.411.6 (en) degausser............................................................................................................................................. 483
2.411.7 (fr) Démagnétisation.................................................................................................................................. 483
2.412 Detección de
anomalías.......................................................................................................................................... 483
2.412.1 Detección de anomalía.............................................................................................................................. 483
2.412.2 Detección de anomalías............................................................................................................................. 483
2.412.3 (en) anomaly detection.............................................................................................................................. 483
2.412.4 (en) Anomaly-Based Detection................................................................................................................. 483
2.412.5 (en) Anomaly Detection............................................................................................................................. 483
2.413 Detección de
incidentes.......................................................................................................................................... 484
2.413.1 Detección de sucesos.................................................................................................................................. 484
2.413.2 (en) Event detection................................................................................................................................... 484
2.414 Detección de
manipulaciones................................................................................................................................. 484
2.414.1 Detección de manipulaciones................................................................................................................... 484
2.414.2 (en) tamper-evident.................................................................................................................................... 484
2.414.3 (en) tamper detection................................................................................................................................ 484
2.414.4 (en) tamper evidence................................................................................................................................. 484
2.414.5 (en) Tamper detection................................................................................................................................ 485
2.414.6 (en) Tamper evidence................................................................................................................................. 485
2.415 Detector de
manipulación...................................................................................................................................... 485
2.415.1 Detector de manipulación......................................................................................................................... 485
2.415.2 detección de manipulación....................................................................................................................... 485
2.415.3 (en) Manipulation detection..................................................................................................................... 485
2.415.4 (fr) détection de modification................................................................................................................... 485
2.416 Día cero.................................................................................................................................................................... 485
2.416.1 Zero-day........................................................................................................................................................ 485
2.416.2 Día cero......................................................................................................................................................... 486
2.416.3 (en) zero-day exploit................................................................................................................................... 486
2.416.4 (en) Day Zero............................................................................................................................................... 486
2.416.5 (en) Zero-Day Exploit.................................................................................................................................. 486
2.417 Diario remoto.......................................................................................................................................................... 486
2.417.1 Diario remoto............................................................................................................................................... 486
2.417.2 (en) Remote Journaling.............................................................................................................................. 486
2.418 Difusión.................................................................................................................................................................... 486
2.418.1 Difusión......................................................................................................................................................... 487
2.418.2 Difusión......................................................................................................................................................... 487
2.418.3 (en) Diffusion............................................................................................................................................... 487
2.419 Diodo........................................................................................................................................................................ 487
2.419.1 DISPOSITIVO DE SENTIDO ÚNICO............................................................................................................. 487
2.419.2 (en) Data Diode:.......................................................................................................................................... 487
2.419.3 (en) Unidirectional gateway...................................................................................................................... 487
2.419.4 (en) Unidirectional network...................................................................................................................... 488
2.419.5 (en) Data Diode........................................................................................................................................... 488
2.420 Disponibilidad.......................................................................................................................................................... 488
2.420.1 disponible..................................................................................................................................................... 488
2.420.2 disponibilidad............................................................................................................................................... 488
2.420.3 disponibilidad............................................................................................................................................... 488
2.420.4 Disponibilidad.............................................................................................................................................. 489
2.420.5 Disponibilidad.............................................................................................................................................. 489
2.420.6 Disponibilidad.............................................................................................................................................. 489
2.420.7 Disponibilidad.............................................................................................................................................. 489
2.420.8 disponibilidad............................................................................................................................................... 489
2.420.9 (en) availability............................................................................................................................................ 489
2.420.10 (en) Availability............................................................................................................................................ 489
2.420.1 (en) Availability............................................................................................................................................ 490
2.420.2 (en) availability............................................................................................................................................ 490
2.420.3 (en) Availability............................................................................................................................................ 490
2.420.4 (en) Availability............................................................................................................................................ 490
2.420.5 (en) Availability............................................................................................................................................ 490
2.420.6 (en) availability............................................................................................................................................ 490
2.420.7 (en) Availability............................................................................................................................................ 490
2.420.8 (en) Availability............................................................................................................................................ 490
2.420.9 (en) Availability............................................................................................................................................ 491
2.420.10 (en) Availability............................................................................................................................................ 491
2.420.11 (en) availability............................................................................................................................................ 491
2.420.12 (en) Availability............................................................................................................................................ 491
2.420.13 (en) Availability............................................................................................................................................ 491
2.420.14 (en) Availability............................................................................................................................................ 491
2.420.15 (en) Availability............................................................................................................................................ 491
2.420.16 (fr) Disponibilité........................................................................................................................................... 491
2.420.17 (fr) Disponibilité........................................................................................................................................... 492
2.420.18 (fr) Disponibilité........................................................................................................................................... 492
2.420.19 (fr) Disponibilité........................................................................................................................................... 492
2.421 Dispositivo
criptográfico....................................................................................................................................... 492
2.421.1 Dispositivo seguro criptográfico............................................................................................................... 492
2.421.2 HSM............................................................................................................................................................... 492
2.421.3 HSM............................................................................................................................................................... 492
2.421.4 Dispositivo criptográfico............................................................................................................................ 493
2.421.5 Equipo criptográfico................................................................................................................................... 493
2.421.6 (en) Secure Cryptographic Device:........................................................................................................... 493
2.421.7 (en) HSM....................................................................................................................................................... 493
2.421.8 (en) cryptographic component................................................................................................................. 493
2.421.9 (fr) Périphériques cryptographiques
sécurisés....................................................................................... 493
2.421.10 (fr) HSM........................................................................................................................................................ 493
2.422 Dispositivo de
creación de firma............................................................................................................................ 494
2.422.1 dispositivo de
creación de firma electrónica.......................................................................................... 494
2.422.2 dispositivo
cualificado de creación de firma electrónica..................................................................... 494
2.422.3 dispositivo de
creación de firma............................................................................................................... 494
2.422.4 dispositivo
seguro de creación de firma................................................................................................. 494
2.422.5 (en) electronic
signature creation device................................................................................................ 494
2.422.6 (en) qualified electronic signature creation device............................................................................... 495
2.422.7 (en) Signature-creation device.................................................................................................................. 495
2.422.8 (en) Secure-signature-creation device..................................................................................................... 495
2.422.9 (fr) dispositif de
création de signature électronique............................................................................. 495
2.422.10 (fr) dispositif de
création de signature électronique qualifié.............................................................. 495
2.423 Dispositivo de protección
perimetral.................................................................................................................... 495
2.423.1 Dispositivo de protección de perímetro.................................................................................................. 496
2.423.2 (en) Boundary Protection Device.............................................................................................................. 496
2.424 Dispositivo de
verificación de firma...................................................................................................................... 496
2.424.1 dispositivo de verificación de firma......................................................................................................... 496
2.424.2 (en) Signature-verification device............................................................................................................ 496
2.425 Distribución de claves............................................................................................................................................. 496
2.425.1 Distribución electrónica de claves............................................................................................................ 497
2.425.2 Distribución física de claves...................................................................................................................... 497
2.425.3 (en) key distribution.................................................................................................................................... 497
2.425.4 (en) Key distribution................................................................................................................................... 497
2.426 Disuasión.................................................................................................................................................................. 497
2.426.1 Disuasión...................................................................................................................................................... 497
2.426.2 (en) DETERRENT.......................................................................................................................................... 497
2.427 Dominio de
información......................................................................................................................................... 497
2.427.1 Dominio de información............................................................................................................................ 497
2.427.2 (en) information domain........................................................................................................................... 498
2.428 Dominio de
seguridad............................................................................................................................................. 498
2.428.1 dominio de seguridad................................................................................................................................. 498
2.428.2 (en) domain.................................................................................................................................................. 498
2.428.3 (en) domain.................................................................................................................................................. 498
2.428.4 (en) Security domain................................................................................................................................... 498
2.428.5 (en) security domain................................................................................................................................... 499
2.428.6 (en) Domain................................................................................................................................................. 499
2.428.1 (en) Domain................................................................................................................................................. 499
2.428.2 (en) Security Domain.................................................................................................................................. 499
2.428.3 (en) security domain................................................................................................................................... 499
2.428.4 (en) security domain................................................................................................................................... 499
2.428.5 (en) Domain................................................................................................................................................. 499
2.428.6 (en) security domain................................................................................................................................... 499
2.428.7 (en) Security Domain.................................................................................................................................. 499
2.428.8 (en) security domain................................................................................................................................... 499
2.428.9 (en) Security domain................................................................................................................................... 500
2.428.10 (en) domain separation............................................................................................................................. 500
2.428.11 (fr) domaine de sécurité............................................................................................................................. 500
2.429 Drive-by Exploits..................................................................................................................................................... 500
2.429.1 Drive-by......................................................................................................................................................... 500
2.429.2 (en) Drive-by Exploits.................................................................................................................................. 500
2.429.3 (en) Drive-by-Downloads........................................................................................................................... 500
2.429.4 (en) drive-by download.............................................................................................................................. 501
2.429.5 (en) drive-by-download:............................................................................................................................ 501
2.430 DSA - Digital
Signature Algorithm....................................................................................................................... 501
2.430.1 Estándar estadounidense de firma digital.............................................................................................. 501
2.430.2 DSA................................................................................................................................................................ 501
2.430.3 (en) Digital Signature Algorithm (DSA)................................................................................................... 502
2.430.4 (en) Digital Signature
Standard (DSS)..................................................................................................... 502
2.430.5 (en) DSA........................................................................................................................................................ 502
2.431 Dsniff....................................................................................................................................................................... 502
2.431.1 Dsniff............................................................................................................................................................. 502
2.431.2 (en) Dsniff..................................................................................................................................................... 502
2.432 ECB - Electronic
codebook mode.......................................................................................................................... 502
2.432.1 Libro electrónico de códigos...................................................................................................................... 503
2.432.2 (en) electronic codebook (ECB)................................................................................................................. 503
2.432.3 (en) ECB - Electronic codebook mode...................................................................................................... 503
2.433 ECDSA - Elliptic
Curve Digital Signature Algorithm.......................................................................................... 503
2.433.1 ECDSA - Elliptic Curve Digital Signature Algorithm............................................................................... 503
2.433.2 (en) elliptic curve
cryptography (ECC)..................................................................................................... 503
2.433.3 (en) Elliptic Curve Digital Signature Algorithm (ECDSA)....................................................................... 503
2.434 Efectividad............................................................................................................................................................... 504
2.434.1 efectividad.................................................................................................................................................... 504
2.434.2 Eficacia.......................................................................................................................................................... 504
2.434.3 Efectividad.................................................................................................................................................... 504
2.434.4 eficacia.......................................................................................................................................................... 504
2.434.5 Efectividad.................................................................................................................................................... 504
2.434.6 Efectividad.................................................................................................................................................... 504
2.434.7 (en) effectiviness......................................................................................................................................... 504
2.434.8 (en) Effectivity.............................................................................................................................................. 504
2.434.9 (en) effectiveness........................................................................................................................................ 504
2.434.10 (en) effectiveness........................................................................................................................................ 505
2.434.11 (en) Effectiveness........................................................................................................................................ 505
2.434.12 (en) Effectiveness........................................................................................................................................ 505
2.434.13 (fr) Efficacité................................................................................................................................................. 505
2.435 Efecto avalancha.................................................................................................................................................... 505
2.435.1 Efecto avalancha......................................................................................................................................... 505
2.435.2 Efecto avalancha......................................................................................................................................... 505
2.435.3 (en) Avalanche Effect................................................................................................................................. 505
2.436 Eficiencia.................................................................................................................................................................. 506
2.436.1 Eficiencia....................................................................................................................................................... 506
2.436.2 eficiencia....................................................................................................................................................... 506
2.436.3 (en) Efficiency............................................................................................................................................... 506
2.436.4 (fr) Efficience................................................................................................................................................ 506
2.437 El Gamal.................................................................................................................................................................. 506
2.437.1 Firma digital de El Gamal.......................................................................................................................... 506
2.437.2 Esquema de EL GAMAL.............................................................................................................................. 506
2.437.3 (en) El Gamal algorithm............................................................................................................................. 507
2.437.4 (en) ElGamal signature scheme................................................................................................................ 507
2.438 Emanaciones............................................................................................................................................................ 507
2.438.1 Emanaciones................................................................................................................................................ 507
2.438.2 (en) emanation............................................................................................................................................ 507
2.438.3 (en) Emanations Analysis........................................................................................................................... 507
2.438.4 (en) Radiation Monitoring......................................................................................................................... 508
2.439 Emanaciones
comprometedoras........................................................................................................................... 508
2.439.1 Emanaciones comprometedoras.............................................................................................................. 508
2.439.2 (en) Compromising emanations............................................................................................................... 508
2.440 Emergencia.............................................................................................................................................................. 508
2.440.1 Emergencia.................................................................................................................................................. 508
2.440.2 (en) emergency response........................................................................................................................... 508
2.441 Emplazamiento
móvil............................................................................................................................................. 508
2.441.1 Emplazamiento móvil................................................................................................................................. 509
2.441.2 (en) Mobile site............................................................................................................................................ 509
2.441.3 (en) Mobile site............................................................................................................................................ 509
2.442 Encadenamiento
criptográfico............................................................................................................................. 509
2.442.1 encadenamiento criptográfico................................................................................................................. 509
2.442.2 (en) cryptographic chaining...................................................................................................................... 509
2.442.3 (fr) chaînage cryptographique.................................................................................................................. 509
2.443 Encripción................................................................................................................................................................ 509
2.443.1 encripción..................................................................................................................................................... 509
2.443.2 (en) encryption............................................................................................................................................ 509
2.443.3 (en) Encryption............................................................................................................................................ 510
2.443.4 (en) encryption............................................................................................................................................ 510
2.443.5 (en) Encryption............................................................................................................................................ 510
2.444 encrypt..................................................................................................................................................................... 510
2.444.1 Encriptar....................................................................................................................................................... 510
2.444.1 (en) encrypt.................................................................................................................................................. 510
2.444.2 (en) encrypt.................................................................................................................................................. 510
2.445 Engaño..................................................................................................................................................................... 511
2.445.1 Engaño.......................................................................................................................................................... 511
2.445.2 (en) deception.............................................................................................................................................. 511
2.446 Engaño en
comunicaciones.................................................................................................................................... 511
2.446.1 Engaño en comunicaciones....................................................................................................................... 511
2.446.2 (en) Communications deception............................................................................................................... 511
2.446.3 (en) imitative communications deception.............................................................................................. 511
2.446.4 (en) manipulative communications deception...................................................................................... 511
2.447 ENIGMA................................................................................................................................................................... 511
2.447.1 Enigma (máquina)...................................................................................................................................... 512
2.447.2 (en) ENIGMA................................................................................................................................................ 512
2.447.3 (en) Enigma machine.................................................................................................................................. 512
2.448 Entidad..................................................................................................................................................................... 512
2.448.1 Entidad.......................................................................................................................................................... 512
2.448.2 (en) Entity..................................................................................................................................................... 512
2.448.3 (en) entity..................................................................................................................................................... 513
2.448.4 (en) entity..................................................................................................................................................... 513
2.448.5 (en) entity..................................................................................................................................................... 513
2.449 Entidad de
confianza.............................................................................................................................................. 513
2.449.1 entidad confiable........................................................................................................................................ 513
2.449.2 entidad condicionalmente confiable....................................................................................................... 513
2.449.3 entidad incondicionalmente confiable.................................................................................................... 513
2.449.4 (en) trusted entity....................................................................................................................................... 513
2.449.5 (en) Conditionally trusted entity............................................................................................................... 513
2.449.6 (en) unconditionally trusted entity.......................................................................................................... 513
2.449.7 (fr) entité de confiance............................................................................................................................... 514
2.449.8 (fr) entité de confiance conditionnelle.................................................................................................... 514
2.449.9 (fr) entité de confiance inconditionnelle................................................................................................. 514
2.450 Entidad final............................................................................................................................................................ 514
2.450.1 entidad final................................................................................................................................................. 514
2.450.2 (en) end entity............................................................................................................................................. 514
2.450.3 (fr) entité finale........................................................................................................................................... 514
2.451 Entorno................................................................................................................................................................... 514
2.451.1 Entorno......................................................................................................................................................... 514
2.451.2 (en) environment......................................................................................................................................... 514
2.452 Entrenamiento (en
seguridad)............................................................................................................................... 515
2.452.1 Entrenamiento (en seguridad).................................................................................................................. 515
2.452.2 (en) What is security training?................................................................................................................. 515
2.453 Entropía................................................................................................................................................................... 515
2.453.1 Entropía........................................................................................................................................................ 515
2.453.2 Entropia........................................................................................................................................................ 515
2.453.3 (en) Entropy................................................................................................................................................. 515
2.453.4 (en) Guessing entropy................................................................................................................................ 515
2.453.5 (en) Min-entropy......................................................................................................................................... 516
2.454 Envenenamiento
del DNS....................................................................................................................................... 516
2.454.1 Envenenamiento del DNS.......................................................................................................................... 516
2.454.2 (en) Cache poisoning.................................................................................................................................. 516
2.454.3 (en) DNS cache poisoning.......................................................................................................................... 516
2.454.4 (en) Cache Poisoning.................................................................................................................................. 516
2.454.5 (en) Dns cache poisoning........................................................................................................................... 517
2.455 Envenenamiento
del motor de búsqueda............................................................................................................. 517
2.455.1 Envenenamiento del motor de búsqueda............................................................................................... 517
2.455.2 (en) Search Engine Poisoning.................................................................................................................... 517
2.455.3 (en) Search Engine Poisoning (SEP).......................................................................................................... 517
2.456 Equipo azul.............................................................................................................................................................. 517
2.456.1 Equipo azul................................................................................................................................................... 517
2.456.2 (en) Blue Team............................................................................................................................................. 518
2.457 Equipo blanco.......................................................................................................................................................... 518
2.457.1 Equipo blanco.............................................................................................................................................. 518
2.457.2 (en) White Team.......................................................................................................................................... 518
2.458 Equipo
criptográfico.............................................................................................................................................. 519
2.458.1 Equipo criptográfico................................................................................................................................... 519
2.459 Equipo de cifra........................................................................................................................................................ 519
2.459.1 Equipo de cifra............................................................................................................................................. 519
2.459.2 (en) Encryption equipment........................................................................................................................ 519
2.460 Equipo rojo.............................................................................................................................................................. 519
2.460.1 Equipo rojo................................................................................................................................................... 519
2.460.2 (en) red team............................................................................................................................................... 519
2.460.3 (en) Red Team.............................................................................................................................................. 519
2.460.4 (en) Red Team.............................................................................................................................................. 520
2.461 Escalada de
privilegios........................................................................................................................................... 520
2.461.1 Elevación de privilegios.............................................................................................................................. 520
2.461.2 (en) Privilege escalation............................................................................................................................. 520
2.461.3 (en) Elevation of privilege.......................................................................................................................... 520
2.461.4 (en) elevation of privilege.......................................................................................................................... 520
2.461.5 (en) Privilege escalation............................................................................................................................. 521
2.462 Escáner de
vulnerabilidades.................................................................................................................................. 521
2.462.1 Escáner de vulnerabilidades...................................................................................................................... 521
2.462.2 Análisis de
seguridad de la red................................................................................................................. 521
2.462.3 (en) Network Security Scan....................................................................................................................... 521
2.462.4 (en) Vulnerability scanner.......................................................................................................................... 521
2.462.5 (en) Web Application Vulnerability Scanner.......................................................................................... 522
2.462.6 (en) vulnerability scanning........................................................................................................................ 522
2.462.7 (fr) Analyse de sécurité du réseau............................................................................................................ 522
2.463 Escolta..................................................................................................................................................................... 522
2.463.1 escolta........................................................................................................................................................... 522
2.463.2 (en) Escort.................................................................................................................................................... 522
2.464 Espacio de claves..................................................................................................................................................... 523
2.464.1 Espacio de claves......................................................................................................................................... 523
2.464.2 Espacio de claves......................................................................................................................................... 523
2.464.3 (en) key space.............................................................................................................................................. 523
2.465 Espacio
inspeccionable............................................................................................................................................ 523
2.465.1 Espacio inspeccionable............................................................................................................................... 523
2.465.2 (en) inspectable space................................................................................................................................ 523
2.465.3 (en) zone of control..................................................................................................................................... 523
2.466 ESP -
Encapsulating Security Payload.................................................................................................................. 524
2.466.1 ESP - Encapsulating Security Payload...................................................................................................... 524
2.466.2 (en) Encapsulating Security Payload (ESP)............................................................................................. 524
2.466.3 (en) Encapsulating Security Payload - ESP.............................................................................................. 524
2.466.4 (en) ESP - Encapsulating Security Payload.............................................................................................. 524
2.467 Espectro
ensanchado............................................................................................................................................. 524
2.467.1 Espectro ensanchado por salto de frecuencia....................................................................................... 524
2.467.2 (en) frequency hopping.............................................................................................................................. 525
2.467.3 (en) spread spectrum................................................................................................................................. 525
2.468 Esquema de
clasificación........................................................................................................................................ 525
2.468.1 Esquema de clasificación de datos.......................................................................................................... 525
2.468.2 Clasificación de la información................................................................................................................. 525
2.468.3 Proceso de clasificación / desclasificación.............................................................................................. 525
2.468.4 Clasificación................................................................................................................................................. 525
2.468.5 Grado de
clasificación o nivel de seguridad........................................................................................... 526
2.468.6 (en) Data classification scheme................................................................................................................ 526
2.469 Esquema de
evaluación.......................................................................................................................................... 526
2.469.1 Esquema de evaluación............................................................................................................................. 526
2.469.2 (en) evaluation scheme.............................................................................................................................. 526
2.469.3 (en) National Scheme................................................................................................................................. 526
2.470 Establecimiento
de claves...................................................................................................................................... 526
2.470.1 Especificación de clave............................................................................................................................... 527
2.470.2 (en) key establishment............................................................................................................................... 527
2.470.3 (en) key establishment (algorithm or protocol)..................................................................................... 527
2.470.4 (en) Key establishment............................................................................................................................... 527
2.470.5 (en) key establishment............................................................................................................................... 527
2.470.6 (en) Key establishment............................................................................................................................... 527
2.470.7 (en) Key establishment............................................................................................................................... 527
2.470.8 (en) Key establishment............................................................................................................................... 527
2.471 esteganálisis............................................................................................................................................................ 528
2.471.1 esteganálisis................................................................................................................................................ 528
2.471.2 (en) Steganalysis......................................................................................................................................... 528
2.472 Esteganografía....................................................................................................................................................... 528
2.472.1 Esteganografía............................................................................................................................................ 528
2.472.2 Esteganografía............................................................................................................................................ 528
2.472.1 Cifra
encubierta o mensaje disimulado o esteganografía................................................................... 528
2.472.2 (en) Steganography:................................................................................................................................... 529
2.472.3 (en) steganography.................................................................................................................................... 529
2.472.4 (en) steganography.................................................................................................................................... 529
2.472.5 (en) Steganography.................................................................................................................................... 529
2.473 Estimar..................................................................................................................................................................... 529
2.473.1 Estimar.......................................................................................................................................................... 529
2.473.2 (en) Estimate................................................................................................................................................ 529
2.473.3 (en) estimate................................................................................................................................................ 530
2.474 Etiqueta de
clasificación........................................................................................................................................ 530
2.474.1 Etiqueta de clasificación............................................................................................................................ 530
2.474.2 (en) classification label............................................................................................................................... 530
2.475 Etiqueta de
seguridad............................................................................................................................................. 530
2.475.1 Etiqueta de seguridad................................................................................................................................ 531
2.475.2 Etiqueta de seguridad................................................................................................................................ 531
2.475.3 etiqueta de seguridad................................................................................................................................ 531
2.475.4 (en) security label........................................................................................................................................ 531
2.475.5 (en) Security label....................................................................................................................................... 531
2.475.6 (fr) étiquette de sécurité............................................................................................................................ 531
2.476 Etiqueta de
sensibilidad.......................................................................................................................................... 531
2.476.1 Etiqueta de sensibilidad............................................................................................................................. 531
2.476.2 (en) sensitivity label.................................................................................................................................... 532
2.476.3 (en) sensitivity label.................................................................................................................................... 532
2.476.4 (en) Sensitivity label.................................................................................................................................... 532
2.477 Evaluación............................................................................................................................................................... 532
2.477.1 Evaluación.................................................................................................................................................... 532
2.477.2 (en) EVALUATION........................................................................................................................................ 532
2.478 Evaluación de la
seguridad.................................................................................................................................... 532
2.478.1 Evaluación de la seguridad........................................................................................................................ 532
2.478.2 (en) security assessment............................................................................................................................ 532
2.479 Evaluación de
respeto a la privacidad.................................................................................................................. 532
2.479.1 (en) Privacy Impact Assessment............................................................................................................... 533
2.479.2 (en) Privacy Impact Assessment (PIA)..................................................................................................... 533
2.480 Evaluación de
riesgos............................................................................................................................................. 533
2.480.1 Evaluación del riesgo.................................................................................................................................. 533
2.480.1 evaluación del riesgo.................................................................................................................................. 533
2.480.2 Evaluación de riesgos................................................................................................................................. 533
2.480.3 (en) risk evaluation..................................................................................................................................... 534
2.480.4 (en) risk evaluation..................................................................................................................................... 534
2.480.5 (fr) évaluation du risque............................................................................................................................ 534
2.480.1 (fr) Évaluation des risques......................................................................................................................... 534
2.481 Evaluación de
seguridad........................................................................................................................................ 534
2.481.1 evaluar.......................................................................................................................................................... 534
2.481.2 Evaluación de la Seguridad....................................................................................................................... 534
2.481.3 Evaluación.................................................................................................................................................... 535
2.481.4 Evaluación.................................................................................................................................................... 535
2.481.5 (en) evaluation............................................................................................................................................ 535
2.481.6 (en) evaluation............................................................................................................................................ 535
2.481.7 (en) security evaluation............................................................................................................................. 535
2.481.8 (en) Evaluation of security......................................................................................................................... 535
2.481.9 (en) PP evaluation....................................................................................................................................... 535
2.481.10 (en) ST evaluation....................................................................................................................................... 536
2.481.11 (en) TOE evaluation.................................................................................................................................... 536
2.482 Evaluación de
vulnerabilidad................................................................................................................................ 536
2.482.1 Evaluación de vulnerabilidad.................................................................................................................... 536
2.482.2 (en) Vulnerability assessment................................................................................................................... 536
2.483 Evaluador................................................................................................................................................................ 536
2.483.1 Evaluador...................................................................................................................................................... 536
2.483.2 (en) Evaluator.............................................................................................................................................. 537
2.484 Evento...................................................................................................................................................................... 537
2.484.1 Suceso........................................................................................................................................................... 537
2.484.1 suceso............................................................................................................................................................ 537
2.484.2 suceso de
seguridad de la información................................................................................................... 537
2.484.3 Evento........................................................................................................................................................... 537
2.484.4 (en) event...................................................................................................................................................... 537
2.484.1 (en) event...................................................................................................................................................... 538
2.484.2 (en) information security event................................................................................................................ 538
2.484.1 (en) event...................................................................................................................................................... 538
2.484.2 (en) Event..................................................................................................................................................... 538
2.484.3 (en) Event..................................................................................................................................................... 538
2.484.4 (en) Event type............................................................................................................................................. 538
2.484.5 (en) security event...................................................................................................................................... 538
2.484.6 (en) Event..................................................................................................................................................... 538
2.484.7 (en) Information security event................................................................................................................ 539
2.484.8 (en) Event..................................................................................................................................................... 539
2.484.9 (en) Security Relevant Event..................................................................................................................... 539
2.484.10 (en) black swan event................................................................................................................................. 539
2.484.11 (fr) Événement............................................................................................................................................. 539
2.484.12 (fr) Événement............................................................................................................................................. 539
2.484.13 (fr) événement lié à la
sécurité de l´information................................................................................... 540
2.485 Evidencia.................................................................................................................................................................. 540
2.485.1 evidencia....................................................................................................................................................... 540
2.485.2 Evidencia....................................................................................................................................................... 540
2.485.3 (en) evidence................................................................................................................................................ 540
2.485.4 (en) evidence................................................................................................................................................ 540
2.485.5 (en) CM evidence......................................................................................................................................... 540
2.485.6 (en) Evidence................................................................................................................................................ 540
2.486 Exploit...................................................................................................................................................................... 541
2.486.1 Exploit........................................................................................................................................................... 541
2.486.2 exploit........................................................................................................................................................... 541
2.486.3 (en) Exploit Kits............................................................................................................................................ 541
2.486.4 (en) exploit................................................................................................................................................... 541
2.486.5 (en) Exploit................................................................................................................................................... 541
2.486.6 (en) exploit................................................................................................................................................... 541
2.487 Exposición................................................................................................................................................................ 542
2.487.1 Exposición..................................................................................................................................................... 542
2.487.2 (en) exposure............................................................................................................................................... 542
2.487.3 (en) Exposure............................................................................................................................................... 542
2.488 Exposición anual
a un riesgo................................................................................................................................. 542
2.488.1 Exposición anual a un riesgo..................................................................................................................... 543
2.488.2 (en) Annualised loss expectancy............................................................................................................... 543
2.489 Extensible
Authentication Protocol.................................................................................................................... 543
2.489.1 Extensible Authentication Protocol.......................................................................................................... 543
2.489.2 (en) Extensible Authentication
Protocol (EAP)....................................................................................... 543
2.489.3 (en) Extensible Authentication Protocol................................................................................................. 543
2.489.4 (en) Extensible Authentication Protocol................................................................................................. 543
2.490 Extensiones de
Seguridad para el DNS (DNSSEC)................................................................................................ 543
2.490.1 Extensiones de
seguridad para el Sistema de Nombres de Dominio................................................. 544
2.490.2 (en) Domain Name System Security Extension (DNSEC)...................................................................... 544
2.490.3 Domain Name System Security Extensions (DNSSEC)........................................................................... 544
2.491 Externalización....................................................................................................................................................... 544
2.491.1 Contratar externamente............................................................................................................................ 544
2.491.2 (en) outsource.............................................................................................................................................. 545
2.491.3 (en) external information system (or component)................................................................................ 545
2.491.4 (en) external information system service............................................................................................... 545
2.491.5 (en) external network................................................................................................................................. 545
2.492 Extorsión en la
red................................................................................................................................................. 545
2.492.1 extorsión....................................................................................................................................................... 545
2.492.2 (en) extort..................................................................................................................................................... 545
2.492.3 (en) Cyberextortion..................................................................................................................................... 545
2.493 Failover.................................................................................................................................................................... 546
2.493.1 Failover......................................................................................................................................................... 546
2.493.2 (en) Failover................................................................................................................................................. 546
2.493.3 (en) failover.................................................................................................................................................. 546
2.493.4 (en) Failover................................................................................................................................................. 546
2.494 Falso negativo......................................................................................................................................................... 546
2.494.1 Falso negativo.............................................................................................................................................. 546
2.494.2 Falsa Aceptación......................................................................................................................................... 546
2.494.3 (en) false rejection...................................................................................................................................... 546
2.494.4 (en) False Rejection Rate (FRR)................................................................................................................. 547
2.494.5 (en) False Negative..................................................................................................................................... 547
2.494.6 (en) False Negative..................................................................................................................................... 547
2.495 Falso positivo.......................................................................................................................................................... 547
2.495.1 Falso positivo............................................................................................................................................... 547
2.495.2 Falso rechazo............................................................................................................................................... 547
2.495.3 (en) false acceptance.................................................................................................................................. 547
2.495.4 (en) False Acceptance Rate (FAR)............................................................................................................ 547
2.495.5 (en) False Positive....................................................................................................................................... 548
2.495.6 (en) False Positive....................................................................................................................................... 548
2.495.7 (en) False Positive....................................................................................................................................... 548
2.495.8 (en) False Rejects........................................................................................................................................ 548
2.496 FEAL - Fast Data
Encipherment Algorithm.......................................................................................................... 548
2.496.1 FEAL (Fast Data Encipherment Algorithm)............................................................................................. 548
2.496.2 (en) FEAL....................................................................................................................................................... 548
2.496.3 (en) FEAL (Fast Data Encipherment Algorithm)..................................................................................... 548
2.497 Fiabilidad.................................................................................................................................................................. 548
2.497.1 Fiabilidad...................................................................................................................................................... 548
2.497.2 fiabilidad....................................................................................................................................................... 549
2.497.3 (en) reliability............................................................................................................................................... 549
2.497.4 (en) reliability............................................................................................................................................... 549
2.497.5 (fr) Fiabilité................................................................................................................................................... 549
2.498 Ficheros ocultos
de contraseñas.......................................................................................................................... 549
2.498.1 Ficheros ocultos de contraseñas.............................................................................................................. 549
2.498.2 (en) Shadow Password Files...................................................................................................................... 549
2.499 Filtrado de
paquetes............................................................................................................................................... 549
2.499.1 Filtrado de entrada/salida......................................................................................................................... 550
2.499.2 (en) Packet filter.......................................................................................................................................... 550
2.500 Filtrado de
paquetes con estado........................................................................................................................... 550
2.500.1 Inspección completa................................................................................................................................... 550
2.500.2 stateful firewall........................................................................................................................................... 550
2.500.3 Filtrado de
paquetes con información de estado.................................................................................. 550
2.500.4 Filtrado de
paquetes sin información de estado................................................................................... 550
2.500.5 Filtrado de
paquetes con información de estado e inspección........................................................... 551
2.500.6 (en) Stateful Inspection:............................................................................................................................. 551
2.500.7 (en) Stateful packet filtering..................................................................................................................... 551
2.500.8 (en) Stateful inspection.............................................................................................................................. 551
2.500.9 (en) Stateful Inspection.............................................................................................................................. 551
2.500.10 (fr) Contrôle avec état................................................................................................................................ 551
2.501 Filtrado de
paquetes por ruta de origen.............................................................................................................. 552
2.501.1 Filtrado de paquetes por ruta de origen................................................................................................. 552
2.501.2 (en) RPF – Reverse Path Filtering............................................................................................................. 552
2.502 Filtro de entrada.................................................................................................................................................... 552
2.502.1 Filtrado de ingreso...................................................................................................................................... 552
2.502.2 Filtrado de Camino Inverso....................................................................................................................... 552
2.502.3 (en) ingress filtering.................................................................................................................................... 552
2.502.4 (en) Ingress Filtering................................................................................................................................... 552
2.502.5 (fr) Filtrage d’entrée................................................................................................................................... 553
2.503 Filtro de salida........................................................................................................................................................ 553
2.503.1 Filtrado de egreso....................................................................................................................................... 553
2.503.2 (en) Egress Filtering:................................................................................................................................... 553
2.503.3 (fr) Filtrage de sortie................................................................................................................................... 553
2.504 FIPS........................................................................................................................................................................... 553
2.504.1 FIPS................................................................................................................................................................ 553
2.504.2 (en) Federal Information Processing Standard (FIPS)........................................................................... 553
2.505 FIPS 140-2................................................................................................................................................................ 553
2.505.1 FIPS PUB 140-2............................................................................................................................................ 554
2.505.2 (en) FIPS PUB 140-2.................................................................................................................................... 554
2.505.3 (en) FIPS 140-2 Certification...................................................................................................................... 554
2.506 Firma ciega............................................................................................................................................................... 554
2.506.1 Firma ciega................................................................................................................................................... 554
2.506.2 Firma ciega................................................................................................................................................... 554
2.506.3 (en) Blind signature.................................................................................................................................... 555
2.507 Firma de un virus..................................................................................................................................................... 555
2.507.1 Firma de un virus......................................................................................................................................... 555
2.507.2 (en) Signature.............................................................................................................................................. 555
2.507.3 (fr) Signature (Virus)................................................................................................................................... 555
2.508 Firma digital............................................................................................................................................................ 555
2.508.1 Firma digital................................................................................................................................................. 556
2.508.2 Firma digital................................................................................................................................................. 556
2.508.3 Firma digital con apéndice........................................................................................................................ 556
2.508.4 Firma digital
con recuperación de mensaje........................................................................................... 556
2.508.5 Firma digital no negable............................................................................................................................ 556
2.508.6 firma digital.................................................................................................................................................. 556
2.508.7 (en) digital signature.................................................................................................................................. 556
2.508.8 (en) digital signature.................................................................................................................................. 556
2.508.9 (en) Digital signature.................................................................................................................................. 557
2.508.10 (en) digital signature.................................................................................................................................. 557
2.508.11 (en) Digital signature.................................................................................................................................. 557
2.508.12 (en) Digital signature.................................................................................................................................. 557
2.508.13 (en) Digital signature.................................................................................................................................. 557
2.508.14 (fr) signature numérique............................................................................................................................ 557
2.509 Firma electrónica.................................................................................................................................................... 557
2.509.1 firma electrónica......................................................................................................................................... 558
2.509.2 firma electrónica......................................................................................................................................... 558
2.509.3 (en) electronic signature............................................................................................................................ 558
2.509.4 (en) electronic signature............................................................................................................................ 558
2.509.5 (en) Electronic signature............................................................................................................................ 558
2.509.6 (fr) signature électronique......................................................................................................................... 558
2.509.7 (fr) Signature (électronique / numérique).............................................................................................. 558
2.510 Firma electrónica
avanzada.................................................................................................................................. 558
2.510.1 firma electrónica avanzada....................................................................................................................... 559
2.510.2 Firma electrónica avanzada...................................................................................................................... 559
2.510.3 (en) advanced electronic signature......................................................................................................... 559
2.510.4 (en) Advanced electronic signature......................................................................................................... 559
2.510.5 (fr) signature électronique avancée......................................................................................................... 560
2.511 firma electrónica
cualificada................................................................................................................................ 560
2.511.1 firma electrónica cualificada..................................................................................................................... 560
2.511.2 certifiado cualificado de firma electrónica............................................................................................. 560
2.511.3 (en) qualified electronic signature........................................................................................................... 560
2.511.4 (en) qualified certificate for electronic signature.................................................................................. 560
2.511.5 (fr) signature électronique qualifiée........................................................................................................ 561
2.511.6 (fr) certificat qualifié
de signature électronique.................................................................................... 561
2.512 Firma electrónica
reconocida............................................................................................................................... 561
2.512.1 firma electrónica reconocida.................................................................................................................... 561
2.513 Firmante................................................................................................................................................................... 561
2.513.1 firmante........................................................................................................................................................ 561
2.513.2 (en) Signatory.............................................................................................................................................. 561
2.514 FIRST - Forum of Incident
Response and Security Teams.................................................................................... 561
2.514.1 FIRST - Forum of Incident Response and Security Teams..................................................................... 562
2.514.2 (en) Forum of Incident Response and Security Teams (FIRST)............................................................ 562
2.515 FISMA - Federal Information
Security Management Act.................................................................................. 562
2.515.1 FISMA............................................................................................................................................................ 562
2.515.2 (en) FISMA.................................................................................................................................................... 562
2.516 Flaw.......................................................................................................................................................................... 562
2.516.1 flaw................................................................................................................................................................ 562
2.516.2 (en) flaw........................................................................................................................................................ 562
2.516.3 (en) flaw (design)........................................................................................................................................ 563
2.516.4 (en) flaws...................................................................................................................................................... 563
2.517 Formal..................................................................................................................................................................... 563
2.517.1 formal............................................................................................................................................................ 563
2.517.2 (en) formal.................................................................................................................................................... 563
2.518 Fortaleza
criptográfica......................................................................................................................................... 563
2.518.1 Fortaleza criptográfica............................................................................................................................... 563
2.518.2 (en) Security strength................................................................................................................................. 563
2.519 Fortificar................................................................................................................................................................. 564
2.520 Frase de acceso........................................................................................................................................................ 564
2.520.1 Frase de acceso........................................................................................................................................... 564
2.520.2 (en) Passphrase........................................................................................................................................... 564
2.521 Fraude de
identidad................................................................................................................................................ 564
2.521.1 Fraude de identidad.................................................................................................................................... 564
2.521.2 (en) Identity Fraud...................................................................................................................................... 564
2.521.3 (en) Identity Fraud/Theft........................................................................................................................... 565
2.522 Fuga, pérdida........................................................................................................................................................... 565
2.522.1 memoria perdida......................................................................................................................................... 565
2.522.2 (en) Memory Leak....................................................................................................................................... 565
2.523 Función de
verificación criptográfica.................................................................................................................. 565
2.523.1 Función de verificación criptográfica...................................................................................................... 565
2.523.2 valor de comprobación criptográfico...................................................................................................... 565
2.523.3 (en) cryptographic check-value................................................................................................................ 565
2.523.4 (fr) valeur de contrôle cryptographique.................................................................................................. 566
2.524 Función
irreversible................................................................................................................................................ 566
2.524.1 función unidireccional................................................................................................................................ 566
2.524.2 Función irreversible..................................................................................................................................... 566
2.524.3 Función irreversible con trampa (Trapdoor one-way function).......................................................... 566
2.524.4 Función de un solo sentido........................................................................................................................ 567
2.524.5 Función de un
solo sentido con trampa.................................................................................................. 567
2.524.6 función unidireccional................................................................................................................................ 567
2.524.7 (en) one-way function................................................................................................................................ 567
2.524.8 (en) One-way function................................................................................................................................ 567
2.524.9 (en) One-way function................................................................................................................................ 567
2.524.10 (en) One-way function................................................................................................................................ 567
2.524.11 (fr) fonction non réversible........................................................................................................................ 567
2.524.12 (fr) fonction unidirectionnelle................................................................................................................... 567
2.525 Función resumen..................................................................................................................................................... 568
2.525.1 Función hash o
Función resumen (digest).............................................................................................. 568
2.525.2 Función de hashing criptográfico............................................................................................................. 568
2.525.3 función de troceo........................................................................................................................................ 568
2.525.4 Función resumen......................................................................................................................................... 568
2.525.5 Función hash o
Función resumen (digest).............................................................................................. 569
2.525.6 función de cálculo de clave........................................................................................................................ 569
2.525.7 función de
cálculo de clave unidireccional............................................................................................. 569
2.525.8 (en) hash function....................................................................................................................................... 569
2.525.9 (en) Hash function....................................................................................................................................... 569
2.525.10 (en) Hash function....................................................................................................................................... 569
2.525.11 (en) Hash-function...................................................................................................................................... 569
2.525.12 (en) Hash function....................................................................................................................................... 570
2.525.13 (en) One-way hash function...................................................................................................................... 570
2.525.14 (en) Hashing:................................................................................................................................................ 570
2.525.15 (fr) fonction de hachage............................................................................................................................ 570
2.525.16 (fr) fonction de hachage............................................................................................................................ 570
2.525.17 (fr) fonction de hachage unidirectionnelle............................................................................................. 570
2.525.18 (fr) Hachage................................................................................................................................................. 571
2.525.19 (fr) Hachage................................................................................................................................................. 571
2.525.20 (fr) Fonction de hachage............................................................................................................................ 571
2.526 functional_requirement....................................................................................................................................... 571
2.526.1 (en) Security functional requirement....................................................................................................... 571
2.526.2 (fr) Exigence fonctionnelle de sécurité.................................................................................................... 572
2.527 Garantía.................................................................................................................................................................. 572
2.527.1 garantía........................................................................................................................................................ 572
2.527.2 Requerimiento de aseguramiento........................................................................................................... 572
2.527.3 Certeza.......................................................................................................................................................... 572
2.527.4 Certeza.......................................................................................................................................................... 572
2.527.5 (en) Guarantee............................................................................................................................................ 572
2.527.1 (en) Assurance............................................................................................................................................. 572
2.527.2 (en) assurance............................................................................................................................................. 573
2.527.3 (en) assurance Argument.......................................................................................................................... 573
2.527.4 (en) assurance claim................................................................................................................................... 573
2.527.5 (en) assurance Evidence............................................................................................................................. 573
2.527.6 (en) security assurance.............................................................................................................................. 573
2.527.7 (en) Assurance............................................................................................................................................. 573
2.527.8 (en) Security assurance requirement....................................................................................................... 573
2.527.9 (en) assurance............................................................................................................................................. 574
2.527.10 (en) Assurance approach........................................................................................................................... 574
2.527.11 (en) Assurance assessment....................................................................................................................... 574
2.527.12 (en) assurance............................................................................................................................................. 574
2.527.13 (en) Assurance............................................................................................................................................. 574
2.527.14 (fr) Exigence d'assurance de sécurité...................................................................................................... 574
2.528 Garantía de la
información................................................................................................................................... 574
2.528.1 Garantía de la información....................................................................................................................... 574
2.528.2 (en) information assurance (IA)................................................................................................................ 575
2.529 GCM - Galois /
Counter Mode.............................................................................................................................. 575
2.529.1 GCM - Galois / Counter Mode................................................................................................................... 575
2.529.2 (en) GCM - Galois / Counter Mode.......................................................................................................... 575
2.530 Generación de
claves.............................................................................................................................................. 575
2.530.1 Generador de claves................................................................................................................................... 575
2.530.2 Generador de claves................................................................................................................................... 575
2.530.3 (en) key generation..................................................................................................................................... 575
2.530.4 (en) key generator...................................................................................................................................... 576
2.530.5 (en) key generation algorithm.................................................................................................................. 576
2.531 Generador de
números aleatorios....................................................................................................................... 576
2.531.1 Generador aleatorio................................................................................................................................... 576
2.531.2 (en) Random Number Generator (RNG).................................................................................................. 576
2.531.3 (en) randomizer........................................................................................................................................... 576
2.531.4 (en) Random number generator (RNG)................................................................................................... 576
2.531.5 (en) random bit generator
(RBG)............................................................................................................. 576
2.531.6 (en) Random number generator.............................................................................................................. 577
2.532 Generador de
números seudo-aleatorio.............................................................................................................. 577
2.532.1 Generador de números seudoaleatorios................................................................................................ 577
2.532.2 (en) Pseudo Random Number Generator (PRNG)................................................................................. 577
2.532.3 (en) Deterministic random bit generator (DRBG).................................................................................. 577
2.532.4 (en) Pseudo random number generator................................................................................................. 577
2.533 Gestión de
cambios.................................................................................................................................................. 577
2.533.1 Change Management................................................................................................................................. 578
2.533.2 Gestión de cambios..................................................................................................................................... 578
2.533.3 (en) Change Management........................................................................................................................ 578
2.533.4 (en) change management......................................................................................................................... 578
2.533.5 (fr) Gestion des Changements.................................................................................................................. 578
2.534 Gestión de claves..................................................................................................................................................... 578
2.534.1 Administración de claves criptográficas................................................................................................. 578
2.534.2 Gestión de claves........................................................................................................................................ 579
2.534.3 Gestión de claves........................................................................................................................................ 579
2.534.4 Sistema
nacional de Gestión de Claves................................................................................................... 579
2.534.5 gestión de claves......................................................................................................................................... 579
2.534.1 (en) key management................................................................................................................................ 579
2.534.2 (en) key management device.................................................................................................................... 579
2.534.3 (en) key management infrastructure (KMI)........................................................................................... 579
2.534.4 (en) key management................................................................................................................................ 579
2.534.5 (en) Key management................................................................................................................................ 580
2.534.6 (en) Key management archive.................................................................................................................. 580
2.534.7 (en) Key Management Policy.................................................................................................................... 580
2.534.8 (en) Key Management Practices Statement........................................................................................... 580
2.534.9 (en) key management................................................................................................................................ 580
2.534.10 (en) Key management................................................................................................................................ 580
2.534.11 (en) Key management................................................................................................................................ 580
2.534.12 (en) Key Management:.............................................................................................................................. 580
2.534.13 (fr) Gestion de clé cryptographique......................................................................................................... 581
2.534.14 (fr) gestion de clés....................................................................................................................................... 581
2.535 Gestión de crisis...................................................................................................................................................... 581
2.535.1 Gestión de Crisis.......................................................................................................................................... 581
2.535.2 (en) Crisis Management............................................................................................................................. 581
2.535.3 (en) Crisis Management............................................................................................................................. 581
2.535.4 (en) Crisis Management Test / Exercise.................................................................................................. 581
2.535.5 (fr) Gestion de Crises.................................................................................................................................. 582
2.536 Gestión de
derechos de acceso............................................................................................................................... 582
2.536.1 Gestión del Acceso...................................................................................................................................... 582
2.536.2 (en) Access Management.......................................................................................................................... 582
2.536.3 (fr) Gestion des Accès................................................................................................................................. 582
2.537 Gestión de
dispositivos móviles............................................................................................................................. 582
2.537.1 Gestión de dispositivos móviles................................................................................................................ 583
2.537.2 (en) Mobile device
management (MDM)............................................................................................... 583
2.537.3 (en) Mobile device management
(MDM) services................................................................................ 583
2.537.4 (en) mobile device
managenemt (MDM)................................................................................................ 583
2.538 Gestión de
eventos de seguridad........................................................................................................................... 584
2.538.1 SIEM............................................................................................................................................................... 584
2.538.2 SIM................................................................................................................................................................. 584
2.538.3 Gestión de
eventos de seguridad............................................................................................................. 584
2.538.4 (en) Security Event Management............................................................................................................. 584
2.538.5 (en) Security event management............................................................................................................. 584
2.538.6 (en) Security Information and Event Management (SIEM).................................................................. 584
2.538.7 (en) security information management (SIM)....................................................................................... 585
2.539 Gestión de
incidentes.............................................................................................................................................. 585
2.539.1 gestión de los
incidentes de seguridad de la información................................................................... 585
2.539.2 Gestión de incidentes................................................................................................................................. 585
2.539.3 Gestión de Incidencias................................................................................................................................ 585
2.539.4 (en) information security incident management................................................................................... 585
2.539.5 (en) incident response plan....................................................................................................................... 585
2.539.6 (en) Incident Management........................................................................................................................ 586
2.539.7 (en) incident management plan............................................................................................................... 586
2.539.8 (en) information security incident management................................................................................... 586
2.539.9 (en) incident response plan....................................................................................................................... 586
2.539.10 (en) Incident handling................................................................................................................................ 586
2.539.11 (en) Incident response................................................................................................................................ 586
2.539.12 (en) Incident response cycle...................................................................................................................... 586
2.539.13 (fr) Gestion des Incidents........................................................................................................................... 586
2.540 Gestión de la
configuración.................................................................................................................................. 587
2.540.1 Gestión de la Configuración...................................................................................................................... 587
2.540.2 (en) Configuration Management............................................................................................................. 587
2.540.3 (fr) Gestion des Configurations................................................................................................................. 587
2.541 Gestión de la
Continuidad del Negocio (BCM).................................................................................................... 587
2.541.1 Gestión de la
Continuidad del Negocio (BCM)....................................................................................... 587
2.541.2 Gestión de la
Continuidad del Negocio (BCM)....................................................................................... 587
2.541.3 (en) Business Continuity Management (BCM)....................................................................................... 588
2.541.4 (en) business continuity management.................................................................................................... 588
2.541.5 (en) business continuity management.................................................................................................... 588
2.541.6 (fr) Gestion de la
Continuité du Business (BCM).................................................................................... 588
2.542 Gestión de la
seguridad de la información.......................................................................................................... 588
2.542.1 Gestión de la
Seguridad de Información................................................................................................. 588
2.542.2 gestión.......................................................................................................................................................... 589
2.542.3 seguridad administrativa y organizativa................................................................................................ 589
2.542.4 (en) Information Security Management (ISM)....................................................................................... 589
2.542.5 (fr) Gestion de la
Sécurité de l’Information (ISM)................................................................................. 589
2.543 Gestión de
riesgos................................................................................................................................................... 589
2.543.1 gestión del riesgo........................................................................................................................................ 589
2.543.2 gestión del riesgo........................................................................................................................................ 589
2.543.3 marco de
trabajo de la gestión del riesgo.............................................................................................. 590
2.543.4 proceso de gestión del riesgo................................................................................................................... 590
2.543.5 Gestión de riesgos....................................................................................................................................... 590
2.543.6 Gestión de Riesgo........................................................................................................................................ 590
2.543.7 (en) Risk Management............................................................................................................................... 590
2.543.8 (en) risk management................................................................................................................................ 590
2.543.9 (en) risk management................................................................................................................................ 590
2.543.10 (en) risk management framework........................................................................................................... 590
2.543.11 (en) risk management process................................................................................................................. 590
2.543.1 (en) RISK CONTROL..................................................................................................................................... 591
2.543.2 (en) Enterprise risk management............................................................................................................. 591
2.543.3 (en) Risk management............................................................................................................................... 591
2.543.4 (en) Risk Management............................................................................................................................... 591
2.543.1 (en) Risk management............................................................................................................................... 591
2.543.2 (en) risk management framework (RMF)............................................................................................... 591
2.543.3 (en) RISK MANAGEMENT........................................................................................................................... 592
2.543.4 (en) RISK MANAGEMENT ALTERNATIVES DEVELOPMENT:................................................................. 592
2.543.5 (en) risk management................................................................................................................................ 592
2.543.6 (en) Risk Management............................................................................................................................... 592
2.543.7 (en) Risk Management............................................................................................................................... 592
2.543.8 (en) risk management................................................................................................................................ 593
2.543.9 (en) Risk management............................................................................................................................... 593
2.543.10 (en) Risk management............................................................................................................................... 593
2.543.11 Risk Management....................................................................................................................................... 593
2.543.12 (fr) management du risque....................................................................................................................... 593
2.543.13 (fr) cadre
organisationnel de management du risque......................................................................... 593
2.543.14 (fr) processus de
management du risque............................................................................................... 593
2.543.15 (fr) Gestion des risques.............................................................................................................................. 593
2.544 Gestión de
vulnerabilidades................................................................................................................................... 594
2.544.1 Gestión de vulnerabilidades...................................................................................................................... 594
2.544.2 (en) vulnerability management................................................................................................................ 594
2.545 Gestión del
riesgo empresarial.............................................................................................................................. 594
2.545.1 Gestión del riesgo empresarial................................................................................................................. 595
2.545.2 (en) enterprise risk management............................................................................................................. 595
2.545.3 (en) Enterprise risk management (ERM)................................................................................................. 595
2.545.4 enterprise..................................................................................................................................................... 595
2.545.5 Enterprise Architecture (EA)...................................................................................................................... 595
2.545.6 enterprise service
[CNSSI_4009:2010].................................................................................................... 595
2.546 Gestión unificada
de amenazas.............................................................................................................................. 595
2.546.1 Gestión unificada de amenazas................................................................................................................ 596
2.546.2 (en) UTM – Unified Threat Management............................................................................................... 596
2.547 Gobernanza............................................................................................................................................................. 597
2.547.1 Gobierno....................................................................................................................................................... 597
2.547.2 (en) IT governance...................................................................................................................................... 597
2.547.3 (en) Governance.......................................................................................................................................... 597
2.547.4 (fr) Gouvernance......................................................................................................................................... 597
2.548 Gobierno, gestión
de riesgos y cumplimiento...................................................................................................... 597
2.548.1 Gobierno,
gestión de riesgos y cumplimiento........................................................................................ 597
2.548.2 (en) Governance, Risk Management and Compliance (GRC).............................................................. 597
2.549 GOST........................................................................................................................................................................ 597
2.549.1 GOST.............................................................................................................................................................. 598
2.549.2 GOST.............................................................................................................................................................. 598
2.549.3 (en) GOST...................................................................................................................................................... 598
2.550 GPG - GNU Privacy
Guard..................................................................................................................................... 598
2.550.1 GPG................................................................................................................................................................ 598
2.550.2 (en) GNU Privacy Guard............................................................................................................................. 599
2.550.3 (fr) GNU Privacy Guard.............................................................................................................................. 599
2.551 Guardia.................................................................................................................................................................... 599
2.551.1 Guardia......................................................................................................................................................... 599
2.551.2 (en) guard..................................................................................................................................................... 599
2.552 Guerra de
información.......................................................................................................................................... 599
2.552.1 Guerra de información............................................................................................................................... 599
2.552.2 (en) Electronic Warfare:............................................................................................................................. 600
2.552.3 (en) Cyberwarfare....................................................................................................................................... 600
2.552.4 (en) Information Warfare.......................................................................................................................... 600
2.553 Guía de seguridad.................................................................................................................................................... 600
2.553.1 guía................................................................................................................................................................ 600
2.553.2 Directriz......................................................................................................................................................... 600
2.553.3 (en) guidelines............................................................................................................................................. 600
2.553.4 (en) Security guideline................................................................................................................................ 600
2.553.5 (en) Information Security Guidelines....................................................................................................... 601
2.554 Gusano
informático............................................................................................................................................... 601
2.554.1 Gusano.......................................................................................................................................................... 601
2.554.2 Gusano informático.................................................................................................................................... 601
2.554.3 Gusano.......................................................................................................................................................... 601
2.554.4 (en) Worm.................................................................................................................................................... 601
2.554.5 (en) worm..................................................................................................................................................... 601
2.554.6 (en) worm..................................................................................................................................................... 602
2.554.7 (en) Worm.................................................................................................................................................... 602
2.554.8 (en) Worm.................................................................................................................................................... 602
2.554.9 (en) Worm.................................................................................................................................................... 602
2.554.10 (en) Worm.................................................................................................................................................... 602
2.554.11 (en) Worms................................................................................................................................................... 602
2.554.12 (fr) Ver........................................................................................................................................................... 602
2.555 Habilitación............................................................................................................................................................. 602
2.555.1 Habilitación.................................................................................................................................................. 603
2.555.2 Habilitación.................................................................................................................................................. 603
2.555.1 (en) Clearance.............................................................................................................................................. 603
2.555.2 (en) security clearance............................................................................................................................... 603
2.555.3 (en) Clearance.............................................................................................................................................. 603
2.555.4 (en) Personnel (Security) Clearance (PCL)............................................................................................... 603
2.555.5 (en) Security Clearance.............................................................................................................................. 604
2.556 Hacker...................................................................................................................................................................... 604
2.556.1 Hacker........................................................................................................................................................... 604
2.556.2 Hacker........................................................................................................................................................... 604
2.556.3 Hacker / Hacking......................................................................................................................................... 604
2.556.4 (en) Hacker:.................................................................................................................................................. 604
2.556.1 (en) hacker................................................................................................................................................... 604
2.556.2 (en) hacker................................................................................................................................................... 604
2.556.3 (en) Hacker................................................................................................................................................... 605
2.556.4 (en) Hacker................................................................................................................................................... 605
2.556.5 (fr) White Hat (Hacker) / Chapeau blanc................................................................................................ 605
2.557 Hacking.................................................................................................................................................................... 605
2.557.1 hacking.......................................................................................................................................................... 605
2.557.2 (en) Hacking................................................................................................................................................. 605
2.558 hacktivismo.............................................................................................................................................................. 605
2.558.1 (en) Hacktivist:............................................................................................................................................. 605
2.558.2 (en) Hacktivist.............................................................................................................................................. 606
2.558.3 (en) hactivism.............................................................................................................................................. 606
2.558.4 (en) hacktivism............................................................................................................................................ 606
2.558.5 (en) Hacktivism............................................................................................................................................ 606
2.559 Halones.................................................................................................................................................................... 606
2.559.1 Halones......................................................................................................................................................... 606
2.559.2 (en) Halon..................................................................................................................................................... 606
2.560 Handshaking............................................................................................................................................................ 607
2.560.1 Handshaking................................................................................................................................................ 607
2.560.2 (en) handshaking procedures................................................................................................................... 607
2.561 Hash.......................................................................................................................................................................... 607
2.562 Hash code................................................................................................................................................................. 607
2.562.1 Hash code..................................................................................................................................................... 607
2.562.2 (en) Hash-code............................................................................................................................................. 607
2.563 Heartbleed............................................................................................................................................................... 608
2.563.1 HeartBleed................................................................................................................................................... 608
2.563.2 (en) Heartbleed........................................................................................................................................... 608
2.564 HIPAA - Health Insurance
Portability & Accountability Act............................................................................. 608
2.564.1 HIPAA - Health Insurance Portability & Accountability Act................................................................. 608
2.564.2 (en) HIPAA.................................................................................................................................................... 608
2.564.3 (en) HIPAA.................................................................................................................................................... 608
2.564.4 (en) HIPAA.................................................................................................................................................... 609
2.565 HMAC - Hash-based Message
Authentication Code............................................................................................ 609
2.565.1 HMAC - Hash-based Message Authentication Code............................................................................. 609
2.565.2 (en) Hash-Based Message Authentication Code (HMAC).................................................................... 609
2.565.3 (en) HMAC.................................................................................................................................................... 609
2.565.4 (en) HMAC - Hash-based Message Authentication Code..................................................................... 609
2.566 Holocríptico............................................................................................................................................................ 610
2.566.1 Holocríptico.................................................................................................................................................. 610
2.566.2 (en) Holocriptic............................................................................................................................................ 610
2.567 Hot standby............................................................................................................................................................. 610
2.567.1 Recuperación Rápida.................................................................................................................................. 610
2.567.2 Recuperación Inmediata............................................................................................................................ 610
2.567.3 (en) Hot Standby......................................................................................................................................... 610
2.567.4 (en) Fast Recovery....................................................................................................................................... 610
2.567.5 (en) Immediate Recovery........................................................................................................................... 611
2.567.6 (fr) Reprise rapide....................................................................................................................................... 611
2.567.7 (fr) Reprise immédiate............................................................................................................................... 611
2.568 HTTP seguro............................................................................................................................................................ 611
2.568.1 HTTPS............................................................................................................................................................ 611
2.568.2 HTTP seguro................................................................................................................................................. 611
2.568.1 (en) HTTPS.................................................................................................................................................... 611
2.568.2 (en) https...................................................................................................................................................... 612
2.568.3 (fr) HTTPS...................................................................................................................................................... 612
2.568.4 (fr) HTTPS - Secure HyperText Transfer Protocol................................................................................... 612
2.569 Huella digital.......................................................................................................................................................... 612
2.569.1 Huella digital................................................................................................................................................ 612
2.569.2 huella dactilar digital................................................................................................................................. 612
2.569.3 (en) Digital fingerprint............................................................................................................................... 613
2.569.4 (fr) empreinte numérique.......................................................................................................................... 613
2.570 Huella digital.......................................................................................................................................................... 613
2.570.1 fingerprinting............................................................................................................................................... 613
2.570.2 (en) Fingerprinting...................................................................................................................................... 613
2.571 ia............................................................................................................................................................................... 613
2.572 IDEA -
International Data Encryption Algorithm.............................................................................................. 613
2.572.1 IDEA - International Data Encryption Algorithm................................................................................... 614
2.572.2 IDEA............................................................................................................................................................... 614
2.572.3 IDEA............................................................................................................................................................... 614
2.572.4 (en) International Data Encryption Algorithm (IDEA)........................................................................... 614
2.572.5 (en) IDEA....................................................................................................................................................... 614
2.573 Identidad.................................................................................................................................................................. 614
2.573.1 identidad....................................................................................................................................................... 615
2.573.2 Identidad...................................................................................................................................................... 615
2.573.3 (en) Identity.................................................................................................................................................. 615
2.573.4 Identity Proofing.......................................................................................................................................... 615
2.573.5 (en) identity.................................................................................................................................................. 615
2.573.6 (en) identity registration............................................................................................................................ 615
2.573.7 (en) identity.................................................................................................................................................. 615
2.573.8 (en) Identity.................................................................................................................................................. 615
2.573.9 (en) Identity.................................................................................................................................................. 615
2.573.10 (en) identity.................................................................................................................................................. 616
2.573.11 (en) identity.................................................................................................................................................. 616
2.573.12 (en) Authenticated Identity....................................................................................................................... 616
2.573.13 (en) Identity.................................................................................................................................................. 616
2.573.14 (en) Identity.................................................................................................................................................. 616
2.573.15 (en) Identity management......................................................................................................................... 616
2.573.16 (fr) Identité................................................................................................................................................... 616
2.573.17 (fr) Identité................................................................................................................................................... 616
2.573.18 (fr) Gestion de l'identité............................................................................................................................. 616
2.574 Identidad
federada.................................................................................................................................................. 617
2.574.1 identidad federada).................................................................................................................................... 617
2.574.2 (en) Federated identity management (FIM)........................................................................................... 617
2.575 Identificación.......................................................................................................................................................... 617
2.575.1 Identificación............................................................................................................................................... 617
2.575.2 identificación electrónica........................................................................................................................... 617
2.575.3 medios de identificación electrónica....................................................................................................... 618
2.575.4 datos de
identificación de la persona...................................................................................................... 618
2.575.5 sistema de identificación electrónica...................................................................................................... 618
2.575.6 (en) electronic identification..................................................................................................................... 618
2.575.7 (en) electronic identification means........................................................................................................ 618
2.575.8 (en) 'person identification data'............................................................................................................... 618
2.575.9 (en) electronic identification scheme...................................................................................................... 618
2.575.10 (en) identification........................................................................................................................................ 618
2.575.11 (en) identification........................................................................................................................................ 618
2.575.12 (fr) identification électronique.................................................................................................................. 619
2.575.13 (fr) moyen d'identification électronique................................................................................................. 619
2.575.14 (fr) données d'identification personnelle................................................................................................ 619
2.575.15 (fr) schéma d'identification électronique................................................................................................ 619
2.576 Identificación de
los riesgos.................................................................................................................................. 619
2.576.1 identificación de los riesgos...................................................................................................................... 619
2.576.2 Identificación del riesgo............................................................................................................................. 619
2.576.3 identificación del riesgo:............................................................................................................................ 619
2.576.4 (en) risk identification................................................................................................................................ 620
2.576.5 (en) risk identification................................................................................................................................ 620
2.576.6 (en) RISK IDENTIFICATION......................................................................................................................... 620
2.576.7 (fr) identification des risques.................................................................................................................... 620
2.577 Identificador........................................................................................................................................................... 620
2.577.1 Identificador................................................................................................................................................. 620
2.577.2 (en) identifier............................................................................................................................................... 620
2.578 IEEE 802.11i............................................................................................................................................................. 621
2.578.1 IEEE 802.11i.................................................................................................................................................. 621
2.578.2 (en) IEEE 802.11i.......................................................................................................................................... 621
2.579 IEEE P1363 - Standard for
Public-Key Cryptography......................................................................................... 621
2.579.1 IEEE P1363 - Standard for Public-Key Cryptography............................................................................. 621
2.579.2 (en) IEEE P1363............................................................................................................................................ 621
2.580 IKE - Internet Key
Exchange................................................................................................................................... 622
2.580.1 IKE - Internet Key Exchange....................................................................................................................... 622
2.580.2 (en) IKE (Internet Key Exchange).............................................................................................................. 622
2.581 Impacto.................................................................................................................................................................... 622
2.581.1 impacto......................................................................................................................................................... 622
2.581.2 Impacto......................................................................................................................................................... 622
2.581.3 Impacto......................................................................................................................................................... 622
2.581.4 Impacto residual.......................................................................................................................................... 622
2.581.5 Impacto......................................................................................................................................................... 623
2.581.6 (en) impact level.......................................................................................................................................... 623
2.581.7 (en) potential impact.................................................................................................................................. 623
2.581.8 (en) Impact................................................................................................................................................... 623
2.581.9 (en) Potential Impact.................................................................................................................................. 623
2.581.10 (en) impact................................................................................................................................................... 623
2.581.11 (en) Impact................................................................................................................................................... 623
2.581.12 (en) Impact................................................................................................................................................... 623
2.581.13 (en) Impact................................................................................................................................................... 623
2.581.14 (en) Impact................................................................................................................................................... 623
2.581.15 (en) Impact................................................................................................................................................... 624
2.581.16 (en) impact................................................................................................................................................... 624
2.581.17 (fr) Impact..................................................................................................................................................... 624
2.581.18 (fr) Impact..................................................................................................................................................... 624
2.581.19 (fr) Impact..................................................................................................................................................... 624
2.582 Impostura................................................................................................................................................................ 624
2.582.1 Impostura..................................................................................................................................................... 624
2.582.2 Decepción imitativa o suplantación......................................................................................................... 625
2.582.3 usurpación de
identidad (o impostura)................................................................................................... 625
2.582.4 (en) masquerading...................................................................................................................................... 625
2.582.5 (en) masquerade......................................................................................................................................... 625
2.582.6 (en) Masquerade Attack............................................................................................................................ 625
2.582.7 (en) Masquerade......................................................................................................................................... 625
2.582.8 (fr) usurpation d'identité........................................................................................................................... 625
2.582.9 (fr) Masquerade.......................................................................................................................................... 625
2.583 Imputabilidad........................................................................................................................................................... 626
2.584 Incidente.................................................................................................................................................................. 626
2.584.1 incidente....................................................................................................................................................... 626
2.584.2 Incidente....................................................................................................................................................... 626
2.584.3 Incidente....................................................................................................................................................... 626
2.584.4 Incidencia...................................................................................................................................................... 626
2.584.5 (en) incident................................................................................................................................................. 626
2.584.1 (en) incident................................................................................................................................................. 626
2.584.2 (en) INCIDENT.............................................................................................................................................. 627
2.584.3 (en) Incident................................................................................................................................................. 627
2.584.4 (en) Incident................................................................................................................................................. 627
2.584.5 (en) Incident................................................................................................................................................. 627
2.584.6 (en) incident................................................................................................................................................. 627
2.584.7 (en) Incident................................................................................................................................................. 627
2.584.8 (en) Incident................................................................................................................................................. 627
2.584.9 (fr) Incident................................................................................................................................................... 628
2.585 Incidente de
seguridad............................................................................................................................................ 628
2.585.1 Incidente de
seguridad de la información.............................................................................................. 628
2.585.2 Incidente de seguridad............................................................................................................................... 628
2.585.1 (en) information security incident............................................................................................................ 628
2.585.1 (en) incident................................................................................................................................................. 628
2.585.2 (en) security incident.................................................................................................................................. 628
2.585.1 (en) Information security incident............................................................................................................ 628
2.585.2 (en) Information Security Incident........................................................................................................... 629
2.585.1 (en) IT Security Incident (Incident)........................................................................................................... 629
2.585.1 (en) Security incident.................................................................................................................................. 629
2.585.1 (fr) incident lié à la
sécurité de l'information......................................................................................... 629
2.585.2 (fr) Incident de sécurité.............................................................................................................................. 629
2.586 Indicador................................................................................................................................................................. 629
2.586.1 indicar........................................................................................................................................................... 629
2.586.2 indicador....................................................................................................................................................... 630
2.586.3 Indicador....................................................................................................................................................... 630
2.586.4 Indicador....................................................................................................................................................... 630
2.586.5 (en) indicator............................................................................................................................................... 630
2.586.6 (en) Indicator............................................................................................................................................... 630
2.586.7 (en) Indicator............................................................................................................................................... 630
2.586.8 (en) information security indicator.......................................................................................................... 631
2.587 Indicador clave
de riesgo....................................................................................................................................... 631
2.587.1 indicador de riesgos clave......................................................................................................................... 631
2.587.2 (en) Key risk indicator (KRI)....................................................................................................................... 631
2.587.3 (en) Key Risk Indicators.............................................................................................................................. 631
2.587.4 (en) key risk indicator (KRI)....................................................................................................................... 632
2.587.5 Key Risk Indicator........................................................................................................................................ 632
2.588 Indicador de
compromiso....................................................................................................................................... 632
2.588.1 Indicador de compromiso.......................................................................................................................... 632
2.588.2 (en) IOC - Indicator of Compromise......................................................................................................... 632
2.589 Industria de
Tarjetas de Pago - Norma de seguridad de datos.......................................................................... 633
2.590 Infalsificable............................................................................................................................................................ 633
2.590.1 Infalsificable................................................................................................................................................. 633
2.590.2 (en) unforgeable.......................................................................................................................................... 633
2.591 Información............................................................................................................................................................ 633
2.591.1 Información.................................................................................................................................................. 633
2.591.2 Información.................................................................................................................................................. 633
2.591.3 Información.................................................................................................................................................. 633
2.591.4 información.................................................................................................................................................. 633
2.591.5 (en) information.......................................................................................................................................... 634
2.591.6 (en) information.......................................................................................................................................... 634
2.591.7 (en) Information.......................................................................................................................................... 634
2.591.8 (en) Information.......................................................................................................................................... 634
2.591.9 (en) Information.......................................................................................................................................... 634
2.591.10 (en) information type................................................................................................................................. 634
2.591.11 (en) Information Type................................................................................................................................ 634
2.591.12 (en) Information.......................................................................................................................................... 634
2.591.13 (en) Data / Information.............................................................................................................................. 634
2.592 Información
clasificada......................................................................................................................................... 635
2.592.1 Información Clasificada............................................................................................................................. 635
2.592.2 Información clasificada.............................................................................................................................. 635
2.592.3 Información sensible o clasificada........................................................................................................... 635
2.592.1 (en) Classified information........................................................................................................................ 635
2.592.2 (en) classified national security information.......................................................................................... 635
2.592.3 (en) classified............................................................................................................................................... 636
2.592.4 (en) Classified Information........................................................................................................................ 636
2.592.5 (en) Classified Information........................................................................................................................ 636
2.592.6 (en) Classification Guide............................................................................................................................ 636
2.593 Información de
autenticación............................................................................................................................... 636
2.593.1 Información de autenticación................................................................................................................... 636
2.593.2 información de autenticación................................................................................................................... 636
2.593.3 (en) authentication information............................................................................................................... 636
2.593.4 (en) Authentication data........................................................................................................................... 637
2.593.5 (en) Authentication information.............................................................................................................. 637
2.593.6 (fr) information d’authentification.......................................................................................................... 637
2.594 Información
sensible.............................................................................................................................................. 637
2.594.1 Información sensible.................................................................................................................................. 637
2.594.2 (en) sensitive information.......................................................................................................................... 637
2.594.3 (en) sensitive information.......................................................................................................................... 637
2.594.4 (en) Sensitive information......................................................................................................................... 638
2.595 Informal.................................................................................................................................................................. 638
2.595.1 Informal........................................................................................................................................................ 638
2.595.2 (en) informal................................................................................................................................................ 638
2.596 Informativo............................................................................................................................................................. 638
2.596.1 Anexos informativos................................................................................................................................... 638
2.596.2 (en) informative........................................................................................................................................... 638
2.597 Infraestructura
de clave pública.......................................................................................................................... 638
2.597.1 infraestructura de claves públicas........................................................................................................... 639
2.597.2 (en) public key infrastructure (PKI).......................................................................................................... 639
2.597.3 (en) public-key
infrastructure (PKI).......................................................................................................... 639
2.597.4 (en) Public Key
Infrastructure (PKI).......................................................................................................... 639
2.597.5 (en) Public Key
Infrastructure (PKI).......................................................................................................... 639
2.597.6 (en) Public Key Infrastructure................................................................................................................... 639
2.597.7 (en) Public key infrastructure.................................................................................................................... 639
2.597.8 (fr) infrastructure de clé publique............................................................................................................ 640
2.597.9 (fr) Infrastructure de
gestion de clés....................................................................................................... 640
2.598 Infraestructuras
críticas....................................................................................................................................... 640
2.598.1 infraestructuras críticas............................................................................................................................. 640
2.598.2 infraestructuras estratégicas.................................................................................................................... 640
2.598.3 servicio esencial........................................................................................................................................... 640
2.598.4 infraestructuras críticas............................................................................................................................. 641
2.598.5 (en) Critical Infrastructure......................................................................................................................... 641
2.598.6 (en) Critical Infrastructure:........................................................................................................................ 641
2.598.7 (en) Critical Infrastructure:........................................................................................................................ 641
2.598.8 (en) Critical national infrastructure......................................................................................................... 641
2.598.9 (en) Critical infrastructures....................................................................................................................... 641
2.598.10 (en) Critical infrastructure......................................................................................................................... 641
2.598.11 (en) critical infrastructure.......................................................................................................................... 642
2.598.12 (en) Critical infrastructures....................................................................................................................... 642
2.599 Infraestructuras
críticas de información (protección de)................................................................................ 642
2.599.1 (en) critical information infrastructure................................................................................................... 642
2.599.2 (en) CIIP - Critical
Information Infrastructure Protection..................................................................... 642
2.600 Ingeniería de la
seguridad...................................................................................................................................... 642
2.600.1 Ingeniería de la seguridad......................................................................................................................... 642
2.600.2 (en) security engineering........................................................................................................................... 643
2.601 Ingeniería
inversa.................................................................................................................................................... 643
2.601.1 Ingeniería inversa........................................................................................................................................ 643
2.601.2 (en) Reverse Engineering........................................................................................................................... 643
2.602 Ingeniería social
(picaresca)................................................................................................................................... 643
2.602.1 Ingeniería Social.......................................................................................................................................... 643
2.602.2 Ingeniería Social.......................................................................................................................................... 643
2.602.3 Picaresca....................................................................................................................................................... 643
2.602.4 Ingeniería social.......................................................................................................................................... 644
2.602.5 (en) Social Engineering............................................................................................................................... 644
2.602.6 (en) Social engineering............................................................................................................................... 644
2.602.7 (en) social engineering............................................................................................................................... 644
2.602.8 (en) social engineering............................................................................................................................... 644
2.602.9 (en) Social Engineering............................................................................................................................... 644
2.602.10 (en) Social Engineering............................................................................................................................... 644
2.602.11 (en) social engineering............................................................................................................................... 644
2.602.12 (en) Social Engineering............................................................................................................................... 645
2.602.13 (en) Social engineering attack.................................................................................................................. 645
2.602.14 (en) Social engineering............................................................................................................................... 645
2.602.15 (fr) Ingénierie sociale.................................................................................................................................. 645
2.603 Inserción de
ficheros remotos............................................................................................................................... 645
2.603.1 Inserción de ficheros remotos................................................................................................................... 645
2.603.2 (en) Remote File
Inclusion (RFI)................................................................................................................ 645
2.604 Inspección de
seguridad.......................................................................................................................................... 646
2.604.1 Inspección de seguridad............................................................................................................................. 646
2.604.2 (en) security inspection.............................................................................................................................. 646
2.605 Instalaciones........................................................................................................................................................... 646
2.605.1 Instalaciones................................................................................................................................................ 646
2.605.2 instalaciones de tratamiento de información........................................................................................ 646
2.605.3 (en) information processing facilities...................................................................................................... 646
2.605.4 (en) Facility................................................................................................................................................... 646
2.605.5 (en) Facility................................................................................................................................................... 646
2.606 Integridad................................................................................................................................................................ 646
2.606.1 Integridad..................................................................................................................................................... 647
2.606.2 Integridad..................................................................................................................................................... 647
2.606.3 integridad..................................................................................................................................................... 647
2.606.4 Integridad..................................................................................................................................................... 647
2.606.5 (en) integrity................................................................................................................................................ 647
2.606.1 (en) integrity................................................................................................................................................ 647
2.606.2 (en) integrity................................................................................................................................................ 647
2.606.3 (en) integrity................................................................................................................................................ 647
2.606.4 (en) Integrity................................................................................................................................................ 647
2.606.5 (en) Integrity................................................................................................................................................ 648
2.606.6 (en) integrity................................................................................................................................................ 648
2.606.7 (en) Integrity................................................................................................................................................ 648
2.606.8 (en) integrity................................................................................................................................................ 648
2.606.9 (en) Integrity................................................................................................................................................ 648
2.606.10 (fr) Intégrité.................................................................................................................................................. 648
2.606.11 (fr) Intégrité.................................................................................................................................................. 648
2.607 Integridad de los
datos.......................................................................................................................................... 648
2.607.1 Integridad..................................................................................................................................................... 649
2.607.2 Integridad..................................................................................................................................................... 649
2.607.3 Integridad..................................................................................................................................................... 649
2.607.4 (en) Integrity................................................................................................................................................ 649
2.607.1 (en) Data integrity...................................................................................................................................... 649
2.607.2 (en) data integrity....................................................................................................................................... 649
2.607.3 (en) Data integrity...................................................................................................................................... 650
2.607.4 (en) Data integrity...................................................................................................................................... 650
2.607.5 (en) Integrity................................................................................................................................................ 650
2.607.6 (en) Data integrity...................................................................................................................................... 650
2.607.7 (en) data integrity....................................................................................................................................... 650
2.607.8 (en) Data integrity...................................................................................................................................... 650
2.607.9 (en) Data integrity...................................................................................................................................... 650
2.607.10 (en) Data integrity...................................................................................................................................... 650
2.607.11 (en) data integrity....................................................................................................................................... 650
2.607.12 (en) Data integrity...................................................................................................................................... 650
2.607.13 (en) Data integrity...................................................................................................................................... 651
2.607.14 (en) Data integrity...................................................................................................................................... 651
2.607.15 (en) Data integrity...................................................................................................................................... 651
2.607.16 (en) Data Integrity...................................................................................................................................... 651
2.607.17 (en) Information integrity.......................................................................................................................... 651
2.607.18 (en) Integrity................................................................................................................................................ 651
2.607.19 (en) File Integrity Checker.......................................................................................................................... 651
2.607.20 (fr) integridad de los datos........................................................................................................................ 651
2.607.21 (fr) Intégrité de données............................................................................................................................ 651
2.608 Integridad del
sistema............................................................................................................................................ 652
2.608.1 integridad del sistema................................................................................................................................ 652
2.608.1 (en) integrity................................................................................................................................................ 652
2.608.2 (en) system integrity................................................................................................................................... 652
2.608.3 (en) system integrity................................................................................................................................... 652
2.608.4 (en) operational integrity.......................................................................................................................... 652
2.608.5 (en) system integrity................................................................................................................................... 652
2.609 Inteligencia.............................................................................................................................................................. 652
2.609.1 Inteligencia................................................................................................................................................... 652
2.609.2 Inteligencia Empresarial............................................................................................................................ 653
2.609.3 (en) Intelligence........................................................................................................................................... 653
2.609.4 (en) Intelligence........................................................................................................................................... 653
2.609.5 (en) Intelligence........................................................................................................................................... 653
2.609.6 (en) Intelligence........................................................................................................................................... 653
2.609.7 (en) COMINT (Communications Intelligence)......................................................................................... 654
2.610 Intercambio de
autenticación................................................................................................................................ 654
2.610.1 Intercambio de autenticación................................................................................................................... 654
2.610.2 Intercambio de información de autenticación....................................................................................... 654
2.610.3 intercambio de autenticación................................................................................................................... 654
2.610.4 (en) authentication exchange................................................................................................................... 654
2.610.5 (en) exchange Authentication information............................................................................................ 654
2.610.6 (en) Authentication exchange................................................................................................................... 654
2.610.7 (fr) échange d'authentification................................................................................................................. 655
2.611 Intercambio de
claves............................................................................................................................................. 655
2.611.1 Intercambio de claves................................................................................................................................ 655
2.611.2 (en) key exchange....................................................................................................................................... 655
2.612 Interceptación......................................................................................................................................................... 655
2.612.1 Interceptación.............................................................................................................................................. 655
2.612.2 (en) Eavesdropping Attack........................................................................................................................ 655
2.612.3 (en) eavesdropping..................................................................................................................................... 655
2.612.4 (en) Eavesdropping..................................................................................................................................... 655
2.612.5 (en) interception.......................................................................................................................................... 656
2.613 Interceptación de
contraseñas.............................................................................................................................. 656
2.613.1 Interceptación de contraseñas................................................................................................................. 656
2.613.2 (en) Password Sniffing................................................................................................................................ 656
2.614 Interconexión.......................................................................................................................................................... 656
2.614.1 Interconexión............................................................................................................................................... 656
2.614.2 (en) Interconnection................................................................................................................................... 656
2.614.3 (en) interconnection security agreement (ISA)...................................................................................... 656
2.615 Interferencia
electromagnética............................................................................................................................ 657
2.615.1 Interferencia electromagnética................................................................................................................ 657
2.615.2 (en) Electromagnetic interference........................................................................................................... 657
2.616 Interrupción............................................................................................................................................................ 657
2.616.1 interrumpir................................................................................................................................................... 657
2.616.2 Interrupción.................................................................................................................................................. 657
2.616.3 (en) disruption............................................................................................................................................. 657
2.616.4 (en) disruption............................................................................................................................................. 657
2.616.5 (en) disruption............................................................................................................................................. 657
2.616.6 (en) Disruption............................................................................................................................................. 658
2.616.7 (en) Disruption............................................................................................................................................. 658
2.617 Intranet................................................................................................................................................................... 658
2.617.1 Intranet......................................................................................................................................................... 658
2.617.2 (en) Intranet................................................................................................................................................. 658
2.617.3 (en) Intranet................................................................................................................................................. 658
2.618 Intrusión.................................................................................................................................................................. 658
2.618.1 intruso........................................................................................................................................................... 658
2.618.2 intrusarse...................................................................................................................................................... 659
2.618.3 Intrusión........................................................................................................................................................ 659
2.618.4 Intrusión........................................................................................................................................................ 659
2.618.5 Resistente a intrusiones............................................................................................................................. 659
2.618.6 (en) intrusion................................................................................................................................................ 659
2.618.1 (en) intrusion................................................................................................................................................ 659
2.618.2 (en) intruder................................................................................................................................................. 659
2.618.3 (en) intrusion................................................................................................................................................ 659
2.618.4 (en) intrusion................................................................................................................................................ 660
2.618.5 (fr) Intrusion................................................................................................................................................. 660
2.619 Inundación............................................................................................................................................................... 660
2.619.1 Inundador..................................................................................................................................................... 660
2.619.1 (en) flooding................................................................................................................................................. 660
2.619.2 (en) flooding................................................................................................................................................. 660
2.619.3 (en) Flooding................................................................................................................................................ 661
2.619.4 (en) Flooding................................................................................................................................................ 661
2.620 Inundación ICMP.................................................................................................................................................... 661
2.620.1 Inundación ICMP......................................................................................................................................... 661
2.620.2 (en) ICMP flood............................................................................................................................................ 661
2.621 Inundación IP.......................................................................................................................................................... 661
2.621.1 Inundación IP............................................................................................................................................... 661
2.621.2 (en) IP Flood................................................................................................................................................. 661
2.622 Inyección de
código................................................................................................................................................. 662
2.622.1 Errores de inyección.................................................................................................................................... 662
2.622.2 (en) Injection Flaws..................................................................................................................................... 662
2.622.3 (en) Code injection...................................................................................................................................... 662
2.622.4 (en) CWE-94: Improper Control of Generation of Code ('Code Injection')........................................ 662
2.622.5 (fr) Défauts d’injection............................................................................................................................... 663
2.623 Inyección SQL.......................................................................................................................................................... 663
2.623.1 Inyección SQL............................................................................................................................................... 663
2.623.2 Inyección SQL............................................................................................................................................... 663
2.623.3 Inyección SQL............................................................................................................................................... 663
2.623.4 (en) SQL injection........................................................................................................................................ 664
2.623.5 (en) SQL Injection........................................................................................................................................ 664
2.623.6 (en) SQL Injection........................................................................................................................................ 664
2.623.7 (en) SQL injection........................................................................................................................................ 664
2.623.8 (en) SQL injection........................................................................................................................................ 664
2.623.9 (fr) Injection de commandes SQL............................................................................................................. 665
2.624 IPsec - IP
security..................................................................................................................................................... 665
2.624.1 IPsec - IP security......................................................................................................................................... 665
2.624.2 (en) IP Security (IPSec)................................................................................................................................ 665
2.624.3 (en) IP Security Protocol (IPsec)................................................................................................................ 665
2.624.4 (en) IPsec - IP security................................................................................................................................. 666
2.624.5 (fr) IPsec (IP SECurity)................................................................................................................................. 666
2.624.6 (fr) IPSEC - Internet Protocol SECurity..................................................................................................... 666
2.625 ISAKMP - Internet Security
Association Key Management Protocol............................................................... 666
2.625.1 ISAKMP - Internet Security Association Key Management Protocol.................................................. 666
2.625.2 (en) Internet Security Association and Key Management Protocol (ISAKMP).................................. 667
2.625.3 (en) ISAKMP (Internet Security Association Key Management Protocol)......................................... 667
2.626 iso............................................................................................................................................................................. 667
2.626.1 (en) information security officer (ISO)..................................................................................................... 667
2.627 ITSEC - Information Technology
Security Evaluation Criteria......................................................................... 667
2.627.1 ITSEC.............................................................................................................................................................. 667
2.627.2 (en) ITSEC...................................................................................................................................................... 668
2.628 JADE......................................................................................................................................................................... 669
2.628.1 JADE............................................................................................................................................................... 669
2.628.2 (en) JADE....................................................................................................................................................... 669
2.629 jamming.................................................................................................................................................................... 669
2.629.1 jamming........................................................................................................................................................ 669
2.629.2 (en) Jamming:.............................................................................................................................................. 669
2.629.3 (en) jamming................................................................................................................................................ 669
2.630 Jerarquía de
certificación...................................................................................................................................... 669
2.630.1 Jerarquía de certificación.......................................................................................................................... 670
2.630.2 (en) certification hierarchy........................................................................................................................ 670
2.631 KASUMI.................................................................................................................................................................... 670
2.631.1 KASUMI......................................................................................................................................................... 670
2.631.2 (en) KASUMI................................................................................................................................................. 670
2.632 Kerberos................................................................................................................................................................... 670
2.632.1 Kerberos........................................................................................................................................................ 671
2.632.2 (en) Kerberos................................................................................................................................................ 671
2.632.3 (fr) Kerberos................................................................................................................................................. 671
2.632.4 (fr) Kerberos................................................................................................................................................. 671
2.633 Kernel de
seguridad................................................................................................................................................ 672
2.633.1 Kernel de seguridad.................................................................................................................................... 672
2.633.2 (en) security kernel..................................................................................................................................... 672
2.634 Khafre...................................................................................................................................................................... 672
2.634.1 Khafre............................................................................................................................................................ 672
2.634.2 (en) Khafre.................................................................................................................................................... 672
2.635 Khufu........................................................................................................................................................................ 672
2.635.1 Khufu............................................................................................................................................................. 672
2.635.2 (en) Khufu..................................................................................................................................................... 673
2.636 L2TP - protocolo
de túnel en la capa 2................................................................................................................. 673
2.636.1 L2TP (Layer 2 Tunneling Protocol)........................................................................................................... 673
2.636.2 (en) Layer 2 Tunneling Protocol (L2TP)................................................................................................... 673
2.636.3 (en) L2TP - layer 2 tunneling protocol..................................................................................................... 673
2.636.4 (fr) L2TP - Layer 2 Tunneling Protocol..................................................................................................... 673
2.637 LDAP injection......................................................................................................................................................... 674
2.637.1 LDAP injection.............................................................................................................................................. 674
2.637.2 (en) LDAP Injection...................................................................................................................................... 674
2.637.3 (en) LDAP injection...................................................................................................................................... 674
2.638 LDAP -
Lightweight Directory Access Protocol.................................................................................................. 674
2.638.1 LDAP (Lightweight Directory Access Protocol)....................................................................................... 675
2.638.2 (en) LDAP (Lightweight Directory Access Protocol)............................................................................... 675
2.639 LEAP -
Lightweight Extensible Authentication Protocol................................................................................... 675
2.639.1 LEAP............................................................................................................................................................... 675
2.639.2 (en) Lightweight Extensible Authentication Protocol (LEAP).............................................................. 675
2.640 Lema de
Kerckhoffs................................................................................................................................................. 676
2.640.1 Lema de Kerckhoffs..................................................................................................................................... 676
2.640.2 (en) Kerckhoffs law..................................................................................................................................... 676
2.641 Leyes de Courtney.................................................................................................................................................... 676
2.641.1 Leyes de Courtney....................................................................................................................................... 676
2.641.2 (en) Courtney's laws................................................................................................................................... 676
2.642 Libro de claves......................................................................................................................................................... 677
2.642.1 Libro de claves............................................................................................................................................. 677
2.642.2 Libro de claves............................................................................................................................................. 677
2.643 Libro de códigos...................................................................................................................................................... 677
2.643.1 Libro de claves............................................................................................................................................. 677
2.643.1 (en) Code book............................................................................................................................................. 677
2.643.2 (en) code book............................................................................................................................................. 677
2.643.3 (en) Codebook.............................................................................................................................................. 677
2.644 Lista de control
de acceso..................................................................................................................................... 678
2.644.1 Lista de
Control de Acceso (ACL).............................................................................................................. 678
2.644.2 Lista de control de accesos........................................................................................................................ 678
2.644.3 lista de control de acceso.......................................................................................................................... 678
2.644.1 (en) Access control list (ACL)..................................................................................................................... 678
2.644.2 (en) access control list (ACL)..................................................................................................................... 678
2.644.3 (en) Access control list................................................................................................................................ 678
2.644.4 (en) Access control list................................................................................................................................ 678
2.644.5 (en) Access Control List (ACL).................................................................................................................... 679
2.644.6 (en) access control list (ACL)..................................................................................................................... 679
2.644.7 (fr) liste de contrôle d'accès...................................................................................................................... 679
2.644.8 (fr) Liste de contrôle d'accès..................................................................................................................... 679
2.645 Lista de
revocación de autoridad de atributo...................................................................................................... 679
2.645.1 Lista de
revocación de autoridad de atributo........................................................................................ 680
2.645.2 lista de
revocación de autoridad de atributo......................................................................................... 680
2.645.3 (en) Attribute Authority Revocation List................................................................................................. 680
2.645.4 (fr) liste de révocation
d'autorité d'attribut........................................................................................... 680
2.646 Lista de
revocación de autoridades de certificación........................................................................................... 680
2.646.1 lista de
revocación de autoridad de certificación.................................................................................. 680
2.646.2 (en) Certification Authority Revocation List........................................................................................... 680
2.647 Lista de
revocación de certificado de atributo.................................................................................................... 680
2.647.1 lista de
revocación de certificado de atributo........................................................................................ 680
2.647.2 (en) Attribute Certificate Revocation List............................................................................................... 681
2.647.3 (fr) liste de révocation
de certificat d'attribut....................................................................................... 681
2.648 Lista de
revocación de certificados....................................................................................................................... 681
2.648.1 lista de revocación de certificados........................................................................................................... 681
2.648.2 certificado de lista de revocaciones......................................................................................................... 681
2.648.3 Lista de revocación de certificados.......................................................................................................... 681
2.648.1 (en) Certificate
revocation list (CRL)........................................................................................................ 681
2.648.2 (en) X.509 certificate
revocation list (CRL)............................................................................................. 681
2.648.3 (en) Certificate Revocation List................................................................................................................. 682
2.648.4 (en) revocation list certificate................................................................................................................... 682
2.648.5 (fr) liste de révocation
de certificat.......................................................................................................... 682
2.648.6 (fr) certificat de
révocation de liste.......................................................................................................... 682
2.649 Lista blanca.............................................................................................................................................................. 682
2.649.1 lista blanca................................................................................................................................................... 682
2.649.2 (en) Whitelists:............................................................................................................................................ 682
2.649.3 (en) White-listing:....................................................................................................................................... 682
2.649.4 (en) Application Whitelisting:................................................................................................................... 683
2.649.1 (en) User Whitelisting:............................................................................................................................... 683
2.649.2 (en) Whitelist............................................................................................................................................... 683
2.650 Lista negra............................................................................................................................................................... 683
2.650.1 Lista negra.................................................................................................................................................... 683
2.650.2 (en) Blacklisting........................................................................................................................................... 683
2.650.3 (en) blacklisting........................................................................................................................................... 683
2.650.4 (en) Blacklist................................................................................................................................................. 684
2.650.5 (en) Black list................................................................................................................................................ 684
2.650.6 (en) Blacklist................................................................................................................................................. 684
2.651 Little endian............................................................................................................................................................. 684
2.651.1 Little endian................................................................................................................................................. 684
2.651.2 (en) Little endian......................................................................................................................................... 684
2.652 Login......................................................................................................................................................................... 684
2.652.1 Login.............................................................................................................................................................. 684
2.652.2 (en) login....................................................................................................................................................... 684
2.653 Madurez................................................................................................................................................................... 684
2.653.1 Modelo de
Madurez de la Capacidad (CMM)........................................................................................ 685
2.653.2 (en) Capability Maturity Model (CMM).................................................................................................. 685
2.653.3 (en) Capability Maturity Model for Software (CMM or SW-CMM).................................................... 685
2.653.4 (fr) Capability Maturity Model (CMM).................................................................................................... 685
2.654 MAEC....................................................................................................................................................................... 685
2.654.1 MAEC............................................................................................................................................................. 685
2.654.2 (en) MAEC..................................................................................................................................................... 686
2.655 Manejar
información............................................................................................................................................. 686
2.655.1 Manejar información.................................................................................................................................. 686
2.655.2 (en) Information handling......................................................................................................................... 686
2.656 Manipulación.......................................................................................................................................................... 686
2.656.1 manipular..................................................................................................................................................... 686
2.656.2 (en) tampering............................................................................................................................................. 686
2.656.3 (en) tamper.................................................................................................................................................. 686
2.656.4 (en) tamper-resistant................................................................................................................................. 686
2.656.5 (en) tampering............................................................................................................................................. 687
2.656.6 (en) Tamper.................................................................................................................................................. 687
2.656.7 (en) tamper response................................................................................................................................. 687
2.656.8 (en) Tamper response................................................................................................................................ 687
2.657 Marcas de agua....................................................................................................................................................... 687
2.657.1 marcas de agua digitales........................................................................................................................... 687
2.657.2 (en) digital watermarking.......................................................................................................................... 687
2.658 Marco de control................................................................................................................................................... 688
2.658.1 Marco de control......................................................................................................................................... 688
2.658.2 Marco de control......................................................................................................................................... 688
2.658.3 (en) Control framework............................................................................................................................. 688
2.659 MARS....................................................................................................................................................................... 688
2.659.1 MARS............................................................................................................................................................. 688
2.659.2 (en) MARS..................................................................................................................................................... 688
2.660 Máscara de un
solo uso......................................................................................................................................... 688
2.660.1 Bloc aleatorio............................................................................................................................................... 688
2.660.2 Bloc aleatorio............................................................................................................................................... 689
2.660.1 (en) one-time pad....................................................................................................................................... 689
2.660.2 (en) one-time pad....................................................................................................................................... 689
2.660.3 (en) Pad......................................................................................................................................................... 689
2.660.4 (en) one-time pad....................................................................................................................................... 689
2.660.5 (en) one-time pad....................................................................................................................................... 689
2.660.6 (fr) Pad.......................................................................................................................................................... 690
2.661 Material de cifra..................................................................................................................................................... 690
2.661.1 Material de cifra.......................................................................................................................................... 690
2.661.2 (en) Cryptomaterial.................................................................................................................................... 690
2.662 Matriz de riesgos.................................................................................................................................................... 690
2.662.1 Matriz de riesgos......................................................................................................................................... 690
2.662.2 (en) RISK MATRIX:....................................................................................................................................... 690
2.663 may........................................................................................................................................................................... 690
2.663.1 (en) MAY....................................................................................................................................................... 691
2.663.2 (en) may........................................................................................................................................................ 691
2.664 MD2 - algoritmo
resumen..................................................................................................................................... 691
2.664.1 MD2............................................................................................................................................................... 691
2.664.2 (en) MD2....................................................................................................................................................... 691
2.664.3 (en) MD2....................................................................................................................................................... 691
2.665 MD4 - algoritmo
resumen..................................................................................................................................... 692
2.665.1 MD4 - algoritmo resumen......................................................................................................................... 692
2.665.2 (en) MD4....................................................................................................................................................... 692
2.665.3 (en) MD4....................................................................................................................................................... 692
2.666 MD5 - algoritmo
resumen..................................................................................................................................... 692
2.666.1 MD5 - algoritmo resumen......................................................................................................................... 693
2.666.2 (en) MD5....................................................................................................................................................... 693
2.666.3 (en) MD5....................................................................................................................................................... 693
2.667 Mecanismo crítico.................................................................................................................................................. 693
2.667.1 Mecanismo crítico....................................................................................................................................... 693
2.667.2 (en) Critical mechanism............................................................................................................................. 693
2.668 Mecanismo de
control de acceso.......................................................................................................................... 693
2.668.1 Mecanismo de control de acceso............................................................................................................. 693
2.668.2 (en) access control mechanism................................................................................................................. 694
2.668.3 (en) Access control mechanism................................................................................................................ 694
2.669 Mecanismo de
seguridad........................................................................................................................................ 694
2.669.1 Mecanismo de seguridad.......................................................................................................................... 694
2.669.2 Mecanismo específico de seguridad........................................................................................................ 694
2.669.3 Mecanismo general de seguridad............................................................................................................ 694
2.669.4 (en) security mechanism............................................................................................................................ 694
2.669.5 (en) Security mechanism............................................................................................................................ 695
2.670 Medida..................................................................................................................................................................... 695
2.670.1 medir............................................................................................................................................................. 695
2.670.2 medida.......................................................................................................................................................... 695
2.670.3 medición....................................................................................................................................................... 695
2.670.4 función de medición................................................................................................................................... 695
2.670.5 método de medición................................................................................................................................... 695
2.670.6 resultados de las mediciones.................................................................................................................... 696
2.670.7 (en) measure................................................................................................................................................ 696
2.670.8 (en) measurement...................................................................................................................................... 696
2.670.9 (en) measure................................................................................................................................................ 696
2.670.10 (en) measurement...................................................................................................................................... 696
2.670.11 (en) measure................................................................................................................................................ 696
2.670.12 (en) measurement...................................................................................................................................... 696
2.670.13 (en) measurement function....................................................................................................................... 697
2.670.14 (en) measurement method....................................................................................................................... 697
2.670.15 (en) measurement results.......................................................................................................................... 697
2.670.16 (en) measurement scale............................................................................................................................ 697
2.670.17 (en) unit of measurement.......................................................................................................................... 697
2.670.18 (en) Performance Measure....................................................................................................................... 697
2.671 Meta-Character
Injection..................................................................................................................................... 698
2.671.1 Meta-Character Injection.......................................................................................................................... 698
2.671.2 (en) Meta-Character Injection.................................................................................................................. 698
2.672 Método asimétrico
de autenticación.................................................................................................................... 698
2.672.1 Método asimétrico de autenticación....................................................................................................... 698
2.672.2 (en) Asymmetric Authentication Method............................................................................................... 698
2.673 Método de ataque.................................................................................................................................................. 698
2.673.1 Método de ataque...................................................................................................................................... 698
2.673.1 (en) attack method..................................................................................................................................... 699
2.673.2 (en) attack method..................................................................................................................................... 699
2.673.3 (en) attack method..................................................................................................................................... 699
2.673.4 (fr) Méthode d'attaque.............................................................................................................................. 700
2.674 Método de
autenticación....................................................................................................................................... 700
2.674.1 Método de autenticación.......................................................................................................................... 700
2.674.2 (en) Authentication method...................................................................................................................... 700
2.675 Metodología común
de evaluación...................................................................................................................... 700
2.675.1 Metodología común de evaluación......................................................................................................... 700
2.675.2 (en) Common evaluation methodology.................................................................................................. 701
2.676 Método simétrico
de autenticación...................................................................................................................... 701
2.676.1 Método simétrico de autenticación......................................................................................................... 701
2.676.2 (en) Symmetric authentication method.................................................................................................. 701
2.677 Métrica.................................................................................................................................................................... 701
2.677.1 Métrica.......................................................................................................................................................... 701
2.677.2 Métrica.......................................................................................................................................................... 701
2.677.3 (en) Metrics.................................................................................................................................................. 701
2.677.4 (en) Metrics.................................................................................................................................................. 701
2.677.5 (en) IT Security Metrics.............................................................................................................................. 701
2.678 MISTY....................................................................................................................................................................... 702
2.678.1 MISTY............................................................................................................................................................ 702
2.678.2 (en) MISTY.................................................................................................................................................... 702
2.679 Mochila.................................................................................................................................................................... 702
2.679.1 Mochila......................................................................................................................................................... 702
2.679.2 (en) dongle................................................................................................................................................... 702
2.679.3 (en) Dongle................................................................................................................................................... 702
2.680 Modelo de
Bell-LaPadula...................................................................................................................................... 703
2.680.1 Modelo de Bell-LaPadula........................................................................................................................... 703
2.680.2 (en) Bell-LaPadula model........................................................................................................................... 703
2.680.3 (en) Bell-LaPadula model........................................................................................................................... 703
2.681 Modelo de Biba........................................................................................................................................................ 704
2.681.1 (en) Biba model........................................................................................................................................... 704
2.682 Modelo de
Brewer-Nash........................................................................................................................................ 704
2.682.1 (en) Brewer-Nash model............................................................................................................................ 704
2.683 Modelo de
seguridad.............................................................................................................................................. 704
2.683.1 Modelo de seguridad.................................................................................................................................. 704
2.683.2 Modelo de seguridad.................................................................................................................................. 704
2.683.3 (en) security model..................................................................................................................................... 705
2.684 Módem de
retrollamada........................................................................................................................................ 705
2.684.1 Módem de retrollamada............................................................................................................................ 705
2.684.1 (en) Call back............................................................................................................................................... 705
2.684.2 (en) call back................................................................................................................................................ 705
2.684.3 (en) Call-back............................................................................................................................................... 705
2.685 Modo
compartimentado........................................................................................................................................ 705
2.685.1 Modo compartimentado........................................................................................................................... 706
2.685.2 Compartimentado....................................................................................................................................... 706
2.685.1 (en) compartmented mode....................................................................................................................... 706
2.685.2 (en) compartmented security mode........................................................................................................ 706
2.686 Modo de cifrado..................................................................................................................................................... 706
2.686.1 Procedimiento de cifrado.......................................................................................................................... 706
2.686.2 (en) Operating Mode.................................................................................................................................. 706
2.687 Modo dedicado....................................................................................................................................................... 707
2.687.1 Dedicado....................................................................................................................................................... 707
2.687.2 modo dedicado............................................................................................................................................ 707
2.687.1 (en) dedicated mode................................................................................................................................... 707
2.687.2 (en) dedicated security mode.................................................................................................................... 707
2.688 Modo de operación
(1)........................................................................................................................................... 707
2.688.1 Modo de operación (1)............................................................................................................................... 708
2.688.2 (en) mode of operation.............................................................................................................................. 708
2.688.3 (en) Modes of Operation........................................................................................................................... 708
2.689 Modo de operación
(2)........................................................................................................................................... 708
2.689.1 Modos seguros de operación.................................................................................................................... 708
2.689.2 Modo de operación de seguridad............................................................................................................ 709
2.689.1 (en) mode of operation.............................................................................................................................. 710
2.689.2 (en) Security modes.................................................................................................................................... 710
2.689.3 (en) mode of operation.............................................................................................................................. 710
2.689.4 (en) modes of operation............................................................................................................................ 710
2.689.5 (en) Security operating mode................................................................................................................... 711
2.689.6 (fr) Mode d'exploitation de sécurité........................................................................................................ 712
2.690 Modo multinivel..................................................................................................................................................... 713
2.690.1 Multinivel...................................................................................................................................................... 713
2.690.2 Multinivel...................................................................................................................................................... 713
2.690.1 (en) multilevel mode................................................................................................................................... 713
2.690.2 (en) multilevel security mode.................................................................................................................... 713
2.691 Modo particionado................................................................................................................................................ 714
2.691.1 Modo particionado..................................................................................................................................... 714
2.691.1 (en) partitioned security mode................................................................................................................. 714
2.691.2 (en) partitioned security mode................................................................................................................. 714
2.692 Modo unificado al
nivel superior......................................................................................................................... 714
2.692.1 Unificado al nivel superior......................................................................................................................... 714
2.692.2 Unificado al nivel superior......................................................................................................................... 715
2.692.1 (en) system high mode............................................................................................................................... 715
2.692.2 (en) system-high security mode............................................................................................................... 715
2.693 Módulo criptográfico........................................................................................................................................... 715
2.693.1 Módulo cripto.............................................................................................................................................. 715
2.693.2 (en) cryptographic module........................................................................................................................ 715
2.693.3 (en) Cryptographic module........................................................................................................................ 716
2.693.4 (en) cryptographic module........................................................................................................................ 716
2.693.5 (en) Cryptographic module........................................................................................................................ 716
2.694 Módulo de
identificación de usuario.................................................................................................................... 716
2.694.1 Módulo de identificación de usuario....................................................................................................... 716
2.694.2 (en) Subscriber identification module..................................................................................................... 716
2.695 Monitor de referencia............................................................................................................................................ 716
2.695.1 Monitor de referencia................................................................................................................................ 716
2.695.2 (en) reference monitor............................................................................................................................... 717
2.695.3 (en) reference monitor............................................................................................................................... 717
2.695.4 (en) Reference Monitor Concept.............................................................................................................. 717
2.696 Monitorización de
la red....................................................................................................................................... 717
2.696.1 Monitorización de la red............................................................................................................................ 717
2.696.2 (en) Network Monitoring........................................................................................................................... 717
2.697 Monitorización
del teclado.................................................................................................................................. 717
2.697.1 Monitorización del teclado........................................................................................................................ 717
2.697.2 (en) Key Stroke Monitoring....................................................................................................................... 717
2.698 must.......................................................................................................................................................................... 718
2.698.1 (en) MUST..................................................................................................................................................... 718
2.699 must_not................................................................................................................................................................. 718
2.699.1 (en) MUST NOT............................................................................................................................................ 718
2.700 Necesidad de
conocer............................................................................................................................................. 718
2.700.1 Necesidad de conocer................................................................................................................................ 718
2.700.2 Necesidad de Conocer................................................................................................................................ 718
2.700.3 Necesidad de conocer................................................................................................................................ 718
2.700.4 Necesidad de conocer................................................................................................................................ 719
2.700.1 (en) need-to-know...................................................................................................................................... 719
2.700.1 (en) need to know determination............................................................................................................ 719
2.700.2 (en) need to know, need-to-know............................................................................................................ 719
2.700.3 (en) Need-to-Know...................................................................................................................................... 719
2.700.4 (en) Neet-to-know....................................................................................................................................... 719
2.701 Negociación de
claves............................................................................................................................................. 719
2.701.1 acuerdo de clave......................................................................................................................................... 719
2.701.2 Negociación de claves................................................................................................................................ 720
2.701.3 Negociación de clave.................................................................................................................................. 720
2.701.4 (en) key agreement (algorithm or protocol).......................................................................................... 720
2.701.5 (en) Key agreement.................................................................................................................................... 720
2.701.6 (en) Key agreement.................................................................................................................................... 720
2.701.7 (en) Key agreement.................................................................................................................................... 720
2.701.8 (en) Key agreement.................................................................................................................................... 721
2.701.9 (fr) agrément de clé.................................................................................................................................... 721
2.702 Nivel de
clasificación.............................................................................................................................................. 721
2.702.1 Nivel de clasificación.................................................................................................................................. 721
2.702.2 (en) classification level............................................................................................................................... 721
2.703 Negro....................................................................................................................................................................... 721
2.703.1 negro............................................................................................................................................................. 721
2.703.2 (en) BLACK.................................................................................................................................................... 721
2.704 Nivel de garantía
de evaluación............................................................................................................................ 721
2.704.1 Nivel de garantía de evaluación............................................................................................................... 722
2.704.1 (en) evaluation assurance level (EAL)...................................................................................................... 722
2.704.2 (en) evaluation assurance level (EAL)...................................................................................................... 722
2.704.3 (en) evaluation assurance level (EAL)...................................................................................................... 722
2.705 nivel de riesgo.......................................................................................................................................................... 722
2.705.1 nivel de riesgo:............................................................................................................................................. 722
2.705.2 (en) level of risk........................................................................................................................................... 722
2.705.3 (fr) niveau de risque.................................................................................................................................... 723
2.706 NMAP....................................................................................................................................................................... 723
2.706.1 NMAP............................................................................................................................................................ 723
2.706.2 (en) NMAP.................................................................................................................................................... 723
2.706.3 (fr) NMAP...................................................................................................................................................... 723
2.707 Nonce....................................................................................................................................................................... 723
2.707.1 Nonce............................................................................................................................................................ 723
2.707.2 (en) Nonce.................................................................................................................................................... 723
2.707.3 (en) nonce..................................................................................................................................................... 724
2.707.4 (en) nonce..................................................................................................................................................... 724
2.707.5 (en) Nonce.................................................................................................................................................... 724
2.707.6 (en) nonce..................................................................................................................................................... 724
2.708 No repudio............................................................................................................................................................... 724
2.708.1 no repudio.................................................................................................................................................... 724
2.708.2 No repudio.................................................................................................................................................... 725
2.708.3 No repudio.................................................................................................................................................... 725
2.708.4 No repudio.................................................................................................................................................... 725
2.708.5 No repudio en origen (Nonrepudiation with proof of origen)............................................................. 725
2.708.6 No repudio en destino (Norepudiation with proof of delivery)........................................................... 725
2.708.7 No repudio.................................................................................................................................................... 725
2.708.8 (en) non-repudiation.................................................................................................................................. 725
2.708.9 (en) Non-repudiation.................................................................................................................................. 726
2.708.1 (en) Non-repudiation.................................................................................................................................. 726
2.708.2 (en) non-repudiation service..................................................................................................................... 726
2.708.3 (en) non-repudiation with proof of origin............................................................................................... 726
2.708.4 (en) non-repudiation with proof of receipt............................................................................................. 726
2.708.5 (en) Non-repudiation.................................................................................................................................. 726
2.708.6 (en) Non-repudiation.................................................................................................................................. 726
2.708.7 (en) Non-repudiation.................................................................................................................................. 727
2.708.8 (en) Non-repudiation exchange................................................................................................................ 727
2.708.9 (en) Non-repudiation information........................................................................................................... 727
2.708.10 (en) Non-repudiation of creation............................................................................................................. 727
2.708.11 (en) non-repudiation with proof of delivery........................................................................................... 727
2.708.12 (en) Non-repudiation of delivery.............................................................................................................. 727
2.708.13 (en) Non-repudiation of knowledge......................................................................................................... 727
2.708.14 (en) non-repudiation with proof of origin............................................................................................... 727
2.708.15 (en) Non-repudiation of origin.................................................................................................................. 728
2.708.16 (en) Non-repudiation of receipt................................................................................................................ 728
2.708.17 (en) Non-repudiation of sending.............................................................................................................. 728
2.708.18 (en) Non-repudiation of submission........................................................................................................ 728
2.708.19 (en) Non-repudiation of transport........................................................................................................... 728
2.708.20 (en) Non-repudiation policy...................................................................................................................... 728
2.708.21 (en) Non-repudiation token....................................................................................................................... 728
2.708.22 (en) Non-repudiation.................................................................................................................................. 728
2.708.23 (en) NRD token............................................................................................................................................ 728
2.708.24 (en) NRO token............................................................................................................................................ 728
2.708.25 (en) NRS token............................................................................................................................................. 729
2.708.26 (en) NRT token............................................................................................................................................. 729
2.708.27 (en) non-repudiation.................................................................................................................................. 729
2.708.28 (en) Non-repudiation.................................................................................................................................. 729
2.708.29 (en) Non-Repudiation................................................................................................................................. 729
2.708.30 (fr) Non-répudiation................................................................................................................................... 729
2.709 Norma...................................................................................................................................................................... 729
2.709.1 norma............................................................................................................................................................ 729
2.709.2 Estándar........................................................................................................................................................ 729
2.709.3 (en) Standard............................................................................................................................................... 730
2.710 Notarización........................................................................................................................................................... 730
2.710.1 Notarización................................................................................................................................................. 730
2.710.2 notarización................................................................................................................................................. 730
2.710.3 (en) digital notary....................................................................................................................................... 730
2.710.4 (en) notarization......................................................................................................................................... 730
2.710.5 (en) Notarization......................................................................................................................................... 731
2.710.6 (en) Notarization token.............................................................................................................................. 731
2.710.7 (en) Notary (notary authority).................................................................................................................. 731
2.710.8 (en) Notarization......................................................................................................................................... 731
2.710.9 (fr) notarisation........................................................................................................................................... 731
2.711 Nuke.......................................................................................................................................................................... 731
2.711.1 Nuke.............................................................................................................................................................. 731
2.711.2 (en) Nukes.................................................................................................................................................... 731
2.711.3 (en) What Is A Nuke Attack?..................................................................................................................... 731
2.712 Null injection.......................................................................................................................................................... 731
2.712.1 Null injection................................................................................................................................................ 732
2.712.2 (en) Null Injection........................................................................................................................................ 732
2.713 Número de
autenticación de una transacción.................................................................................................... 732
2.713.1 Número de
autenticación de una transacción....................................................................................... 732
2.713.2 (en) Transaction authentication number................................................................................................ 732
2.714 Número de
identificación personal....................................................................................................................... 732
2.714.1 PIN................................................................................................................................................................. 732
2.714.2 Número de identificación personal.......................................................................................................... 733
2.714.3 Número de identificación personal.......................................................................................................... 733
2.714.4 (en) personal identification number (PIN).............................................................................................. 733
2.714.5 (en) PIN......................................................................................................................................................... 733
2.714.6 (en) PIN (Personal Identification Number)............................................................................................. 733
2.714.7 (en) Personal identification number........................................................................................................ 733
2.714.8 (fr) PIN........................................................................................................................................................... 733
2.715 NVD – National
Vulnerability Database.............................................................................................................. 734
2.715.1 NVD................................................................................................................................................................ 734
2.715.2 (en) NVD....................................................................................................................................................... 734
2.715.3 (en) NVD....................................................................................................................................................... 734
2.716 Oakley....................................................................................................................................................................... 735
2.716.1 Oakley........................................................................................................................................................... 735
2.716.2 (en) OAKLEY.................................................................................................................................................. 735
2.716.3 (en) Oakley................................................................................................................................................... 735
2.717 Objetivo de
control................................................................................................................................................ 735
2.717.1 Objetivo de control..................................................................................................................................... 735
2.717.2 Objetivo de control..................................................................................................................................... 735
2.717.3 (en) Control objective................................................................................................................................. 735
2.718 Objetivo de Punto
de Recuperación...................................................................................................................... 736
2.718.1 Objetivo de Punto de Recuperación......................................................................................................... 736
2.718.2 objetivo del punto de recuperación......................................................................................................... 736
2.718.3 (en) Recovery point objective (RPO)........................................................................................................ 736
2.718.4 (en) Recovery Point Objective (RPO)........................................................................................................ 736
2.718.5 (en) Recovery Point
Objectives (RPOs).................................................................................................... 737
2.718.6 (fr) Objectif de point de
reprise (RPO)..................................................................................................... 737
2.719 Objetivo de
seguridad............................................................................................................................................. 737
2.719.1 Objetivo de seguridad................................................................................................................................ 737
2.719.2 Objetivo de seguridad................................................................................................................................ 737
2.719.3 Objetivo de seguridad................................................................................................................................ 737
2.719.4 (en) Security Objective............................................................................................................................... 737
2.719.5 (en) Security objective................................................................................................................................ 738
2.719.6 (en) Security objective................................................................................................................................ 738
2.720 Objetivo de
tiempo de recuperación...................................................................................................................... 738
2.720.1 Objetivo de Tiempo de Recuperación...................................................................................................... 738
2.720.2 objetivo de tiempo de recuperación........................................................................................................ 738
2.720.3 (en) Recovery time objective (RTO).......................................................................................................... 738
2.720.4 (en) Recovery Time Objective (RTO)........................................................................................................ 738
2.720.5 (en) recovery time objective...................................................................................................................... 739
2.720.6 (en) What is the Recovery Time Objective?............................................................................................ 739
2.720.7 (en) Recovery Time Objectives (RTOs)..................................................................................................... 739
2.720.8 (fr) Objectif de temps de
reprise............................................................................................................... 739
2.721 Objeto de
evaluación.............................................................................................................................................. 739
2.721.1 Objeto de evaluación.................................................................................................................................. 739
2.721.2 Objeto de evaluación.................................................................................................................................. 739
2.721.3 (en) target of evaluation (TOE)................................................................................................................. 740
2.721.4 (en) Target of evaluation........................................................................................................................... 740
2.722 Obligatorio.............................................................................................................................................................. 740
2.722.1 Documento normativo............................................................................................................................... 740
2.722.2 (en) normative............................................................................................................................................. 740
2.723 OCSP - Online
Certificate Status Protocol......................................................................................................... 740
2.723.1 OCSP - Online Certificate Status Protocol............................................................................................... 740
2.723.2 (en) Online Certificate Status Protocol (OCSP)....................................................................................... 740
2.724 Ocultación............................................................................................................................................................... 740
2.724.1 Ocultación.................................................................................................................................................... 741
2.724.2 (en) Stealh.................................................................................................................................................... 741
2.724.3 (en) Stealthing............................................................................................................................................. 741
2.725 Ocultamiento.......................................................................................................................................................... 741
2.725.1 Ocultamiento............................................................................................................................................... 741
2.725.2 (en) Masking................................................................................................................................................ 741
2.725.3 (fr) Masquage.............................................................................................................................................. 742
2.726 OFB - Output
feedback mode................................................................................................................................. 742
2.726.1 OFB - Output feedback mode.................................................................................................................... 742
2.726.2 (en) output feedback (OFB)....................................................................................................................... 742
2.726.3 (en) OFB - Output feedback mode........................................................................................................... 742
2.727 Opción de
recuperación.......................................................................................................................................... 742
2.727.1 Opción de Recuperación............................................................................................................................ 743
2.727.2 (en) Recovery Option.................................................................................................................................. 743
2.727.3 (fr) Option de reprise.................................................................................................................................. 743
2.728 OpenPGP - Open
Pretty Good Privacy.................................................................................................................. 743
2.728.1 OpenPGP....................................................................................................................................................... 743
2.728.2 (en) OpenPGP............................................................................................................................................... 743
2.728.3 (fr) OpenPGP................................................................................................................................................ 744
2.729 Operaciones en
redes de ordenadores.................................................................................................................. 744
2.729.1 Operaciones en redes de ordenadores.................................................................................................... 744
2.729.2 (en) Computer Network Operations (CNO)............................................................................................ 744
2.730 Operador................................................................................................................................................................. 745
2.730.1 Operador...................................................................................................................................................... 745
2.730.2 (en) operator................................................................................................................................................ 745
2.730.3 (en) Operator............................................................................................................................................... 745
2.731 Opt in........................................................................................................................................................................ 745
2.731.1 Opt in............................................................................................................................................................. 745
2.731.2 Opt-in............................................................................................................................................................ 745
2.731.3 (en) Opt in..................................................................................................................................................... 745
2.732 optional................................................................................................................................................................... 746
2.732.1 (en) MAY....................................................................................................................................................... 746
2.733 Opt out..................................................................................................................................................................... 746
2.733.1 Opt out.......................................................................................................................................................... 746
2.733.2 Opt-out.......................................................................................................................................................... 746
2.733.3 (en) Opt out.................................................................................................................................................. 746
2.734 Organismo de
certificación................................................................................................................................... 747
2.734.1 Institución de certificación........................................................................................................................ 747
2.734.2 (en) Certification body................................................................................................................................ 747
2.735 Origen de
autoridad............................................................................................................................................... 747
2.735.1 Origen de autoridad................................................................................................................................... 747
2.735.2 fuente de autoridad.................................................................................................................................... 747
2.735.3 (en) Source of Authority............................................................................................................................. 747
2.735.4 (fr) source d'autorité.................................................................................................................................. 747
2.736 Origen de
confianza................................................................................................................................................ 747
2.736.1 Origen de confianza.................................................................................................................................... 748
2.736.2 ancla de confianza...................................................................................................................................... 748
2.736.3 (en) trust anchor......................................................................................................................................... 748
2.736.4 (en) Trust anchor......................................................................................................................................... 748
2.736.5 (en) trust anchor......................................................................................................................................... 748
2.736.6 (en) trust anchor......................................................................................................................................... 748
2.736.7 (fr) ancre de confiance............................................................................................................................... 749
2.737 Padding.................................................................................................................................................................... 749
2.737.1 Padding......................................................................................................................................................... 749
2.737.2 (en) Padding................................................................................................................................................. 749
2.738 PAP - Password
Authentication Protocol.......................................................................................................... 749
2.738.1 PAP - Password Authentication Protocol................................................................................................ 749
2.738.2 (en) Password
Authentication Protocol (PAP)....................................................................................... 749
2.738.3 (en) Password Authentication Protocol - PAP........................................................................................ 749
2.738.4 (en) PAP (Password
Authentication Protocol)....................................................................................... 750
2.738.5 (en) PAP - Password Authentication Protocol........................................................................................ 750
2.738.6 (fr) PAP - Password Authentication Protocol......................................................................................... 750
2.739 Parámetro secreto................................................................................................................................................. 750
2.739.1 Parámetro secreto...................................................................................................................................... 750
2.739.2 Parámetro secreto...................................................................................................................................... 750
2.739.3 (en) secret parameter................................................................................................................................ 750
2.739.4 (en) Secret parameter................................................................................................................................ 750
2.740 Parámetro
variante en el tiempo.......................................................................................................................... 751
2.740.1 Parámetro variante en el tiempo............................................................................................................. 751
2.740.2 (en) Time variant parameter..................................................................................................................... 751
2.741 Par asimétrico de
claves......................................................................................................................................... 751
2.741.1 Par de claves asimétricas........................................................................................................................... 751
2.741.2 (en) asymmetric key................................................................................................................................... 751
2.741.3 (en) asymmetric key pair........................................................................................................................... 751
2.741.4 (en) Asymmetric pair.................................................................................................................................. 752
2.741.5 (en) Asymmetric key pair........................................................................................................................... 752
2.741.6 (en) Asymmetric key pair........................................................................................................................... 752
2.742 Par de claves............................................................................................................................................................ 752
2.742.1 Par de claves................................................................................................................................................ 752
2.742.1 (en) key pair................................................................................................................................................. 752
2.742.2 (en) key pair................................................................................................................................................. 752
2.742.3 (en) Key pair................................................................................................................................................. 752
2.742.4 (fr) Bi-clés...................................................................................................................................................... 752
2.742.5 (fr) Bi-clés...................................................................................................................................................... 753
2.743 Parte que se fía........................................................................................................................................................ 753
2.743.1 parte confiante............................................................................................................................................ 753
2.743.2 (en) relying party......................................................................................................................................... 753
2.743.3 (en) Relying party........................................................................................................................................ 753
2.743.4 (fr) participant faisant confiance............................................................................................................. 753
2.744 Pasarela................................................................................................................................................................... 753
2.744.1 Pasarela........................................................................................................................................................ 753
2.744.1 (en) gateway................................................................................................................................................ 753
2.744.2 (en) gateway................................................................................................................................................ 754
2.744.3 (en) Gateway............................................................................................................................................... 754
2.745 Pasarela de
seguridad............................................................................................................................................ 754
2.745.1 Pasarela de seguridad................................................................................................................................ 754
2.745.2 (en) security gateway................................................................................................................................. 754
2.745.3 (en) Security gateway................................................................................................................................. 754
2.745.4 (en) Cloud Security Gateways................................................................................................................... 754
2.745.5 (en) Cloud encryption gateway................................................................................................................. 755
2.746 Patrón de un
ataque.............................................................................................................................................. 755
2.746.1 Patrón de un ataque................................................................................................................................... 755
2.746.2 (en) attack signature.................................................................................................................................. 755
2.746.3 (en) Attack Signature................................................................................................................................. 755
2.746.4 (en) Attack Signature Detection............................................................................................................... 755
2.746.5 (en) Attack signature.................................................................................................................................. 755
2.747 PCI DSS..................................................................................................................................................................... 756
2.747.1 PCI DSS.......................................................................................................................................................... 756
2.747.2 (en) PCI DSS.................................................................................................................................................. 756
2.747.3 (en) PCI DSS.................................................................................................................................................. 756
2.747.4 (fr) PCI DSS.................................................................................................................................................... 756
2.748 PEAP - Protected
Extensible Authentication Protocol...................................................................................... 757
2.748.1 PEAP - Protected Extensible Authentication Protocol.......................................................................... 757
2.748.2 (en) PEAP - Protected Extensible Authentication Protocol.................................................................. 757
2.749 Peligro..................................................................................................................................................................... 757
2.749.1 Peligro........................................................................................................................................................... 757
2.749.2 (en) Hazard................................................................................................................................................... 758
2.749.3 (en) ACCIDENTAL HAZARD......................................................................................................................... 758
2.749.4 (en) INTENTIONAL HAZARD....................................................................................................................... 758
2.749.5 (en) NATURAL HAZARD.............................................................................................................................. 758
2.750 PEM - Privacy
Enhanced Mail................................................................................................................................ 758
2.750.1 PEM............................................................................................................................................................... 758
2.750.2 (en) Privacy Enhanced Mail (PEM)........................................................................................................... 759
2.751 Penetración............................................................................................................................................................. 759
2.751.1 Penetración.................................................................................................................................................. 759
2.751.2 Penetración.................................................................................................................................................. 759
2.751.3 (en) penetrate.............................................................................................................................................. 759
2.751.4 (en) Penetration.......................................................................................................................................... 759
2.752 Perfect forward
secrecy........................................................................................................................................ 759
2.752.1 Perfect forward secrecy............................................................................................................................. 759
2.752.2 (en) perfect forward secrecy..................................................................................................................... 760
2.752.3 (en) Forward secrecy with respect to A................................................................................................... 760
2.752.4 (en) Forward secrecy with respect to both A and B individually......................................................... 760
2.752.5 (en) Mutual forward secrecy..................................................................................................................... 760
2.752.6 (en) Perfect forward secrecy (PFS)........................................................................................................... 760
2.753 Perfilado.................................................................................................................................................................. 760
2.753.1 Perfilado....................................................................................................................................................... 760
2.753.2 (en) Individual profiling.............................................................................................................................. 760
2.754 Perfil de
protección................................................................................................................................................ 761
2.754.1 Perfil de protección..................................................................................................................................... 761
2.754.2 (en) Protection Profile (PP)........................................................................................................................ 761
2.755 Perímetro de
seguridad.......................................................................................................................................... 761
2.755.1 Perímetro de seguridad............................................................................................................................. 761
2.755.2 (en) Electronic Security Perimeter (ESP).................................................................................................. 761
2.755.3 (en) Electronic Security Perimeter (ESP).................................................................................................. 761
2.755.4 (en) External Routable Connectivity........................................................................................................ 762
2.755.5 (en) Physical Security Perimeter............................................................................................................... 762
2.755.6 (en) security perimeter............................................................................................................................... 762
2.755.7 (en) security perimeter............................................................................................................................... 762
2.756 Periodo de
cifrado.................................................................................................................................................. 762
2.756.1 Período de cifrado....................................................................................................................................... 762
2.756.2 (en) Cryptoperiod........................................................................................................................................ 762
2.756.3 (fr) Cryptopériode....................................................................................................................................... 762
2.757 PER - Packet
Encoding Rules................................................................................................................................. 763
2.757.1 PER - Packet Encoding Rules..................................................................................................................... 763
2.757.2 (en) PER - Packet Encoding Rules............................................................................................................. 763
2.758 Personal interno..................................................................................................................................................... 763
2.758.1 Personal interno.......................................................................................................................................... 763
2.758.2 (en) insider.................................................................................................................................................... 763
2.759 PGP - Pretty Good
Privacy..................................................................................................................................... 763
2.759.1 PGP................................................................................................................................................................ 764
2.759.2 Pretty Good Privacy.................................................................................................................................... 764
2.759.3 (en) Pretty Good Privacy............................................................................................................................ 764
2.759.4 (en) PGP - Pretty Good Privacy................................................................................................................. 764
2.759.5 (en) Pretty Good Privacy............................................................................................................................ 764
2.759.6 (fr) Pretty Good Privacy.............................................................................................................................. 764
2.760 Pharming................................................................................................................................................................. 765
2.760.1 Pharming...................................................................................................................................................... 765
2.760.2 Pharming...................................................................................................................................................... 765
2.760.3 (en) Pharming.............................................................................................................................................. 765
2.760.4 (en) Pharming.............................................................................................................................................. 765
2.760.5 (en) Pharming.............................................................................................................................................. 765
2.760.6 (en) Pharming.............................................................................................................................................. 766
2.760.7 (en) Pharming.............................................................................................................................................. 766
2.760.8 (en) Pharming.............................................................................................................................................. 766
2.761 Phishing.................................................................................................................................................................... 766
2.761.1 phishing........................................................................................................................................................ 767
2.761.2 Phishing........................................................................................................................................................ 767
2.761.3 Phishing........................................................................................................................................................ 767
2.761.4 (en) Phishing................................................................................................................................................ 767
2.761.5 phishing........................................................................................................................................................ 767
2.761.6 (en) Phishing................................................................................................................................................ 767
2.761.7 (en) phishing................................................................................................................................................ 768
2.761.8 (en) phishing................................................................................................................................................ 768
2.761.9 (en) Phishing................................................................................................................................................ 768
2.761.10 (en) Phishing................................................................................................................................................ 768
2.761.11 (en) Phishing................................................................................................................................................ 768
2.761.12 (en) Phishing................................................................................................................................................ 768
2.761.13 (en) phishing................................................................................................................................................ 768
2.761.14 (en) Phishing................................................................................................................................................ 769
2.761.15 (en) Phishing................................................................................................................................................ 769
2.762 Phreaking................................................................................................................................................................. 769
2.762.1 Phreaking...................................................................................................................................................... 769
2.762.2 (en) phreaking............................................................................................................................................. 769
2.762.3 (en) Phreaking............................................................................................................................................. 769
2.762.4 (fr) Phreaking............................................................................................................................................... 770
2.763 Piggyback attack..................................................................................................................................................... 770
2.763.1 Piggyback attack......................................................................................................................................... 770
2.763.2 (en) piggyback attack................................................................................................................................. 770
2.764 Ping mortal............................................................................................................................................................. 770
2.764.1 Ping mortal................................................................................................................................................... 770
2.764.2 (en) ping of death........................................................................................................................................ 770
2.764.3 (en) Ping of Death....................................................................................................................................... 771
2.764.4 (en) ping of death........................................................................................................................................ 771
2.765 Piratería................................................................................................................................................................... 771
2.765.1 piratería........................................................................................................................................................ 771
2.765.2 piratear......................................................................................................................................................... 771
2.765.3 (en) piracy..................................................................................................................................................... 771
2.765.4 (en) pirate..................................................................................................................................................... 771
2.765.5 (en) Piracy..................................................................................................................................................... 771
2.766 Pista de
auditoría.................................................................................................................................................... 772
2.766.1 Pista de auditoría........................................................................................................................................ 772
2.766.2 Registro de auditoría de seguridad.......................................................................................................... 772
2.766.3 registro de auditoría de seguridad.......................................................................................................... 772
2.766.1 (en) Audit trail.............................................................................................................................................. 772
2.766.2 (en) security audit trail............................................................................................................................... 772
2.766.3 (en) Security audit trail............................................................................................................................... 772
2.766.4 (fr) journal d'audit de sécurité.................................................................................................................. 773
2.767 PKCS - Public Key
Cryptography Standards......................................................................................................... 773
2.767.1 PKCS - Public Key Cryptography Standards............................................................................................ 773
2.767.2 (en) Public-Key Cryptography Standards (PKCS).................................................................................... 773
2.767.3 (en) PKCS (Public Key Crypto Standards)................................................................................................. 773
2.768 PKCS #5.................................................................................................................................................................... 773
2.768.1 PKCS #5......................................................................................................................................................... 774
2.768.2 (en) PKCS #5................................................................................................................................................. 774
2.769 PKCS #7.................................................................................................................................................................... 774
2.769.1 PKCS #7......................................................................................................................................................... 774
2.769.2 (en) PKCS #7................................................................................................................................................. 774
2.770 PKCS #10.................................................................................................................................................................. 774
2.770.1 PKCS #10....................................................................................................................................................... 774
2.770.2 (en) PKCS #10............................................................................................................................................... 774
2.771 PKCS #11.................................................................................................................................................................. 774
2.771.1 PKCS #11....................................................................................................................................................... 775
2.771.2 (en) PKCS #11............................................................................................................................................... 775
2.772 plaintext................................................................................................................................................................... 775
2.772.1 (en) plain text............................................................................................................................................... 775
2.772.2 (en) Plaintext................................................................................................................................................ 775
2.772.3 (en) plaintext................................................................................................................................................ 775
2.772.4 (en) plaintext................................................................................................................................................ 775
2.772.5 (en) Plaintext................................................................................................................................................ 775
2.773 Plan de
contingencia.............................................................................................................................................. 775
2.773.1 Plan de contingencia.................................................................................................................................. 775
2.773.2 Plan de contingencia.................................................................................................................................. 776
2.773.3 (en) contingency plan................................................................................................................................. 776
2.773.4 (en) contingency plan................................................................................................................................. 776
2.773.5 (en) Contingency plan................................................................................................................................ 776
2.773.6 (en) Contingency planning......................................................................................................................... 776
2.773.7 (en) What is IT contingency planning?.................................................................................................... 776
2.773.8 (en) Contingency Plan................................................................................................................................ 776
2.773.9 (en) contingency plan................................................................................................................................. 777
2.773.10 (en) Contingencia........................................................................................................................................ 777
2.773.11 (en) Contingency Plan (CP)........................................................................................................................ 777
2.774 Plan de
continuidad del negocio (BCP)................................................................................................................ 777
2.774.1 Plan de la
Continuidad del Negocio (BCP).............................................................................................. 777
2.774.2 Plan de continuidad.................................................................................................................................... 777
2.774.3 Plan de
continuidad del negocio (BCP).................................................................................................... 778
2.774.4 (en) Business continuity plan (BCP).......................................................................................................... 778
2.774.5 (en) Business Continuity Plan (BCP)......................................................................................................... 778
2.774.6 (en) Business Continuity Plan (BCP)......................................................................................................... 778
2.774.7 (en) business continuity plan (BCP).......................................................................................................... 778
2.774.8 (en) Business Continuity Plan (BCP)......................................................................................................... 778
2.774.9 (en) Business Continuity Strategy............................................................................................................ 778
2.774.10 (en) Business Recovery Test / Exercise.................................................................................................... 779
2.774.11 (en) Business continuity plan (BCP).......................................................................................................... 779
2.774.12 (en) BCP - Business Continuity Plan......................................................................................................... 779
2.774.13 (en) Business Continuity Plan (BCP)......................................................................................................... 779
2.774.14 (en) Business continuity planning............................................................................................................ 779
2.774.15 (fr) Plan de continuité
du business (BCP)................................................................................................ 779
2.774.16 (fr) Planification de la
continuité des activités....................................................................................... 779
2.775 Plan de
continuidad de operaciones..................................................................................................................... 780
2.775.1 Plan de continuidad de operaciones........................................................................................................ 780
2.775.2 (en) Continuity of operations plan (coop)............................................................................................... 780
2.775.3 (en) COOP - Continuity of Operations Plan............................................................................................. 780
2.776 Plan de
recuperación.............................................................................................................................................. 780
2.776.1 Plan de recuperación.................................................................................................................................. 780
2.776.2 (en) BRP - Business Recovery / Resumption Plan.................................................................................. 780
2.777 Plan de
recuperación de desastres........................................................................................................................ 780
2.777.1 Plan de recuperación de desastres.......................................................................................................... 781
2.777.2 (en) Disaster recovery plan (DRP)............................................................................................................ 781
2.777.3 (en) Disaster recovery plan (DRP)............................................................................................................ 781
2.777.4 (en) DRP - Disaster Recovery Plan............................................................................................................ 781
2.777.5 (en) Disaster Recovery Plan....................................................................................................................... 781
2.777.6 (en) Disaster recovery plan........................................................................................................................ 781
2.777.7 (en) Disaster Recovery Plan (DRP)............................................................................................................ 781
2.777.8 (en) Disaster Recovery Plan (DRP)............................................................................................................ 782
2.778 Plan de seguridad.................................................................................................................................................... 782
2.778.1 Plan de seguridad....................................................................................................................................... 782
2.778.2 (en) System Security Plan........................................................................................................................... 782
2.778.3 (en) Security plan........................................................................................................................................ 782
2.778.4 (en) system security plan........................................................................................................................... 782
2.778.5 (en) Information Security Plan.................................................................................................................. 782
2.779 PMI - Privilege
Management Infrastructure...................................................................................................... 782
2.779.1 infraestructura de gestión de privilegios................................................................................................ 783
2.779.2 (en) privilege management infrastructure............................................................................................. 783
2.779.3 (en) Privilege Management
Infrastructure (PMI).................................................................................. 783
2.779.4 (fr) infrastructure de
gestion de privilège............................................................................................... 783
2.780 Política..................................................................................................................................................................... 783
2.780.1 política.......................................................................................................................................................... 783
2.780.2 política.......................................................................................................................................................... 783
2.780.3 Política.......................................................................................................................................................... 783
2.780.4 Política.......................................................................................................................................................... 784
2.780.5 (en) policy..................................................................................................................................................... 784
2.780.6 (en) policy..................................................................................................................................................... 784
2.780.7 (en) policy..................................................................................................................................................... 784
2.780.8 (en) Policy..................................................................................................................................................... 784
2.780.9 (en) Policy..................................................................................................................................................... 784
2.780.10 (en) Policy..................................................................................................................................................... 784
2.780.11 (fr) Politique................................................................................................................................................. 784
2.781 Política de
certificación......................................................................................................................................... 785
2.781.1 política de certificado................................................................................................................................. 785
2.781.2 (en) certificate policy.................................................................................................................................. 785
2.781.3 (en) certification policy.............................................................................................................................. 785
2.781.4 (en) Certificate policy................................................................................................................................. 785
2.781.5 (fr) politique de certificat........................................................................................................................... 785
2.782 Política de
divulgación........................................................................................................................................... 786
2.782.1 Política de divulgación............................................................................................................................... 786
2.782.2 (en) Disclosure Policy.................................................................................................................................. 786
2.783 Política de firma
electrónica................................................................................................................................. 786
2.783.1 Política de firma electrónica..................................................................................................................... 786
2.783.2 (en) Electronic signature policy................................................................................................................ 786
2.784 Política de
privilegios............................................................................................................................................. 786
2.784.1 política de privilegios.................................................................................................................................. 786
2.784.2 (en) Privilege policy..................................................................................................................................... 786
2.784.3 (fr) politique de privilège........................................................................................................................... 787
2.785 Política de
seguridad.............................................................................................................................................. 787
2.785.1 Política de seguridad.................................................................................................................................. 787
2.785.2 Política de seguridad.................................................................................................................................. 787
2.785.3 Política de Seguridad.................................................................................................................................. 787
2.785.4 Política de seguridad.................................................................................................................................. 787
2.785.5 Política de Seguridad.................................................................................................................................. 787
2.785.6 Política de seguridad.................................................................................................................................. 787
2.785.7 política de seguridad.................................................................................................................................. 788
2.785.8 Política corporativa de seguridad............................................................................................................ 788
2.785.9 Política de seguridad.................................................................................................................................. 788
2.785.10 política de seguridad.................................................................................................................................. 788
2.785.11 Política de
seguridad de los sistemas de información.......................................................................... 788
2.785.1 (en) information security policy................................................................................................................ 788
2.785.2 (en) security policy...................................................................................................................................... 788
2.785.3 (en) security policy...................................................................................................................................... 789
2.785.4 (en) Information Security Policy............................................................................................................... 789
2.785.5 (en) organisational security policy (OSP)................................................................................................ 789
2.785.6 (en) Security policy...................................................................................................................................... 789
2.785.1 (en) Information systems security policy................................................................................................ 789
2.785.2 (en) Organisational security policy.......................................................................................................... 789
2.785.3 (en) security policy...................................................................................................................................... 789
2.785.4 (en) security policy...................................................................................................................................... 789
2.785.5 (en) Corporate Security Policy................................................................................................................... 789
2.785.6 (en) System Security Policy........................................................................................................................ 790
2.785.7 (en) Technical Security Policy.................................................................................................................... 790
2.785.8 (en) Security policy...................................................................................................................................... 790
2.785.9 (en) Identity-based security policy........................................................................................................... 790
2.785.10 (en) Security policy...................................................................................................................................... 790
2.785.11 (en) Security policy...................................................................................................................................... 790
2.785.12 (en) Security policy...................................................................................................................................... 790
2.785.13 (en) Security Policy...................................................................................................................................... 790
2.785.14 (en) Security policy...................................................................................................................................... 791
2.785.15 (fr) Politique de sécurité............................................................................................................................. 791
2.785.16 (fr) Politique de sécurité informatique.................................................................................................... 791
2.785.17 (fr) politique de sécurité............................................................................................................................. 791
2.785.18 (fr) politique de sécurité............................................................................................................................. 791
2.785.19 (fr) Politique de sécurité
de système d'information.............................................................................. 791
2.785.20 (fr) Politique (de sécurité).......................................................................................................................... 792
2.786 Política de
seguridad basada en la identidad....................................................................................................... 792
2.786.1 política de
seguridad basada en la identidad........................................................................................ 792
2.786.2 (en) identity-based security policy........................................................................................................... 792
2.786.3 (en) identity-based security policy........................................................................................................... 792
2.786.4 (en) identity-based security policy........................................................................................................... 792
2.786.5 (fr) politique de
sécurité fondée sur l'identité........................................................................................ 792
2.787 Política de
seguridad basada en reglas................................................................................................................. 792
2.787.1 política de
seguridad basada en reglas................................................................................................... 793
2.787.2 (en) rule-based security policy.................................................................................................................. 793
2.787.3 (en) rule-based security policy.................................................................................................................. 793
2.787.4 (en) rule-based security policy.................................................................................................................. 793
2.787.1 (en) Rule-based security policy................................................................................................................. 793
2.787.2 (fr) politique de
sécurité fondée sur des règles...................................................................................... 793
2.788 Política de
sellos de tiempo.................................................................................................................................... 793
2.788.1 política de sellos de tiempo....................................................................................................................... 793
2.788.2 (en) time-stamping policy.......................................................................................................................... 794
2.789 Política de uso
del e-mail....................................................................................................................................... 794
2.789.1 Política de uso
del e-mail........................................................................................................................... 794
2.789.2 (en) Email Policy.......................................................................................................................................... 794
2.790 Política tipo
muralla china.................................................................................................................................... 794
2.790.1 Política tipo muralla china......................................................................................................................... 794
2.790.2 (en) Chinese wall policy.............................................................................................................................. 794
2.791 Potencial de
ataque................................................................................................................................................ 794
2.791.1 potencial de ataque.................................................................................................................................... 795
2.791.2 (en) attack potential................................................................................................................................... 795
2.791.3 (en) Attack potential................................................................................................................................... 795
2.791.4 (en) Attack potential................................................................................................................................... 795
2.792 PPP -
Point-to-Point Protocol............................................................................................................................. 795
2.792.1 PPP - Point-to-Point Protocol.................................................................................................................... 795
2.792.2 (en) Point-to-Point Protocol (PPP)............................................................................................................ 795
2.793 PPTP - Point-to-Point
Tunneling Protocol......................................................................................................... 796
2.793.1 PPTP - Point-to-Point Tunneling Protocol............................................................................................... 796
2.793.2 (en) Point-to-Point Tunneling Protocol (PPTP)....................................................................................... 796
2.793.3 (en) PPTP (Point-to-Point Tunneling Protocol)....................................................................................... 796
2.793.4 (en) PPTP - Point-to-Point Tunneling Protocol....................................................................................... 796
2.793.5 (en) Point-to-Point Tunneling Protocol (PPTP)....................................................................................... 796
2.793.6 (fr) PPTP - Point to Point Tunneling Protocol......................................................................................... 797
2.794 Practica de
control................................................................................................................................................ 797
2.794.1 Practica de control...................................................................................................................................... 797
2.794.2 Práctica de control...................................................................................................................................... 797
2.794.3 (en) Control practice................................................................................................................................... 797
2.795 Pregunta-respuesta................................................................................................................................................ 797
2.795.1 Pregunta-respuesta.................................................................................................................................... 798
2.795.2 Protocolo pregunta-respuesta.................................................................................................................. 798
2.795.1 (en) Challenge and reply authentication................................................................................................ 798
2.795.2 (en) challenge-response............................................................................................................................. 798
2.795.3 (en) Challenge Response............................................................................................................................ 798
2.795.4 (en) Challenge-response............................................................................................................................ 798
2.795.5 (fr) stimulation/réponse............................................................................................................................ 799
2.796 Prevención de
pérdida de datos............................................................................................................................. 799
2.796.1 Prevención de pérdida de datos............................................................................................................... 799
2.796.2 (en) Data Loss Prevention.......................................................................................................................... 799
2.797 Principal................................................................................................................................................................... 799
2.797.1 Principal........................................................................................................................................................ 799
2.797.2 (en) principal................................................................................................................................................ 799
2.798 Privacidad................................................................................................................................................................ 800
2.798.1 Privacidad..................................................................................................................................................... 800
2.798.2 Privacidad..................................................................................................................................................... 800
2.798.3 privacidad..................................................................................................................................................... 800
2.798.4 (en) privacy................................................................................................................................................... 800
2.798.5 (en) privacy................................................................................................................................................... 801
2.798.6 (en) privacy................................................................................................................................................... 801
2.798.7 (en) Privacy................................................................................................................................................... 801
2.798.8 (en) Privacy................................................................................................................................................... 801
2.798.9 (en) Privacy................................................................................................................................................... 801
2.798.10 (fr) respect de la vie
privée........................................................................................................................ 801
2.799 Privilegio.................................................................................................................................................................. 801
2.799.1 privilegio....................................................................................................................................................... 802
2.799.2 Privilegio....................................................................................................................................................... 802
2.799.3 Privilegio temporal...................................................................................................................................... 802
2.799.4 (en) privilege................................................................................................................................................ 802
2.799.5 (en) privileged account.............................................................................................................................. 802
2.799.6 (en) privileged command........................................................................................................................... 802
2.799.7 (en) privileged process............................................................................................................................... 802
2.799.8 (en) privileged user..................................................................................................................................... 802
2.799.9 (en) privilege................................................................................................................................................ 802
2.799.10 (en) Privilege................................................................................................................................................ 802
2.799.11 (fr) privilège.................................................................................................................................................. 803
2.800 Privilegio mínimo.................................................................................................................................................... 803
2.800.1 mínimo privilegio........................................................................................................................................ 803
2.800.2 Principio de mínimo privilegio.................................................................................................................. 803
2.800.1 (en) least privilege...................................................................................................................................... 803
2.800.2 (en) least privilege...................................................................................................................................... 803
2.800.3 (en) Least privilege...................................................................................................................................... 803
2.800.4 (en) Least Privilege...................................................................................................................................... 804
2.801 Privilegios de
acceso............................................................................................................................................... 804
2.801.1 Derechos de acceso.................................................................................................................................... 804
2.801.2 (en) Access privileges.................................................................................................................................. 804
2.802 Probabilidad de
ocurrencia................................................................................................................................... 804
2.802.1 Probabilidad................................................................................................................................................. 804
2.802.2 probabilidad................................................................................................................................................. 804
2.802.3 (en) likelihood of occurrence..................................................................................................................... 804
2.802.4 (en) probability of occurrence................................................................................................................... 804
2.802.5 (en) Likelihood............................................................................................................................................. 805
2.802.6 (en) PROBABILITY (MATHEMATICAL):..................................................................................................... 805
2.802.7 (fr) vraisemblance....................................................................................................................................... 805
2.802.8 (fr) Vraisemblance...................................................................................................................................... 806
2.803 Procedimiento......................................................................................................................................................... 806
2.803.1 procedimiento.............................................................................................................................................. 806
2.803.2 Procedimiento.............................................................................................................................................. 806
2.803.3 procedimiento.............................................................................................................................................. 806
2.803.4 Procedimiento.............................................................................................................................................. 806
2.803.5 (en) procedure............................................................................................................................................. 806
2.803.6 (en) procedure............................................................................................................................................. 807
2.803.7 (en) Procedure............................................................................................................................................. 807
2.803.8 (en) Procedure............................................................................................................................................. 807
2.803.9 (fr) Procédure............................................................................................................................................... 807
2.804 Procedimiento
operativo....................................................................................................................................... 807
2.804.1 Procedimiento operativo........................................................................................................................... 807
2.804.2 (en) Operating procedure.......................................................................................................................... 807
2.805 Procedimientos
Operativos de Seguridad (POS).................................................................................................. 807
2.805.1 Procedimientos
Operativos de Seguridad (POS).................................................................................... 807
2.805.2 Procedimientos
Operativos de Seguridad (POS).................................................................................... 808
2.805.3 Procedimientos
Operativos de Seguridad (POS).................................................................................... 808
2.806 Proceso.................................................................................................................................................................... 808
2.806.1 proceso.......................................................................................................................................................... 808
2.806.2 (en) process.................................................................................................................................................. 808
2.807 Producto de
seguridad tic..................................................................................................................................... 808
2.807.1 Producto de seguridad TIC........................................................................................................................ 808
2.807.2 (en) IT security product.............................................................................................................................. 808
2.808 Propiedad de la
estrella (*)................................................................................................................................... 808
2.808.1 Propiedad de la estrella (*)....................................................................................................................... 808
2.808.2 (en) *-Property............................................................................................................................................ 809
2.808.3 (en) Star Property........................................................................................................................................ 809
2.808.4 (en) Strong Star Property........................................................................................................................... 809
2.809 Propietario de la
información............................................................................................................................... 809
2.809.1 Propietario de la información................................................................................................................... 809
2.809.2 Responsable del fichero............................................................................................................................. 809
2.809.3 (en) data owner........................................................................................................................................... 809
2.809.4 (en) Propietarios de datos......................................................................................................................... 810
2.809.5 (en) Data owners......................................................................................................................................... 810
2.809.6 (en) owner.................................................................................................................................................... 810
2.809.7 (en) Data Owner.......................................................................................................................................... 810
2.810 Propietario del
riesgo............................................................................................................................................. 810
2.810.1 Dueño del riesgo......................................................................................................................................... 810
2.810.1 dueño del riesgo.......................................................................................................................................... 811
2.810.2 (en) risk owner............................................................................................................................................. 811
2.810.3 (en) Risk owner............................................................................................................................................ 811
2.810.4 (fr) propriétaire du risque.......................................................................................................................... 811
2.811 Protección de
derechos de autor.......................................................................................................................... 811
2.811.1 Protección de derechos de autor.............................................................................................................. 811
2.811.2 DRM............................................................................................................................................................... 811
2.811.3 (en) Digital rights management (DRM).................................................................................................. 811
2.812 Protección del
perímetro....................................................................................................................................... 811
2.812.1 Sistema de protección de perímetro........................................................................................................ 812
2.812.2 (en) boundary.............................................................................................................................................. 812
2.812.3 (en) logical perimeter................................................................................................................................. 812
2.812.4 (en) boundary protection........................................................................................................................... 812
2.812.5 (en) boundary protection device.............................................................................................................. 812
2.812.6 (en) Boundary Protection.......................................................................................................................... 812
2.812.7 (en) Boundary Protection Component (BPC).......................................................................................... 812
2.812.8 (en) Boundary Protection Service (BPS).................................................................................................. 813
2.813 Protocolo de
señales de tráfico........................................................................................................................... 813
2.813.1 Protocolo de señales de tráfico................................................................................................................ 813
2.813.2 (en) Traffic light protocol........................................................................................................................... 813
2.814 Proveedor de
servicios de certificación................................................................................................................ 814
2.814.1 prestador de servicios de certificación.................................................................................................... 814
2.814.2 (en) Certification service provider............................................................................................................ 814
2.815 Proxy (agente)......................................................................................................................................................... 814
2.815.1 proxy.............................................................................................................................................................. 815
2.815.2 Proxy (agente)............................................................................................................................................. 815
2.815.3 Proxy inverso................................................................................................................................................ 815
2.815.4 Proxy transparente..................................................................................................................................... 815
2.815.5 Proxy (agente)............................................................................................................................................. 815
2.815.1 (en) proxy...................................................................................................................................................... 815
2.815.2 (en) proxy agent.......................................................................................................................................... 815
2.815.3 (en) proxy server......................................................................................................................................... 815
2.815.4 (en) proxy...................................................................................................................................................... 815
2.815.5 (en) Proxy Servers....................................................................................................................................... 816
2.815.6 (en) Proxy...................................................................................................................................................... 816
2.815.7 (fr) Proxy....................................................................................................................................................... 816
2.816 Proyecto abierto
de seguridad de aplicaciones web............................................................................................ 816
2.816.1 Proyecto
abierto de seguridad de aplicaciones web............................................................................ 816
2.816.2 (en) OWASP.................................................................................................................................................. 816
2.816.3 (en) Open Web Application Security Project.......................................................................................... 817
2.817 Prueba...................................................................................................................................................................... 817
2.817.1 prueba........................................................................................................................................................... 817
2.817.2 (en) proof...................................................................................................................................................... 817
2.817.3 (en) Proof...................................................................................................................................................... 817
2.817.4 (en) prove..................................................................................................................................................... 817
2.818 Prueba de
posesión.................................................................................................................................................. 818
2.818.1 Prueba de posesión..................................................................................................................................... 818
2.818.2 (en) proof-of-possession protocol............................................................................................................ 818
2.818.3 (en) Proof of possession (POP).................................................................................................................. 818
2.819 Pruebas de
penetración.......................................................................................................................................... 818
2.819.1 Prueba de penetración............................................................................................................................... 818
2.819.2 Pentest.......................................................................................................................................................... 818
2.819.3 Pruebas de penetración............................................................................................................................. 819
2.819.4 Pruebas de penetración............................................................................................................................. 819
2.819.5 (en) Pen test:................................................................................................................................................ 819
2.819.6 (en) Penetration Testing............................................................................................................................ 819
2.819.1 (en) penetration testing............................................................................................................................. 819
2.819.2 (en) penetration test.................................................................................................................................. 819
2.819.3 (en) Penetration testing............................................................................................................................. 819
2.819.4 (en) Penetration testing............................................................................................................................. 820
2.819.5 (en) Penetration Test.................................................................................................................................. 820
2.819.6 (en) penetration testing............................................................................................................................. 820
2.819.7 (en) penetration testing............................................................................................................................. 820
2.819.8 (en) Penetration Testing............................................................................................................................ 820
2.819.9 (en) Penetration testing............................................................................................................................. 820
2.819.10 (en) pen test (penetration testing)........................................................................................................... 821
2.819.11 (fr) Test de pénétration.............................................................................................................................. 822
2.820 Pruebas de
seguridad.............................................................................................................................................. 822
2.820.1 Pruebas de seguridad................................................................................................................................. 822
2.820.2 (en) Security testing.................................................................................................................................... 822
2.821 Pruebas
funcionales............................................................................................................................................... 822
2.821.1 Pruebas funcionales.................................................................................................................................... 822
2.821.2 (en) functional testing................................................................................................................................ 822
2.822 Public-key
forward secrecy................................................................................................................................... 822
2.822.1 Public-key forward secrecy........................................................................................................................ 823
2.822.2 (en) public-key forward secrecy (PFS)...................................................................................................... 823
2.822.3 (en) Public-Key Forward Secrecy (PFS).................................................................................................... 823
2.823 Puerta encubierta................................................................................................................................................... 823
2.823.1 Puerta encubierta....................................................................................................................................... 823
2.823.2 (en) trap door............................................................................................................................................... 823
2.823.3 (en) trap door............................................................................................................................................... 823
2.823.4 (en) Trap door.............................................................................................................................................. 824
2.824 Puerta trasera........................................................................................................................................................ 824
2.824.1 Backdoor....................................................................................................................................................... 824
2.824.2 Puerta trasera.............................................................................................................................................. 824
2.824.3 Puerta trasera.............................................................................................................................................. 824
2.824.1 (en) Back door.............................................................................................................................................. 825
2.824.2 (en) back door.............................................................................................................................................. 825
2.824.3 (en) Backdoor............................................................................................................................................... 825
2.824.4 (en) backdoor............................................................................................................................................... 825
2.824.5 (en) Backdoor............................................................................................................................................... 825
2.824.6 (en) Backdoor............................................................................................................................................... 825
2.824.7 (en) Back door.............................................................................................................................................. 825
2.824.8 (en) Backdoor............................................................................................................................................... 826
2.824.9 (fr) Porte dérobée ou brèche..................................................................................................................... 826
2.824.10 (fr) Porte dérobée, Trappe arrière............................................................................................................ 826
2.825 Puesta a ceros......................................................................................................................................................... 826
2.825.1 Puesta a cero............................................................................................................................................... 826
2.825.2 (en) Zeroize................................................................................................................................................... 827
2.825.3 (en) zero fill.................................................................................................................................................. 827
2.825.4 (en) zeroization............................................................................................................................................ 827
2.825.5 (en) zeroize................................................................................................................................................... 827
2.825.6 (en) zeroize................................................................................................................................................... 827
2.825.7 (en) Zeroization........................................................................................................................................... 827
2.825.8 (en) zeroisation............................................................................................................................................ 827
2.825.9 (en) Zeroization........................................................................................................................................... 827
2.826 Punto de acceso...................................................................................................................................................... 827
2.826.1 Punto de acceso.......................................................................................................................................... 828
2.826.2 (en) Access point......................................................................................................................................... 828
2.827 Punto de acceso
inalámbrico................................................................................................................................. 828
2.827.1 Punto de acceso inalámbrico.................................................................................................................... 828
2.827.2 (en) Wireless Access Point (WAP)............................................................................................................ 828
2.828 Punto de
distribución de CRL................................................................................................................................. 828
2.828.1 punto de
distribución de lista de revocación de certificados.............................................................. 828
2.828.2 (en) distribution point................................................................................................................................ 828
2.828.3 (en) CRL distribution point......................................................................................................................... 828
2.828.4 (fr) point de répartition
de liste CRL........................................................................................................ 828
2.829 PURPLE.................................................................................................................................................................... 829
2.829.1 PURPLE.......................................................................................................................................................... 829
2.829.2 (en) PURPLE.................................................................................................................................................. 829
2.830 RACF - Resource
Access Control Facility............................................................................................................. 829
2.830.1 RACF - Resource Access Control Facility.................................................................................................. 829
2.830.2 (en) RACF...................................................................................................................................................... 829
2.830.3 (fr) RACF - Resource Access Control Facility........................................................................................... 830
2.831 RADIUS - Remote Access Dial-In
User Server....................................................................................................... 830
2.831.1 RADIUS.......................................................................................................................................................... 830
2.831.2 RADIUS.......................................................................................................................................................... 830
2.831.3 (en) RADIUS.................................................................................................................................................. 830
2.831.4 (en) Remote Authentication Dial-In User Service (RADIUS)................................................................. 830
2.831.5 (en) Remote Access Dial-in User Service - RADIUS................................................................................ 831
2.831.6 (fr) RADIUS................................................................................................................................................... 831
2.832 RAID......................................................................................................................................................................... 831
2.832.1 matriz
redundante de discos independientes (RAID)............................................................................ 831
2.832.2 RAID............................................................................................................................................................... 831
2.832.3 (en) RAID....................................................................................................................................................... 831
2.833 Rainbow (tablas
rainbow)..................................................................................................................................... 831
2.833.1 Ataque de tablas rainbow......................................................................................................................... 832
2.833.2 Rainbow Table Attack:............................................................................................................................... 832
2.833.3 (fr) Attaque de tableau arc-en-ciel.......................................................................................................... 832
2.834 ransomware............................................................................................................................................................ 832
2.834.1 ransomware................................................................................................................................................. 832
2.834.2 (en) ransomware......................................................................................................................................... 833
2.834.3 (en) ransomware......................................................................................................................................... 833
2.834.4 (en) ransomware......................................................................................................................................... 833
2.835 RC-2 - Sistema de
cifra de secreto compartido.................................................................................................... 834
2.835.1 RC-2 - Sistema
de cifra de secreto compartido...................................................................................... 834
2.835.2 (en) RC2, RC4, RC5, etc............................................................................................................................... 834
2.835.3 (en) RC-2 - Encryption system based on a shared secret..................................................................... 834
2.836 RC-4 - Sistema de
cifra de secreto compartido.................................................................................................... 834
2.836.1 RC-4 - Sistema
de cifra de secreto compartido...................................................................................... 835
2.836.2 RC4 o ARC4................................................................................................................................................... 835
2.836.3 (en) RC4 (or ARCFOUR).............................................................................................................................. 835
2.837 RC-5 - Sistema de
cifra de secreto compartido.................................................................................................... 835
2.837.1 RC-5 - Sistema
de cifra de secreto compartido...................................................................................... 835
2.837.2 (en) RC-5 - Encryption system based on a shared secret..................................................................... 836
2.838 RC-6 - Sistema de
cifra de secreto compartido.................................................................................................... 836
2.838.1 RC-6 - Sistema
de cifra de secreto compartido...................................................................................... 836
2.838.2 RC-6 - Sistema
de cifra de secreto compartido...................................................................................... 836
2.838.3 RC-6 - Sistema
de cifra de secreto compartido...................................................................................... 836
2.838.4 (en) RC-6 - Encryption system based on a shared secret..................................................................... 836
2.839 Rebajar el nivel........................................................................................................................................................ 837
2.839.1 Rebajar el nivel............................................................................................................................................ 837
2.839.2 (en) downgrade........................................................................................................................................... 837
2.839.3 (en) downgrade attack............................................................................................................................... 837
2.839.4 Downgrade................................................................................................................................................... 837
2.840 Recogida de
pistas de auditoría............................................................................................................................. 837
2.840.1 Registro de auditoría.................................................................................................................................. 837
2.840.2 Recogida de pistas de auditoría............................................................................................................... 838
2.840.3 (en) Audit Log.............................................................................................................................................. 838
2.840.4 (en) audit log................................................................................................................................................ 838
2.840.5 (en) audit reduction tools.......................................................................................................................... 838
2.840.6 (en) audit trail.............................................................................................................................................. 838
2.840.7 (en) audit logging........................................................................................................................................ 838
2.840.8 (fr) Journal d’audit...................................................................................................................................... 838
2.841 recommended.......................................................................................................................................................... 838
2.841.1 (en) SHOULD................................................................................................................................................ 839
2.842 Recorte de
registros............................................................................................................................................... 839
2.842.1 Recorte de registros.................................................................................................................................... 839
2.842.2 (en) Log clipping.......................................................................................................................................... 839
2.843 Recuperación........................................................................................................................................................... 839
2.843.1 Recuperación............................................................................................................................................... 839
2.843.2 (en) Recovery............................................................................................................................................... 839
2.843.3 (en) Recovery action................................................................................................................................... 839
2.843.4 (en) recovery................................................................................................................................................ 840
2.844 Recuperación de
claves........................................................................................................................................... 840
2.844.1 Recuperación de claves.............................................................................................................................. 840
2.844.1 (en) key recovery......................................................................................................................................... 840
2.844.2 (en) key recovery......................................................................................................................................... 840
2.844.3 (en) Key recovery......................................................................................................................................... 840
2.845 Red de confianza..................................................................................................................................................... 840
2.845.1 Red de confianza......................................................................................................................................... 841
2.845.2 (en) web of trust.......................................................................................................................................... 841
2.845.3 (en) Web of Trust........................................................................................................................................ 841
2.846 Red privada
virtual................................................................................................................................................. 841
2.846.1 VPN................................................................................................................................................................ 841
2.846.2 Red Privada Virtual..................................................................................................................................... 841
2.846.3 Red privada virtual...................................................................................................................................... 842
2.846.4 Red Privada Virtual..................................................................................................................................... 842
2.846.5 (en) VPN........................................................................................................................................................ 842
2.846.6 (en) Virtual Private Network (VPN).......................................................................................................... 842
2.846.7 (en) virtual private network (VPN)........................................................................................................... 842
2.846.8 (en) virtual private network...................................................................................................................... 842
2.846.9 (en) Virtual Private Network - VPN.......................................................................................................... 842
2.846.10 (en) Virtual Private Network..................................................................................................................... 842
2.846.11 (en) Virtual Private Networks (VPN)........................................................................................................ 843
2.846.12 (en) Virtual Private Network (VPN).......................................................................................................... 843
2.846.13 (fr) VPN......................................................................................................................................................... 843
2.846.14 (fr) VPN (Virtual Private Network)........................................................................................................... 843
2.846.15 (fr) VPN - Virtual
Private Network (Réseau Privé Virtuel).................................................................... 844
2.847 Red trampa............................................................................................................................................................... 844
2.847.1 Red trampa.................................................................................................................................................. 844
2.847.2 Honey pot..................................................................................................................................................... 844
2.847.3 (en) Honeynet:............................................................................................................................................. 844
2.847.4 (en) Honey net............................................................................................................................................. 844
2.847.5 (en) Honey net............................................................................................................................................. 844
2.847.6 (en) Honeynet.............................................................................................................................................. 845
2.848 reflection_attack................................................................................................................................................... 845
2.848.1 (en) Reflection attack................................................................................................................................. 845
2.849 Registro de
actividad.............................................................................................................................................. 845
2.849.1 registrar........................................................................................................................................................ 845
2.849.2 Registro......................................................................................................................................................... 845
2.849.3 Log................................................................................................................................................................. 846
2.849.4 Logging / log................................................................................................................................................ 846
2.849.5 Trazas de Registro (log)............................................................................................................................. 846
2.849.6 (en) Log:........................................................................................................................................................ 846
2.849.7 (en) Log Management:.............................................................................................................................. 846
2.849.8 (en) Logging................................................................................................................................................. 846
2.849.9 (en) Log......................................................................................................................................................... 846
2.849.10 (fr) Log / Logging......................................................................................................................................... 846
2.850 Registro de
auditoría............................................................................................................................................. 847
2.850.1 Registro de auditoría.................................................................................................................................. 847
2.850.2 Registro de auditoría de seguridad.......................................................................................................... 847
2.850.3 (en) Audit record......................................................................................................................................... 847
2.851 Registro de
claves................................................................................................................................................... 847
2.851.1 Registro de claves....................................................................................................................................... 847
2.851.2 (en) Key registration................................................................................................................................... 848
2.852 Rellenado de
tráfico............................................................................................................................................... 848
2.852.1 Rellenado de tráfico.................................................................................................................................... 848
2.852.2 Tráfico de relleno........................................................................................................................................ 848
2.852.3 relleno de tráfico......................................................................................................................................... 848
2.852.4 (en) traffic padding..................................................................................................................................... 848
2.852.5 (en) Traffic padding.................................................................................................................................... 848
2.852.6 (fr) bourrage................................................................................................................................................ 848
2.853 Renovación del
certificado.................................................................................................................................... 848
2.853.1 Renovación del certificado........................................................................................................................ 849
2.854 Replicación de
discos.............................................................................................................................................. 849
2.854.1 Replicación de discos.................................................................................................................................. 849
2.854.2 (en) Disk Shadowing................................................................................................................................... 849
2.855 Repudio..................................................................................................................................................................... 849
2.855.1 Repudio......................................................................................................................................................... 849
2.855.2 Repudio......................................................................................................................................................... 849
2.855.3 repudio.......................................................................................................................................................... 849
2.855.4 (en) repudiation........................................................................................................................................... 849
2.855.5 (en) Repudiation.......................................................................................................................................... 850
2.855.6 (fr) répudiation............................................................................................................................................ 850
2.856 required................................................................................................................................................................... 850
2.856.1 (en) MUST..................................................................................................................................................... 850
2.857 Resiliencia................................................................................................................................................................ 850
2.857.1 Resiliencia..................................................................................................................................................... 850
2.857.2 resiliencia...................................................................................................................................................... 850
2.857.3 resiliencia:.................................................................................................................................................... 851
2.857.4 Resistencia.................................................................................................................................................... 851
2.857.5 Resistencia.................................................................................................................................................... 851
2.857.6 (en) resilience............................................................................................................................................... 851
2.857.7 (en) Resilience.............................................................................................................................................. 851
2.857.8 (en) resilience............................................................................................................................................... 851
2.857.9 (en) Resilience.............................................................................................................................................. 851
2.857.10 (en) network resilience............................................................................................................................... 851
2.857.11 resilience....................................................................................................................................................... 852
2.857.12 (en) RESILIENCE:.......................................................................................................................................... 852
2.857.13 (en) Resilience.............................................................................................................................................. 852
2.857.14 (en) Resilience.............................................................................................................................................. 852
2.857.15 (en) Resilience.............................................................................................................................................. 852
2.857.16 (en) Resiliency.............................................................................................................................................. 852
2.857.17 (en) Resiliency Testing................................................................................................................................ 852
2.857.18 (fr) résilience................................................................................................................................................ 853
2.857.19 (fr) Résilience............................................................................................................................................... 853
2.858 Resistente a
colisiones............................................................................................................................................ 853
2.858.1 Resistente a colisiones............................................................................................................................... 853
2.858.2 (en) Collision-resistant hash-function...................................................................................................... 853
2.859 Responsable de la
información.............................................................................................................................. 853
2.859.1 responsable de la información................................................................................................................. 853
2.859.2 (en) information owner.............................................................................................................................. 854
2.860 Responsable del
sistema de información.............................................................................................................. 854
2.860.1 responsable del sistema............................................................................................................................. 854
2.860.2 (en) Information System Owner (or Program Manager)..................................................................... 854
2.861 Responsable de
seguridad corporativa................................................................................................................. 854
2.861.1 Responsable de seguridad corporativa................................................................................................... 854
2.861.2 (en) Chief Security Officer (CSO)............................................................................................................... 854
2.861.3 (en) Chief Security Officer (CSO)............................................................................................................... 854
2.862 Responsable de
seguridad de la información....................................................................................................... 855
2.862.1 Responsable de
seguridad de la información........................................................................................ 855
2.862.2 (en) Chief Information Offices (CIO)......................................................................................................... 855
2.862.3 (en) Chief Information Officer................................................................................................................... 855
2.862.4 (en) Chief information officer................................................................................................................... 856
2.863 Responsable de
seguridad de la información....................................................................................................... 856
2.863.1 Responsable de
seguridad de la información........................................................................................ 856
2.863.2 (en) Chief Information Security Officer (CISO)....................................................................................... 856
2.863.3 (en) CISO (chief information security officer)......................................................................................... 856
2.863.4 (en) Chief Information Security Officer................................................................................................... 856
2.863.5 (en) Chief Information Security Offices (CISO)....................................................................................... 856
2.863.6 (en) Senior Agency Information Security Officer (SAISO)..................................................................... 857
2.863.7 (en) Senior (Agency) Information Security Officer................................................................................. 857
2.863.8 (en) Chief Information Security Officer (CISO)....................................................................................... 857
2.864 Responsable de
seguridad del sistema................................................................................................................... 857
2.864.1 Responsable de seguridad del sistema................................................................................................... 857
2.864.2 Jefe de seguridad........................................................................................................................................ 857
2.864.3 (en) information systems security officer (ISSO).................................................................................... 858
2.864.4 (en) system security officer (SSO)............................................................................................................. 858
2.864.5 (en) Security Officer.................................................................................................................................... 858
2.864.6 (fr) Responsable de la sécurité.................................................................................................................. 858
2.865 Restablecimiento
de la seguridad.......................................................................................................................... 858
2.865.1 restablecimiento de seguridad................................................................................................................. 858
2.865.2 (en) Security recovery................................................................................................................................. 858
2.865.3 (fr) rétablissement de la sécurité............................................................................................................. 858
2.866 Restos (buscar
entre los)....................................................................................................................................... 858
2.866.1 Restos (buscar entre los)............................................................................................................................ 858
2.866.2 (en) scavenging........................................................................................................................................... 859
2.866.3 (en) Scavenging........................................................................................................................................... 859
2.867 Resumen
criptográfico........................................................................................................................................... 859
2.867.1 Resumen....................................................................................................................................................... 859
2.867.2 (en) message digest.................................................................................................................................... 859
2.868 Reto.......................................................................................................................................................................... 859
2.868.1 Reto............................................................................................................................................................... 859
2.868.2 (en) Challenge.............................................................................................................................................. 859
2.868.3 (en) Challenge.............................................................................................................................................. 859
2.869 Reutilización............................................................................................................................................................ 859
2.869.1 Reutilización................................................................................................................................................. 860
2.869.2 (en) object reuse.......................................................................................................................................... 860
2.870 Reventado de
contraseñas..................................................................................................................................... 860
2.870.1 Reventado de contraseñas........................................................................................................................ 860
2.870.2 (en) Password Cracking.............................................................................................................................. 860
2.871 Reventar.................................................................................................................................................................. 860
2.872 Revisión de
código................................................................................................................................................... 860
2.872.1 Revisión de código...................................................................................................................................... 860
2.872.2 (en) code review.......................................................................................................................................... 860
2.873 Revocación de una
clave........................................................................................................................................ 861
2.873.1 Revocación de una clave............................................................................................................................ 861
2.873.2 (en) Key revocation..................................................................................................................................... 861
2.874 RFID -
identificación por radio frecuencia........................................................................................................... 861
2.874.1 RFID............................................................................................................................................................... 861
2.874.2 (en) RFID - radio frequency identification............................................................................................... 861
2.875 Riesgo....................................................................................................................................................................... 861
2.875.1 riesgo............................................................................................................................................................. 862
2.875.2 riesgo............................................................................................................................................................. 862
2.875.3 Riesgo............................................................................................................................................................ 862
2.875.4 Riesgos potenciales..................................................................................................................................... 862
2.875.5 Riesgo............................................................................................................................................................ 863
2.875.6 Riesgo............................................................................................................................................................ 863
2.875.7 Riesgo............................................................................................................................................................ 863
2.875.8 Riesgo............................................................................................................................................................ 863
2.875.9 Riesgo acumulado....................................................................................................................................... 863
2.875.10 Riesgo repercutido...................................................................................................................................... 863
2.875.11 Riesgo............................................................................................................................................................ 863
2.875.12 (en) Risk........................................................................................................................................................ 863
2.875.13 (en) risk......................................................................................................................................................... 863
2.875.14 (en) risk......................................................................................................................................................... 864
2.875.15 (en) Business risk......................................................................................................................................... 864
2.875.16 (en) Inherent risk......................................................................................................................................... 864
2.875.17 (en) IT risk..................................................................................................................................................... 864
2.875.18 (en) IT risk issue........................................................................................................................................... 864
2.875.19 (en) RISK........................................................................................................................................................ 864
2.875.20 (en) Risk........................................................................................................................................................ 865
2.875.1 (en) Risk........................................................................................................................................................ 865
2.875.2 (en) risk......................................................................................................................................................... 865
2.875.3 (en) Risk........................................................................................................................................................ 865
2.875.4 (en) Risk........................................................................................................................................................ 866
2.875.5 (en) Risk........................................................................................................................................................ 866
2.875.6 (en) Risk........................................................................................................................................................ 866
2.875.7 (en) Risk........................................................................................................................................................ 866
2.875.8 (en) Risk........................................................................................................................................................ 866
2.875.9 (en) IT-related risk....................................................................................................................................... 866
2.875.10 (en) risk......................................................................................................................................................... 867
2.875.11 (en) risk......................................................................................................................................................... 867
2.875.12 (en) Risk........................................................................................................................................................ 867
2.875.13 (en) Total risk............................................................................................................................................... 867
2.875.14 (en) Risk........................................................................................................................................................ 867
2.875.15 Risk................................................................................................................................................................ 867
2.875.16 (fr) risque...................................................................................................................................................... 868
2.875.17 (fr) Risque..................................................................................................................................................... 868
2.875.18 (fr) Risque..................................................................................................................................................... 868
2.876 Riesgo residual........................................................................................................................................................ 868
2.876.1 Riesgo residual............................................................................................................................................ 868
2.876.2 Riesgos residuales....................................................................................................................................... 868
2.876.3 riesgo residual............................................................................................................................................. 868
2.876.4 (en) residual risk.......................................................................................................................................... 868
2.876.1 (en) Residual risk......................................................................................................................................... 869
2.876.2 (en) residual risk.......................................................................................................................................... 869
2.876.3 (en) Residual risk......................................................................................................................................... 869
2.876.4 (en) Risk indicator....................................................................................................................................... 869
2.876.5 (en) RESIDUAL RISK:.................................................................................................................................... 869
2.876.6 (en) residual risk.......................................................................................................................................... 869
2.876.7 (en) Residual Risk........................................................................................................................................ 869
2.876.8 (en) residual risk.......................................................................................................................................... 869
2.876.9 (fr) risque résiduel....................................................................................................................................... 869
2.877 RIPEMD.................................................................................................................................................................... 870
2.877.1 RIPEMD-160................................................................................................................................................. 870
2.877.2 (en) RIPEMD................................................................................................................................................. 870
2.878 Robo de
identidades................................................................................................................................................ 870
2.878.1 Suplantación de identidad......................................................................................................................... 871
2.878.2 Robo de identidades................................................................................................................................... 871
2.878.3 (en) Identity theft........................................................................................................................................ 871
2.878.4 (en) identity theft........................................................................................................................................ 871
2.878.5 (en) Identity Theft....................................................................................................................................... 871
2.878.6 (en) identity theft........................................................................................................................................ 872
2.879 Robo de sesión......................................................................................................................................................... 872
2.879.1 session hijacking.......................................................................................................................................... 872
2.879.2 (en) Session Hijack Attack.......................................................................................................................... 872
2.879.3 (en) Session Hijacking................................................................................................................................. 872
2.879.4 (en) Session hijacking................................................................................................................................. 872
2.879.5 (en) Session stealing................................................................................................................................... 872
2.879.6 (en) Session Hi-Jacking............................................................................................................................... 873
2.879.7 (en) Session ID............................................................................................................................................. 873
2.879.8 (en) Session Manipulation......................................................................................................................... 873
2.879.9 (en) Session Prediction............................................................................................................................... 873
2.879.10 (en) Session Replay..................................................................................................................................... 873
2.879.11 (en) Hijack Attack........................................................................................................................................ 873
2.880 Rogueware.............................................................................................................................................................. 873
2.880.1 El Rogue Software....................................................................................................................................... 873
2.880.2 (en) Rogueware........................................................................................................................................... 874
2.880.3 (en) Rogue security software.................................................................................................................... 874
2.881 Rojo.......................................................................................................................................................................... 874
2.881.1 rojo................................................................................................................................................................ 874
2.881.2 (en) RED........................................................................................................................................................ 874
2.881.3 (en) Red Network:....................................................................................................................................... 874
2.882 Rol............................................................................................................................................................................ 874
2.882.1 rol................................................................................................................................................................... 874
2.882.2 Rol.................................................................................................................................................................. 875
2.882.3 Rol.................................................................................................................................................................. 875
2.882.4 (en) role......................................................................................................................................................... 875
2.882.5 (en) role......................................................................................................................................................... 875
2.882.6 (en) Role........................................................................................................................................................ 875
2.882.7 (en) role......................................................................................................................................................... 875
2.882.8 (en) role......................................................................................................................................................... 875
2.882.9 (fr) Rôle......................................................................................................................................................... 876
2.883 Rootkit..................................................................................................................................................................... 876
2.883.1 Rootkit........................................................................................................................................................... 876
2.883.2 Rootkit........................................................................................................................................................... 876
2.883.3 (en) Rootkit:................................................................................................................................................. 876
2.883.4 (en) rootkit................................................................................................................................................... 876
2.883.5 (en) Rootkit................................................................................................................................................... 876
2.883.6 (en) Rootkit................................................................................................................................................... 876
2.883.7 (en) Rootkit:................................................................................................................................................. 877
2.883.8 (en) Rootkit................................................................................................................................................... 877
2.883.9 (en) Rootkit................................................................................................................................................... 877
2.883.10 (en) Rootkit................................................................................................................................................... 877
2.883.11 (fr) Rootkit.................................................................................................................................................... 877
2.883.12 (fr) Rootkit.................................................................................................................................................... 878
2.883.13 (fr) Rootkit.................................................................................................................................................... 878
2.884 Router con
filtros.................................................................................................................................................. 878
2.884.1 Router con filtros......................................................................................................................................... 878
2.884.2 (en) filtering router..................................................................................................................................... 878
2.885 RSA - Rivest,
Shamir y Adelman............................................................................................................................. 878
2.885.1 RSA - Rivest, Shamir y Adelman................................................................................................................ 879
2.885.2 RSA - Rivest, Shamir y Adelman................................................................................................................ 879
2.885.3 (en) RSA......................................................................................................................................................... 879
2.885.4 (fr) RSA.......................................................................................................................................................... 879
2.886 S/Key - Secure
Key.................................................................................................................................................... 879
2.886.1 S/Key - Secure Key....................................................................................................................................... 880
2.886.2 (en) S/Key..................................................................................................................................................... 880
2.886.3 (en) S/Key..................................................................................................................................................... 880
2.887 S/MIME - Secure Multipurpose
Mail Extension.................................................................................................. 880
2.887.1 S/MIME......................................................................................................................................................... 880
2.887.2 (en) Secure/Multipurpose Internet Mail Extensions (S/MIME)........................................................... 880
2.887.3 (en) Security/Multipurpose Internet Mail Extensions - S/MIME......................................................... 881
2.887.4 (en) S/MIME (Secure Multipurpose Mail Extension)............................................................................. 881
2.887.5 (fr) S/MIME - Secure Multi-purpose Internet Mail Extensions............................................................ 881
2.888 SAFER - Secure And Fast
Encryption Routine...................................................................................................... 881
2.888.1 SAFER - Secure And Fast Encryption Routine......................................................................................... 881
2.888.2 SAFER............................................................................................................................................................ 881
2.888.3 (en) SAFER.................................................................................................................................................... 881
2.889 Sal............................................................................................................................................................................. 882
2.889.1 Sal.................................................................................................................................................................. 882
2.889.2 (en) Salt......................................................................................................................................................... 882
2.889.3 (en) salt......................................................................................................................................................... 882
2.889.4 (en) salt......................................................................................................................................................... 882
2.889.5 (en) Salt......................................................................................................................................................... 882
2.889.6 (en) Salt......................................................................................................................................................... 882
2.889.7 (fr) Variable d’entrée.................................................................................................................................. 883
2.890 Sala preparada........................................................................................................................................................ 883
2.890.1 Sala operativa.............................................................................................................................................. 883
2.890.2 (en) hot site.................................................................................................................................................. 883
2.890.3 (en) Hot site.................................................................................................................................................. 883
2.891 Sala vacía................................................................................................................................................................. 883
2.891.1 Sala vacía...................................................................................................................................................... 883
2.891.2 (en) cold site................................................................................................................................................. 884
2.891.3 (en) Cold site................................................................................................................................................ 884
2.892 Salvaguarda............................................................................................................................................................ 884
2.892.1 Medida de seguridad.................................................................................................................................. 884
2.892.2 Salvaguarda................................................................................................................................................. 884
2.892.3 Salvaguarda................................................................................................................................................. 884
2.892.4 (en) Safeguards........................................................................................................................................... 884
2.892.5 (en) Security measure................................................................................................................................. 885
2.892.6 (en) Safeguard............................................................................................................................................. 885
2.892.7 (en) Administrative Safeguards................................................................................................................ 885
2.892.8 (en) Physical safeguards............................................................................................................................ 885
2.892.9 (en) Technical safeguards.......................................................................................................................... 885
2.892.10 (fr) Mesure de sécurité............................................................................................................................... 885
2.892.11 (fr) sauvegarde............................................................................................................................................ 885
2.893 SAML........................................................................................................................................................................ 886
2.893.1 SAML............................................................................................................................................................. 886
2.893.2 (en) SAML – Authentication Assertion.................................................................................................... 886
2.893.3 (en) SAML Authentication Assertion........................................................................................................ 886
2.893.4 (en) Security Assertion Markup Language (SAML)................................................................................ 886
2.894 Sandbox.................................................................................................................................................................... 886
2.894.1 Entorno restringido..................................................................................................................................... 886
2.894.2 (en) sandboxing........................................................................................................................................... 886
2.894.3 (en) sandbox................................................................................................................................................ 886
2.894.4 (en) Container or Sandbox......................................................................................................................... 887
2.895 SAS 70...................................................................................................................................................................... 887
2.895.1 SAS 70............................................................................................................................................................ 887
2.895.2 (en) SAS 70 Report...................................................................................................................................... 887
2.896 SATAN - Security Administrator
Tool for Analyzing Networks....................................................................... 887
2.896.1 SATAN........................................................................................................................................................... 887
2.896.2 (en) SATAN................................................................................................................................................... 887
2.897 SCADA...................................................................................................................................................................... 887
2.897.1 SCADA........................................................................................................................................................... 887
2.897.2 (en) Supervisory Control And Data Acquisition...................................................................................... 888
2.897.3 (en) Supervisory Control and Data Acquisition System (SCADA)........................................................ 888
2.897.4 (en) SCADA Systems.................................................................................................................................... 888
2.898 Scam......................................................................................................................................................................... 888
2.898.1 Estafa............................................................................................................................................................ 888
2.898.2 (en) Scams.................................................................................................................................................... 888
2.898.3 (en) 419 Scam.............................................................................................................................................. 888
2.898.4 (en) Internet fraud...................................................................................................................................... 888
2.899 Scareware................................................................................................................................................................ 889
2.899.1 (en) Scareware............................................................................................................................................. 889
2.899.2 (en) scareware............................................................................................................................................. 889
2.899.3 (en) Rogueware........................................................................................................................................... 889
2.900 Script kiddy.............................................................................................................................................................. 889
2.900.1 Script kiddy................................................................................................................................................... 889
2.900.2 (en) script kiddy........................................................................................................................................... 889
2.900.3 (en) Script kiddie.......................................................................................................................................... 890
2.900.4 (en) Script kiddies........................................................................................................................................ 890
2.901 SECOPS - Security
Operating Procedures............................................................................................................ 890
2.902 Secráfono................................................................................................................................................................ 890
2.902.1 Secráfono (scrambler)................................................................................................................................ 890
2.902.2 Secrafonía (scrambling)............................................................................................................................. 890
2.902.3 Secráfono o scrambler............................................................................................................................... 890
2.902.4 (en) Scrambler............................................................................................................................................. 890
2.902.5 (en) scrambler.............................................................................................................................................. 891
2.903 Secreto
compartido................................................................................................................................................ 891
2.903.1 Secreto compartido.................................................................................................................................... 891
2.903.2 (en) Shared secret....................................................................................................................................... 891
2.903.3 (en) Shared secret....................................................................................................................................... 891
2.904 Secreto débil............................................................................................................................................................ 891
2.904.1 Secreto débil................................................................................................................................................ 891
2.904.2 (en) weak secret.......................................................................................................................................... 891
2.905 Secreto perfecto..................................................................................................................................................... 892
2.905.1 Secreto perfecto.......................................................................................................................................... 892
2.905.2 Secreto perfecto.......................................................................................................................................... 892
2.905.3 (en) Perfect Security................................................................................................................................... 892
2.905.4 (en) Unconditional Security....................................................................................................................... 892
2.906 Secuestro................................................................................................................................................................. 892
2.906.1 Secuestro...................................................................................................................................................... 892
2.906.2 (en) hijack attack......................................................................................................................................... 892
2.906.3 (en) Hijack attack........................................................................................................................................ 893
2.907 Secuestro de DNS.................................................................................................................................................... 893
2.907.1 Secuestro de DNS........................................................................................................................................ 893
2.907.2 (en) Domain name hijacking..................................................................................................................... 893
2.908 Secure Shell............................................................................................................................................................. 893
2.908.1 SSH................................................................................................................................................................. 893
2.908.2 Secure Shell.................................................................................................................................................. 893
2.908.3 (en) SSH:........................................................................................................................................................ 894
2.908.4 (en) Secure Shell (SSH)................................................................................................................................ 894
2.908.5 (en) Secure Shell.......................................................................................................................................... 894
2.908.6 (fr) SSH.......................................................................................................................................................... 894
2.909 security_marking.................................................................................................................................................... 894
2.909.1 (en) Security Marking................................................................................................................................. 894
2.909.2 (en) security marking.................................................................................................................................. 894
2.910 Sede alternativa...................................................................................................................................................... 895
2.910.1 Sede alternativa.......................................................................................................................................... 895
2.910.2 (en) Recovery Site........................................................................................................................................ 895
2.910.3 (en) Alternate site....................................................................................................................................... 895
2.911 SEED......................................................................................................................................................................... 895
2.911.1 SEED............................................................................................................................................................... 895
2.911.2 (en) SEED...................................................................................................................................................... 895
2.912 Segementación de
la red......................................................................................................................................... 896
2.912.1 Segmentación de red.................................................................................................................................. 896
2.912.2 (en) Network Segmentation:..................................................................................................................... 896
2.912.3 (fr) Segmentation réseau........................................................................................................................... 896
2.913 Segregación de
tareas............................................................................................................................................ 896
2.913.1 Separación de funciones............................................................................................................................ 896
2.913.2 Separación de funciones............................................................................................................................ 897
2.913.3 (en) Segregation/separation of duties (SoD)......................................................................................... 897
2.913.4 (en) separation of duties............................................................................................................................ 897
2.913.5 (en) Segregation of duties......................................................................................................................... 897
2.913.6 (en) Separation of duties........................................................................................................................... 897
2.913.7 (en) Separation of Duties........................................................................................................................... 897
2.913.8 (fr) Séparation des obligations................................................................................................................. 897
2.914 Seguridad................................................................................................................................................................. 898
2.914.1 Seguridad...................................................................................................................................................... 898
2.914.2 (en) security.................................................................................................................................................. 898
2.914.3 (en) security.................................................................................................................................................. 898
2.914.4 (en) security.................................................................................................................................................. 899
2.914.5 (en) security.................................................................................................................................................. 899
2.914.6 (en) security goal......................................................................................................................................... 899
2.914.7 (en) Security................................................................................................................................................. 899
2.915 Seguridad basada
en el oscurantismo.................................................................................................................. 899
2.915.1 Seguridad basada en el oscurantismo.................................................................................................... 899
2.915.2 (en) security by obscurity........................................................................................................................... 900
2.916 Seguridad
computacional...................................................................................................................................... 900
2.916.1 Computacionalmente seguro.................................................................................................................... 900
2.916.2 Sistema computacionalmente seguro..................................................................................................... 900
2.916.3 Sistema condicionalmente seguro........................................................................................................... 900
2.916.4 Sistema probablemente seguro................................................................................................................ 900
2.916.5 (en) Computational security...................................................................................................................... 900
2.917 Seguridad de la
información................................................................................................................................. 900
2.917.1 Seguridad de la información..................................................................................................................... 900
2.917.2 seguridad de la información..................................................................................................................... 901
2.917.3 seguridad de
las redes y de la información............................................................................................ 901
2.917.4 Seguridad de
las Tecnologías de la Información y las Comunicaciones (STIC)................................. 901
2.917.1 Seguridad
informática................................................................................................................................ 901
2.917.2 Seguridad de
los sistemas de información (SSI).................................................................................... 901
2.917.3 Seguridad de la información..................................................................................................................... 901
2.917.4 Seguridad de la información..................................................................................................................... 902
2.917.5 Seguridad de
los sistemas de información (INFOSEC o SSI)................................................................. 902
2.917.6 (en) information security........................................................................................................................... 902
2.917.1 (en) information systems security (INFOSEC)......................................................................................... 902
2.917.2 (en) data security........................................................................................................................................ 902
2.917.3 (en) information security (INFOSEC)........................................................................................................ 902
2.917.4 (en) data security........................................................................................................................................ 902
2.917.5 (en) Information Security........................................................................................................................... 902
2.917.6 (en) network and information security................................................................................................... 903
2.917.7 (en) Information Security........................................................................................................................... 903
2.917.8 (en) Information security........................................................................................................................... 903
2.917.9 (en) Information Security........................................................................................................................... 903
2.917.1 (en) Information systems security (ISS)................................................................................................... 903
2.917.2 (en) Information Security........................................................................................................................... 903
2.917.3 (en) Information Security........................................................................................................................... 904
2.917.4 (fr) Sécurité des informations................................................................................................................... 904
2.917.5 (fr) Sécurité de l'information..................................................................................................................... 904
2.917.1 (fr) Sécurité des
systèmes d'information (SSI)........................................................................................ 904
2.918 Seguridad de las
emanaciones............................................................................................................................... 904
2.918.1 Seguridad de
las Emanaciones o Seguridad TEMPEST......................................................................... 904
2.918.2 Seguridad de
las emanaciones o Seguridad TEMPEST......................................................................... 904
2.918.3 (en) emanations
security (EMSEC)........................................................................................................... 904
2.918.4 (en) emanations security (EMSEC)........................................................................................................... 905
2.918.5 (en) emission security................................................................................................................................. 905
2.919 Seguridad de las
operaciones................................................................................................................................. 905
2.919.1 Seguridad de las operaciones................................................................................................................... 905
2.919.1 (en) operations security (OPSEC).............................................................................................................. 905
2.919.2 (en) operations security (OPSEC).............................................................................................................. 905
2.920 Seguridad de las
personas...................................................................................................................................... 905
2.920.1 Seguridad de las personas......................................................................................................................... 905
2.920.2 (en) safety..................................................................................................................................................... 906
2.920.3 (en) Safety.................................................................................................................................................... 906
2.921 Seguridad del
personal.......................................................................................................................................... 906
2.921.1 Seguridad del personal............................................................................................................................... 906
2.921.2 (en) personnel security............................................................................................................................... 906
2.921.3 (en) personnel security............................................................................................................................... 906
2.922 Seguridad
discrecional........................................................................................................................................... 906
2.922.1 Seguridad discrecional............................................................................................................................... 906
2.922.2 (en) discretionary security protection..................................................................................................... 906
2.923 Seguridad en las
comunicaciones.......................................................................................................................... 907
2.923.1 Seguridad en las comunicaciones............................................................................................................ 907
2.923.2 Seguridad de
las comunicaciones (COMSEC)......................................................................................... 907
2.923.3 Seguridad criptológica............................................................................................................................... 907
2.923.1 (en) Communications security (COMSEC)............................................................................................... 907
2.923.2 (en) communication security (COMSEC)................................................................................................. 907
2.923.3 (EN) Communications Security (COMSEC).............................................................................................. 908
2.923.4 (en) Communications security (COMSEC)............................................................................................... 908
2.924 Seguridad extremo
a extremo................................................................................................................................ 908
2.924.1 Seguridad extremo a extremo.................................................................................................................. 908
2.924.2 (en) end-to-end security............................................................................................................................. 908
2.925 Seguridad física....................................................................................................................................................... 908
2.925.1 Seguridad física........................................................................................................................................... 908
2.925.2 Seguridad física y del personal................................................................................................................. 908
2.925.3 seguridad física............................................................................................................................................ 909
2.925.4 (en) physical security.................................................................................................................................. 909
2.925.5 (en) physical security.................................................................................................................................. 909
2.925.6 (en) Physical security.................................................................................................................................. 909
2.925.7 (fr) sécurité physique.................................................................................................................................. 909
2.926 Seguridad
gestionada............................................................................................................................................. 909
2.926.1 Seguridad gestionada................................................................................................................................ 909
2.926.2 (en) Managed Security Services Provider (MSSP).................................................................................. 909
2.926.3 (en) managed security service provider (MSSP).................................................................................... 909
2.927 Seguridad incondicional........................................................................................................................................ 910
2.927.1 Incondicionalmente seguro....................................................................................................................... 910
2.927.2 Sistema incondicionalmente seguro u holocríptico.............................................................................. 910
2.927.3 (en) Information-theoretic security......................................................................................................... 910
2.928 Seguridad
operacional........................................................................................................................................... 910
2.928.1 Seguridad operacional............................................................................................................................... 910
2.928.2 (en) operational security............................................................................................................................ 910
2.929 Seguridad
procedimental....................................................................................................................................... 910
2.929.1 Seguridad administrativa y organizativa (Management security)..................................................... 911
2.929.2 (en) procedural security............................................................................................................................. 911
2.930 Seguridad técnica................................................................................................................................................... 911
2.930.1 Seguridad técnica........................................................................................................................................ 911
2.930.2 (en) technical security................................................................................................................................ 911
2.930.3 (en) Technical Security............................................................................................................................... 911
2.930.4 (en) Technical Security Evaluation (TSE)................................................................................................. 912
2.931 Sello......................................................................................................................................................................... 912
2.931.1 sello............................................................................................................................................................... 912
2.931.2 (en) seal........................................................................................................................................................ 912
2.931.3 (fr) scellé....................................................................................................................................................... 912
2.932 sello electrónico..................................................................................................................................................... 913
2.932.1 sello electrónico........................................................................................................................................... 913
2.932.2 sello electrónico avanzado........................................................................................................................ 913
2.932.3 sello electrónico cualificado...................................................................................................................... 913
2.932.4 datos de
creación del sello electrónico................................................................................................... 913
2.932.5 certificado de sello electrónico................................................................................................................. 913
2.932.6 certificado cualificado de sello electrónico............................................................................................ 913
2.932.7 dispositivo de
creación de sello electrónico........................................................................................... 913
2.932.8 dispositivo
cualificado de creación de sello electrónico....................................................................... 913
2.932.9 ¿Qué es un
certificado de Sello de Empresa?......................................................................................... 914
2.932.10 (en) electronic seal...................................................................................................................................... 914
2.932.11 (en) advanced electronic seal................................................................................................................... 914
2.932.12 (en) qualified electronic seal..................................................................................................................... 914
2.932.13 (en) electronic seal creation data............................................................................................................. 914
2.932.14 (en) certificate for electronic seal............................................................................................................ 914
2.932.15 (en) 'qualified certificate for electronic seal........................................................................................... 914
2.932.16 (en) electronic seal creation device......................................................................................................... 914
2.932.17 (en) qualified electronic seal creation device......................................................................................... 915
2.932.18 (fr) cachet électronique.............................................................................................................................. 915
2.932.19 (fr) cachet électronique avancé................................................................................................................ 915
2.932.20 (fr) cachet électronique qualifié............................................................................................................... 915
2.932.21 (fr) données de création
de cachet électronique................................................................................... 915
2.932.22 (fr) certificat de cachet électronique....................................................................................................... 915
2.932.23 (fr) certificat qualifié
de cachet électronique......................................................................................... 915
2.932.24 (fr) dispositif de
création de cachet électronique.................................................................................. 915
2.932.25 (fr) dispositif de création
de cachet électronique qualifié................................................................... 915
2.933 Sello de tiempo........................................................................................................................................................ 916
2.933.1 fechar............................................................................................................................................................ 916
2.933.2 sello de tiempo electrónico....................................................................................................................... 916
2.933.3 sello cualificado de tiempo electrónico................................................................................................... 916
2.933.4 sello de tiempo............................................................................................................................................ 916
2.933.5 Estampilla de tiempo.................................................................................................................................. 916
2.933.6 Marca horaria.............................................................................................................................................. 916
2.933.7 (en) electronic time stamp........................................................................................................................ 917
2.933.8 (en) qualified electronic time stamp........................................................................................................ 917
2.933.9 (en) trusted timestamp.............................................................................................................................. 917
2.933.10 (en) Time stamp.......................................................................................................................................... 917
2.933.11 (en) time stamp........................................................................................................................................... 917
2.933.12 (en) Time-Stamp Protocol.......................................................................................................................... 917
2.933.13 (en) Trusted time-stamp............................................................................................................................ 917
2.933.14 (en) time-stamp renewal........................................................................................................................... 917
2.933.15 (en) Time-stamp token............................................................................................................................... 917
2.933.16 (en) Time-stamp.......................................................................................................................................... 918
2.933.17 (fr) horodatage électronique.................................................................................................................... 918
2.933.18 (fr) horodatage électronique qualifié...................................................................................................... 918
2.934 Semiformal.............................................................................................................................................................. 918
2.934.1 Semiformal................................................................................................................................................... 918
2.934.2 (en) semiformal........................................................................................................................................... 918
2.935 Semilla (1)................................................................................................................................................................ 918
2.935.1 Semilla........................................................................................................................................................... 918
2.935.2 Semilla o clave
generadora de claves...................................................................................................... 918
2.935.3 (en) seed key................................................................................................................................................ 918
2.935.4 (en) seed....................................................................................................................................................... 919
2.936 Sensibilidad.............................................................................................................................................................. 919
2.936.1 sensibilidad................................................................................................................................................... 919
2.936.2 Sensibilidad.................................................................................................................................................. 919
2.936.3 sensibilidad................................................................................................................................................... 919
2.936.4 (en) sensitivity.............................................................................................................................................. 919
2.936.5 (en) Sensitivity............................................................................................................................................. 919
2.936.6 (en) Sensitivity............................................................................................................................................. 919
2.936.7 (fr) sensibilité............................................................................................................................................... 919
2.936.8 (fr) sensibilité............................................................................................................................................... 919
2.937 Serpent..................................................................................................................................................................... 920
2.937.1 Serpent.......................................................................................................................................................... 920
2.937.2 (en) Serpent.................................................................................................................................................. 920
2.938 Servicio de
autenticación....................................................................................................................................... 920
2.938.1 Servicio de autenticación........................................................................................................................... 920
2.938.2 (en) authentication service........................................................................................................................ 920
2.939 servicio de
confianza.............................................................................................................................................. 920
2.939.1 servicio de confianza.................................................................................................................................. 920
2.939.2 servicio de confianza cualificado.............................................................................................................. 921
2.939.3 prestador de servicios de confianza......................................................................................................... 921
2.939.4 prestador
cualificado de servicios de confianza.................................................................................... 921
2.939.5 (en) trust
service.......................................................................................................................................... 921
2.939.6 (en) qualified
trust service......................................................................................................................... 921
2.939.7 (en) trust
service provider.......................................................................................................................... 921
2.939.8 (en) qualified
trust service provider......................................................................................................... 921
2.939.9 (fr) service de
confiance............................................................................................................................. 921
2.939.10 (fr) service de
confiance qualifié.............................................................................................................. 922
2.939.11 (fr) prestataire de
services de confiance................................................................................................. 922
2.939.12 (fr) prestataire de
services de confiance qualifié.................................................................................. 922
2.940 servicio de
entrega electrónica certificada......................................................................................................... 922
2.940.1 servicio de entrega electrónica certificada............................................................................................. 922
2.940.2 servicio
cualificado de entrega electrónica certificada........................................................................ 922
2.940.3 (en) electronic registered delivery service.............................................................................................. 922
2.940.4 (en) qualified electronic registered delivery service............................................................................. 923
2.940.5 (fr) service d'envoi recommandé électronique...................................................................................... 923
2.940.6 (fr) service d'envoi
recommandé électronique qualifié........................................................................ 923
2.941 Servicio de
fechado electrónico............................................................................................................................ 923
2.941.1 Servicio de fechado electrónico................................................................................................................ 923
2.941.2 (en) Time-stamping service (TSS)............................................................................................................. 923
2.941.3 (en) time stamping service........................................................................................................................ 923
2.942 Servicio de
seguridad.............................................................................................................................................. 923
2.942.1 Servicio de seguridad.................................................................................................................................. 923
2.942.2 Servicio de seguridad.................................................................................................................................. 924
2.942.3 servicio de seguridad.................................................................................................................................. 924
2.942.4 (en) security service.................................................................................................................................... 924
2.942.5 (en) Security service.................................................................................................................................... 924
2.942.6 (fr) service de sécurité................................................................................................................................ 924
2.943 SET - Secure
Electronic Transactions.................................................................................................................. 924
2.943.1 SET: Secure Electronic Transaction.......................................................................................................... 924
2.943.2 (en) Secure Electronic Transactions (SET)............................................................................................... 925
2.943.3 (fr) SET - Secure Electronic Transactions................................................................................................. 925
2.944 Seudoaleatorio....................................................................................................................................................... 925
2.944.1 Seudoaleatorio............................................................................................................................................ 925
2.944.2 (en) pseudorandom.................................................................................................................................... 925
2.945 Seudónimo............................................................................................................................................................... 925
2.945.1 Seudónimo.................................................................................................................................................... 925
2.945.2 (en) pseudonym........................................................................................................................................... 926
2.946 S-FTP........................................................................................................................................................................ 926
2.946.1 S-FTP.............................................................................................................................................................. 926
2.946.2 (en) S-FTP...................................................................................................................................................... 926
2.946.3 (fr) S-FTP....................................................................................................................................................... 926
2.947 SHACAL.................................................................................................................................................................... 926
2.947.1 SHACAL.......................................................................................................................................................... 926
2.947.2 (en) SHACAL................................................................................................................................................. 926
2.948 shall......................................................................................................................................................................... 927
2.948.1 (en) MUST..................................................................................................................................................... 927
2.948.2 (en) shall....................................................................................................................................................... 927
2.949 shall_not................................................................................................................................................................. 927
2.949.1 (en) MUST NOT............................................................................................................................................ 927
2.950 SHA - Secure Hash
Algorithm................................................................................................................................ 927
2.950.1 Algoritmo de autenticación seguro......................................................................................................... 927
2.950.2 SHA-1............................................................................................................................................................. 928
2.950.3 SHA................................................................................................................................................................ 928
2.950.4 (en) SHA hash functions............................................................................................................................. 928
2.951 Shim (System Health and
Intrusion Monitoring)................................................................................................ 929
2.951.1 Shim (System Health and Intrusion Monitoring)................................................................................... 929
2.951.2 (en) Shim....................................................................................................................................................... 929
2.952 should...................................................................................................................................................................... 929
2.952.1 (en) SHOULD................................................................................................................................................ 929
2.952.2 (en) should.................................................................................................................................................... 929
2.953 should not............................................................................................................................................................... 929
2.953.1 (en) SHOULD NOT....................................................................................................................................... 929
2.954 Shoulder surfing.................................................................................................................................................... 930
2.954.1 Shoulder surfing.......................................................................................................................................... 930
2.954.2 (en) shoulder surfing.................................................................................................................................. 930
2.954.3 (en) shoulder surfing.................................................................................................................................. 930
2.955 sidejacking................................................................................................................................................................ 930
2.955.1 Sidejacking................................................................................................................................................... 930
2.955.2 (en) CAPEC-102: SessionSidejacking........................................................................................................ 930
2.955.3 (en) Sidejacking........................................................................................................................................... 931
2.955.4 (en) Sidejacking........................................................................................................................................... 931
2.956 Sin clasificar............................................................................................................................................................ 931
2.956.1 Unclassified ("Sin clasificar")..................................................................................................................... 931
2.956.2 (en) unclassified........................................................................................................................................... 931
2.956.3 (en) Unclassified.......................................................................................................................................... 931
2.956.4 (en) unclassified........................................................................................................................................... 932
2.956.5 (fr) Non classifié (Unclassified)................................................................................................................. 932
2.957 SM3.......................................................................................................................................................................... 932
2.957.1 SM3................................................................................................................................................................ 932
2.957.2 (en) SM3....................................................................................................................................................... 932
2.958 Single sign-on.......................................................................................................................................................... 932
2.958.1 Single sign-on............................................................................................................................................... 932
2.958.2 (en) single sign-on....................................................................................................................................... 933
2.958.3 (en) Single sign-on....................................................................................................................................... 933
2.958.4 (en) single sign-on....................................................................................................................................... 933
2.958.5 (fr) Single Sign On........................................................................................................................................ 933
2.959 Sistema..................................................................................................................................................................... 934
2.959.1 sistema.......................................................................................................................................................... 934
2.959.1 sistema.......................................................................................................................................................... 934
2.959.1 Sistema......................................................................................................................................................... 934
2.959.2 (en) system................................................................................................................................................... 934
2.959.3 (en) SYSTEM................................................................................................................................................. 934
2.959.4 (en) system................................................................................................................................................... 934
2.959.5 (en) computer system................................................................................................................................. 935
2.959.1 (en) system................................................................................................................................................... 935
2.959.1 (en) Subsystem............................................................................................................................................ 935
2.959.2 (en) System................................................................................................................................................... 935
2.959.3 (en) system administrator (SA)................................................................................................................. 935
2.959.4 (en) System Administrator......................................................................................................................... 936
2.959.5 (en) system owner....................................................................................................................................... 936
2.959.6 (en) System Owner...................................................................................................................................... 936
2.960 Sistema de
alimentación ininterrumpida.............................................................................................................. 936
2.960.1 Sistema de alimentación ininterrumpida................................................................................................ 936
2.960.2 (en) Uninterruptible Power Supply - UPS................................................................................................ 937
2.960.3 (fr) UPS (Alimentation
non interruptible)............................................................................................... 937
2.961 Sistema de cifra....................................................................................................................................................... 937
2.961.1 Sistema de cifra........................................................................................................................................... 937
2.961.2 (en) encryption system............................................................................................................................... 937
2.961.3 (en) encipherment system......................................................................................................................... 937
2.962 Sistema de cifra
asimétrica..................................................................................................................................... 937
2.962.1 Sistema de cifra asimétrica....................................................................................................................... 937
2.962.2 (en) Asymmetric encipherment system................................................................................................... 938
2.962.3 (en) Asymmetric encipherment system................................................................................................... 938
2.963 Sistema de
detección de intrusiones...................................................................................................................... 938
2.963.1 IDS.................................................................................................................................................................. 938
2.963.2 Sistema de detección de intrusiones....................................................................................................... 938
2.963.3 IDS.................................................................................................................................................................. 938
2.963.4 IDS.................................................................................................................................................................. 939
2.963.5 (en) Intrusion Detection Systems (IDS).................................................................................................... 939
2.963.6 (en) Intrusion Detection Systems (IDS), (host-based)........................................................................... 939
2.963.7 (en) Intrusion Detection Systems (IDS), (network-based).................................................................... 939
2.963.8 (en) intrusion detection system (IDS)...................................................................................................... 939
2.963.9 (en) intrusion detection.............................................................................................................................. 940
2.963.10 (en) Application-Based Intrusion Detection and Prevention System................................................. 940
2.963.11 (en) Host-Based Intrusion Detection and Prevention System............................................................. 940
2.963.12 (en) Intrusion Detection............................................................................................................................. 940
2.963.13 (en) Intrusion Detection and Prevention................................................................................................. 940
2.963.14 (en) Intrusion Detection System............................................................................................................... 940
2.963.15 (en) Network-Based Intrusion Detection and Prevention System...................................................... 940
2.963.16 (en) Network Behavior Analysis System.................................................................................................. 941
2.963.17 (en) Wireless Intrusion Detection and Prevention System................................................................... 941
2.963.18 (en) intrusion detection.............................................................................................................................. 941
2.963.19 (en) intrusion detection system (IDS)...................................................................................................... 941
2.963.20 (en) Intrusion Detection System (IDS)...................................................................................................... 941
2.963.21 (en) IDS.......................................................................................................................................................... 941
2.963.22 (en) Intrusion Prevention System............................................................................................................. 941
2.963.23 (en) Intrusion Detection System............................................................................................................... 941
2.963.1 (en) HIDS: Host IDS..................................................................................................................................... 942
2.963.2 (en) HIPS: Host IPS...................................................................................................................................... 942
2.963.3 (en) HIDS/NIDS (host intrusion detection systems and network intrusion
detection systems)..... 942
2.963.4 (en) Network-Based IDS............................................................................................................................. 942
2.963.5 (en) Intrusion Detection............................................................................................................................. 943
2.963.6 (en) Intrusion Detection............................................................................................................................. 943
2.963.7 (fr) IDS........................................................................................................................................................... 943
2.963.8 (fr) détection d'intrusion............................................................................................................................ 943
2.964 Sistema de firma
asimétrica................................................................................................................................... 943
2.964.1 Sistema de firma asimétrica..................................................................................................................... 943
2.964.2 (en) Asymmetric signature system........................................................................................................... 944
2.965 Sistema de
gestión................................................................................................................................................... 944
2.965.1 sistema de gestión...................................................................................................................................... 944
2.965.1 (en) management system.......................................................................................................................... 944
2.966 Sistema de
gestión de la seguridad de la información (SGSI)............................................................................. 944
2.966.1 Sistema de
Gestión de la Seguridad de Información (ISMS)................................................................ 944
2.966.2 (en) Information Security Management System (ISMS)....................................................................... 945
2.966.3 (en) Information security management system (ISMS)........................................................................ 945
2.966.4 (fr) Systéme de Gestion
de la Sécurité Informatique (ISMS)................................................................ 945
2.967 Sistema de
información.......................................................................................................................................... 945
2.967.1 Sistema de información............................................................................................................................. 945
2.967.2 Sistema de Información............................................................................................................................. 945
2.967.3 Sistema de información............................................................................................................................. 945
2.967.4 Sistema de las
Tecnologías de la Información y las Comunicaciones................................................ 945
2.967.5 Sistema de información............................................................................................................................. 946
2.967.6 Sistema de información............................................................................................................................. 946
2.967.7 Sistema de información (SI)....................................................................................................................... 946
2.967.8 sistema de información.............................................................................................................................. 946
2.967.9 Sistemas de información............................................................................................................................ 946
2.967.10 Sistema de información (IT)...................................................................................................................... 946
2.967.11 (en) information system............................................................................................................................. 946
2.967.12 (en) Information Technology.................................................................................................................... 947
2.967.13 (en) information system............................................................................................................................. 947
2.967.1 (en) information system (IS)...................................................................................................................... 947
2.967.2 (en) information system............................................................................................................................. 947
2.967.3 (en) Information System (IS)..................................................................................................................... 947
2.967.4 (en) Information System............................................................................................................................ 947
2.967.5 (en) Information system (IS)...................................................................................................................... 948
2.967.6 (en) Système d'information (SI)................................................................................................................ 948
2.967.7 (en) Information system............................................................................................................................ 948
2.967.8 (en) information system............................................................................................................................. 948
2.967.9 (en) Information system............................................................................................................................ 948
2.967.10 (en) Information System............................................................................................................................ 948
2.967.11 (en) Information system............................................................................................................................ 948
2.967.12 (fr) Système d’information........................................................................................................................ 948
2.967.13 (fr) système d'information......................................................................................................................... 949
2.967.14 (fr) Système d'information........................................................................................................................ 949
2.967.15 (fr) Système d'information........................................................................................................................ 949
2.968 Sistema de
prevención de intrusiones................................................................................................................... 949
2.968.1 IPS.................................................................................................................................................................. 949
2.968.2 Sistema de prevención de intrusiones..................................................................................................... 949
2.968.3 (en) Intrusion Prevention........................................................................................................................... 950
2.968.4 (en) Intrusion Prevention System............................................................................................................. 950
2.968.5 (en) intrusion prevention system (IPS).................................................................................................... 950
2.968.6 (en) IPS.......................................................................................................................................................... 950
2.968.7 (en)IPS Intrusion Prevention System........................................................................................................ 950
2.968.8 (en) Intrusion prevention system............................................................................................................. 950
2.968.9 (en) NIDS: Network IDS.............................................................................................................................. 950
2.968.10 (en) NIPS: Network IPS............................................................................................................................... 950
2.968.11 (fr) IPS............................................................................................................................................................ 951
2.969 Sistema de
prevención de intrusiones en la red.................................................................................................... 951
2.969.1 IPS.................................................................................................................................................................. 951
2.969.2 (en) network intrusion protection system (NIPS).................................................................................. 951
2.970 Sistema seguro
multinivel...................................................................................................................................... 951
2.970.1 Sistema seguro multinivel......................................................................................................................... 951
2.970.1 (en) multilevel security (MLS).................................................................................................................... 952
2.970.2 (en) multilevel secure (MLS)...................................................................................................................... 952
2.970.3 (en) Multilevel secure................................................................................................................................. 952
2.971 Sistema trampa........................................................................................................................................................ 952
2.971.1 Sistema trampa........................................................................................................................................... 952
2.971.2 Máquina trampa (honeypot).................................................................................................................... 952
2.971.3 Tarro de miel................................................................................................................................................ 952
2.971.4 (en) Honeypot:............................................................................................................................................. 953
2.971.5 (en) honeypot.............................................................................................................................................. 953
2.971.6 (en) honey pot............................................................................................................................................. 953
2.971.7 (en) Honeypot.............................................................................................................................................. 953
2.971.8 (en) Honey pot............................................................................................................................................. 953
2.971.9 (en) Honey pot............................................................................................................................................. 953
2.971.10 (en) Honey pot............................................................................................................................................. 953
2.971.11 (en) entrapment.......................................................................................................................................... 954
2.971.12 (fr) Pot de miel............................................................................................................................................. 954
2.972 Skipjack..................................................................................................................................................................... 954
2.972.1 Skipjack......................................................................................................................................................... 954
2.972.2 SKIPJACK....................................................................................................................................................... 954
2.972.3 (en) SKIPJACK............................................................................................................................................... 954
2.972.4 (en) Skipjack (cipher).................................................................................................................................. 954
2.973 SKIP - Simple Key Management
for Internet Protocols..................................................................................... 954
2.973.1 SKIP - Simple Key Management for Internet Protocols........................................................................ 955
2.973.2 (en) Simple Key Management for Internet Protocols (SKIP)................................................................ 955
2.974 Smurf....................................................................................................................................................................... 955
2.974.1 Ataque smurf............................................................................................................................................... 955
2.974.2 (en) Smurf..................................................................................................................................................... 955
2.974.3 (fr) Smurfing................................................................................................................................................. 955
2.975 Sneakernet............................................................................................................................................................... 955
2.975.1 Sneakernet................................................................................................................................................... 956
2.975.2 (en) Sneakernet........................................................................................................................................... 956
2.975.3 (en) sneaker net.......................................................................................................................................... 956
2.976 Snefru...................................................................................................................................................................... 956
2.976.1 Snefru............................................................................................................................................................ 956
2.976.2 (en) Snefru.................................................................................................................................................... 956
2.977 Sniffer...................................................................................................................................................................... 956
2.977.1 Monitor de Red............................................................................................................................................ 957
2.977.1 sniffer............................................................................................................................................................ 957
2.977.2 (en) Sniffer:................................................................................................................................................... 957
2.977.3 (en) sniffer.................................................................................................................................................... 957
2.977.4 (en) packet sniffer....................................................................................................................................... 957
2.977.5 (en) sniffing.................................................................................................................................................. 957
2.977.6 (en) Sniffer.................................................................................................................................................... 957
2.977.7 (en) Sniffing.................................................................................................................................................. 958
2.977.8 (en) sniffing.................................................................................................................................................. 958
2.977.9 (en) sniffing.................................................................................................................................................. 958
2.977.10 (fr) renifleur.................................................................................................................................................. 958
2.978 Solicitante............................................................................................................................................................... 958
2.978.1 Solicitante..................................................................................................................................................... 958
2.978.2 (en) Applicant.............................................................................................................................................. 958
2.979 Solicitante del
sello de tiempo.............................................................................................................................. 958
2.979.1 solicitante del sello de tiempo.................................................................................................................. 959
2.979.2 (en) time-stamp requester........................................................................................................................ 959
2.980 Soporte.................................................................................................................................................................... 959
2.980.1 Soporte.......................................................................................................................................................... 959
2.980.2 (en) media.................................................................................................................................................... 959
2.980.3 (en) Media.................................................................................................................................................... 959
2.980.4 (en) Medium................................................................................................................................................ 959
2.980.5 (en) Media.................................................................................................................................................... 959
2.981 SOX
Sarbanes-Oxley Act........................................................................................................................................ 959
2.981.1 Ley
Sarbanes-Oxley (Ley SOX)................................................................................................................... 960
2.981.2 (en) SOX........................................................................................................................................................ 960
2.981.3 (en) SOX........................................................................................................................................................ 960
2.982 Spam......................................................................................................................................................................... 960
2.982.1 SPAM............................................................................................................................................................. 961
2.982.2 Correo basura.............................................................................................................................................. 961
2.982.3 (en) Spam..................................................................................................................................................... 961
2.982.4 (en) Spam..................................................................................................................................................... 961
2.982.5 (en) spam...................................................................................................................................................... 961
2.982.6 (en) spam...................................................................................................................................................... 961
2.982.7 (en) spamming............................................................................................................................................. 961
2.982.8 (en) Spam..................................................................................................................................................... 961
2.982.9 (en) Spam..................................................................................................................................................... 962
2.982.10 (en) Spamming............................................................................................................................................ 962
2.982.11 (en) Spam..................................................................................................................................................... 962
2.982.12 (en) Spam..................................................................................................................................................... 962
2.982.13 (fr) Spam....................................................................................................................................................... 962
2.982.14 (fr) Spam....................................................................................................................................................... 962
2.982.15 (fr) Spamming.............................................................................................................................................. 962
2.983 Spear phishing.......................................................................................................................................................... 963
2.983.1 Spear phishing............................................................................................................................................. 963
2.983.2 (en) Spear phishing..................................................................................................................................... 963
2.983.3 (en) Spear phishing..................................................................................................................................... 963
2.983.4 (en) spear phishing:.................................................................................................................................... 963
2.984 SPKI - Simple
Public Key Infrastructure............................................................................................................... 963
2.984.1 SPKI - Simple Public Key Infrastructure.................................................................................................... 964
2.984.2 (en) Simple Public Key
Infrastructure (SPKI)........................................................................................... 964
2.985 Spyware.................................................................................................................................................................... 964
2.985.1 Spyware........................................................................................................................................................ 964
2.985.2 Spyware........................................................................................................................................................ 964
2.985.3 Spyware........................................................................................................................................................ 964
2.985.4 Software espía............................................................................................................................................. 964
2.985.1 (en) Spyware................................................................................................................................................ 965
2.985.2 (en) spyware................................................................................................................................................ 965
2.985.3 (en) spyware................................................................................................................................................ 965
2.985.4 (en) Spyware................................................................................................................................................ 965
2.985.5 (en) Spyware Detection and Removal Utility......................................................................................... 965
2.985.6 (en) Spyware................................................................................................................................................ 965
2.985.7 (en) Spyware................................................................................................................................................ 965
2.985.8 (en) Spyware................................................................................................................................................ 966
2.985.9 (en) Spyware................................................................................................................................................ 966
2.985.10 (en) Spyware................................................................................................................................................ 966
2.985.11 (fr) Spyware.................................................................................................................................................. 966
2.985.12 (fr) Spyware.................................................................................................................................................. 966
2.986 srs............................................................................................................................................................................. 967
2.986.1 (en) SRS - security requirements statement........................................................................................... 967
2.987 SSH - Secure
Shell................................................................................................................................................... 967
2.987.1 SSH................................................................................................................................................................. 967
2.987.2 (en) Secure Shell.......................................................................................................................................... 967
2.987.3 (en) Secure Shell (SSH)................................................................................................................................ 967
2.987.4 (fr) SSH.......................................................................................................................................................... 968
2.987.5 (fr) SSH - Secure Shell................................................................................................................................. 968
2.988 SSL - Secure
Sockets Layer...................................................................................................................................... 968
2.988.1 SSL.................................................................................................................................................................. 968
2.988.2 SSL - Secure Sockets Layer......................................................................................................................... 968
2.988.3 (en) SSL.......................................................................................................................................................... 968
2.988.4 (en) Secure Sockets Layer (SSL)................................................................................................................. 969
2.988.5 (en) Secure Sockets Layer.......................................................................................................................... 969
2.988.6 (en) Secure Sockets Layer (SSL)................................................................................................................. 969
2.988.7 (fr) SSL........................................................................................................................................................... 969
2.988.8 (fr) SSL (Secure Socket Layer).................................................................................................................... 969
2.988.9 (fr) SSL - Secure Socket Layer.................................................................................................................... 969
2.989 Stuxnet..................................................................................................................................................................... 970
2.989.1 (en) Stuxnet:................................................................................................................................................. 970
2.989.2 (en) Stuxnet.................................................................................................................................................. 970
2.989.3 (en) Stuxnet.................................................................................................................................................. 970
2.990 Supercifrado............................................................................................................................................................ 970
2.990.1 cifrado producto.......................................................................................................................................... 970
2.990.1 (en) superencryption.................................................................................................................................. 971
2.990.2 (en) superencryption.................................................................................................................................. 971
2.991 Supervisión de la
integridad de archivos.............................................................................................................. 971
2.991.1 Supervisión de
la integridad de archivos................................................................................................ 971
2.991.2 (en) File Integrity Monitoring:.................................................................................................................. 971
2.991.3 (fr) Contrôle de
l’intégrité des fichiers..................................................................................................... 971
2.992 Suplantación........................................................................................................................................................... 971
2.992.1 suplantar...................................................................................................................................................... 971
2.992.2 Suplantación................................................................................................................................................ 972
2.992.3 Spoofing........................................................................................................................................................ 972
2.992.4 (en) Spoofing................................................................................................................................................ 972
2.992.5 (en) spoofing................................................................................................................................................ 972
2.992.6 (en) spoofing................................................................................................................................................ 973
2.992.7 (en) Spoof..................................................................................................................................................... 973
2.992.8 (en) Spoof..................................................................................................................................................... 973
2.992.9 (en) Spoofing................................................................................................................................................ 973
2.992.10 (en) Content spoofing................................................................................................................................. 973
2.992.11 (fr) Spoofing................................................................................................................................................. 973
2.993 Suplantación de
DNS.............................................................................................................................................. 973
2.993.1 Suplantación de DNS.................................................................................................................................. 973
2.993.2 (en) DNS spoofing....................................................................................................................................... 974
2.994 Suplantación IP....................................................................................................................................................... 974
2.994.1 Falsificación de dirección IP....................................................................................................................... 974
2.994.2 IP spoofing.................................................................................................................................................... 974
2.994.3 IP spoofing.................................................................................................................................................... 974
2.994.4 (en) IP Address Spoofing:........................................................................................................................... 974
2.994.5 (en) IP spoofing............................................................................................................................................ 974
2.994.6 (fr) Usurpation d’adresse IP...................................................................................................................... 975
2.995 Sustitución.............................................................................................................................................................. 975
2.995.1 Sustitución.................................................................................................................................................... 975
2.995.2 Sustitución homofónica (Homophonic substitucion)............................................................................ 975
2.995.3 Sustitución monoalfabeto (Monoalphabetic subtitucion)................................................................... 975
2.995.4 Sustitución polialfabeto (Polyalphabetic substitution)........................................................................ 975
2.995.5 Sustitución poligrámica (Polygramic substitution)............................................................................... 975
2.995.6 Sustitución.................................................................................................................................................... 975
2.995.7 (en) substitution.......................................................................................................................................... 976
2.996 SYN flood................................................................................................................................................................ 976
2.996.1 Syn flood....................................................................................................................................................... 976
2.996.2 TCP SYN attack............................................................................................................................................ 976
2.996.3 (en) SYN flood.............................................................................................................................................. 976
2.996.4 (en) SYN Flood.............................................................................................................................................. 976
2.996.5 (en) SYN flood.............................................................................................................................................. 976
2.996.6 (fr) SYN Flood............................................................................................................................................... 977
2.997 TACACS - Terminal Access
Controller Access Control System......................................................................... 977
2.997.1 TACACS.......................................................................................................................................................... 977
2.997.2 TACACS.......................................................................................................................................................... 977
2.997.3 (en) Terminal Access Controller (TAC) Access Control System (TACACS).......................................... 977
2.997.4 (en) TACACS+............................................................................................................................................... 977
2.997.5 (en) TACACS.................................................................................................................................................. 978
2.997.6 (fr) TACACS................................................................................................................................................... 978
2.998 Tarjeta con
circuitos integrados.......................................................................................................................... 978
2.999 Tarjeta
inteligente.................................................................................................................................................. 978
2.999.1 Tarjeta inteligente...................................................................................................................................... 978
2.999.2 (en) smart card............................................................................................................................................ 978
2.999.3 (en) smart token.......................................................................................................................................... 979
2.999.4 (fr) Carte à puce.......................................................................................................................................... 979
2.1000 TCSEC - Trusted Computer
System Evaluation Criteria................................................................................ 979
2.1000.1 TCSEC............................................................................................................................................................. 979
2.1000.2 TCSEC - Trusted Computer System Evaluation Criteria........................................................................ 980
2.1000.3 (en) DoD Trusted Computer System Evaluation Criteria (TCSEC)....................................................... 980
2.1000.4 (en) TCSEC..................................................................................................................................................... 980
2.1001 Teardrop............................................................................................................................................................. 980
2.1001.1 Teardrop....................................................................................................................................................... 981
2.1001.2 (en) teardrop attack................................................................................................................................... 981
2.1002 Técnicas
avanzadas de evasión......................................................................................................................... 981
2.1002.1 Técnicas avazanzadas de evasión............................................................................................................ 981
2.1002.2 (en) advanced evasion technique (AET).................................................................................................. 981
2.1003 Técnica
criptográfica asimétrica..................................................................................................................... 981
2.1003.1 Técnicas criptográficas asimétricas......................................................................................................... 981
2.1003.2 Técnica criptográfica asimétrica.............................................................................................................. 981
2.1003.3 (en) asymmetric cryptographic technique.............................................................................................. 982
2.1003.4 (en) asymmetric cryptographic technique.............................................................................................. 982
2.1003.5 (en) Asymmetric cryptographic technique............................................................................................. 982
2.1003.6 (en) Asymmetric cryptographic technique............................................................................................. 982
2.1003.7 (en) Asymmetric cryptography technique.............................................................................................. 982
2.1003.8 (fr) Chiffrement asymétrique.................................................................................................................... 983
2.1004 Técnica
criptográfica simétrica....................................................................................................................... 983
2.1004.1 Técnica criptográfica simétrica................................................................................................................ 983
2.1004.2 (en) symmetric cryptographic technique................................................................................................ 983
2.1004.3 (en) symmetric cryptographic technique................................................................................................ 983
2.1004.4 (en) Symmetric cryptographic technique................................................................................................ 984
2.1004.5 (en) symmetric cryptographic technique................................................................................................ 984
2.1004.6 (fr) Technique cryptographique symétrique........................................................................................... 984
2.1005 TEMPEST............................................................................................................................................................ 984
2.1005.1 TEMPEST....................................................................................................................................................... 984
2.1005.2 Certificación Tempest................................................................................................................................. 984
2.1005.3 (en) TEMPEST............................................................................................................................................... 984
2.1005.4 (en) TEMPEST zone..................................................................................................................................... 985
2.1005.5 (en) TEMPEST............................................................................................................................................... 985
2.1005.6 (en) TEMPEST............................................................................................................................................... 985
2.1005.7 (en) TEMPEST............................................................................................................................................... 985
2.1006 Tercera parte..................................................................................................................................................... 985
2.1006.1 Tercero(s)...................................................................................................................................................... 985
2.1006.2 (en) Third Party............................................................................................................................................ 985
2.1006.3 (fr) Tierce partie.......................................................................................................................................... 985
2.1007 Tercera parte
de confianza............................................................................................................................... 986
2.1007.1 Tercera Parte Fiable................................................................................................................................... 986
2.1007.2 Tercera parte confiable.............................................................................................................................. 986
2.1007.3 tercera parte confiable.............................................................................................................................. 986
2.1007.4 (en) Trusted third party.............................................................................................................................. 986
2.1007.5 (en) trusted third party (TTP).................................................................................................................... 986
2.1007.6 (en) Trusted third party.............................................................................................................................. 987
2.1007.7 (en) trusted third party.............................................................................................................................. 987
2.1007.8 (en) Trusted third party.............................................................................................................................. 987
2.1007.9 (fr) tierce partie de confiance................................................................................................................... 987
2.1008 Tercero
interpuesto.......................................................................................................................................... 987
2.1008.1 man-in-the-middle...................................................................................................................................... 987
2.1008.2 (en) Man-in-the-Middle Attack (MitM)................................................................................................... 987
2.1008.3 (en) Man-in-the-Middle Attack (MitM)................................................................................................... 987
2.1008.4 (en) man-in-the-middle attack................................................................................................................. 987
2.1008.5 (en) active man-in-the-middle attack (MitM)........................................................................................ 988
2.1008.6 (en) Man in the Middle Attack.................................................................................................................. 988
2.1008.7 (en) Man-in-the-middle.............................................................................................................................. 988
2.1008.8 (en) Man-in-the-Middle Attack................................................................................................................. 988
2.1008.9 (fr) Middleperson (Man in the middle).................................................................................................... 988
2.1009 Terminación de
soportes de información........................................................................................................ 988
2.1009.1 Terminación de soportes de información............................................................................................... 988
2.1009.2 (en) media sanitization.............................................................................................................................. 989
2.1009.3 (en) sanitization........................................................................................................................................... 989
2.1009.4 (en) sanitize.................................................................................................................................................. 989
2.1009.5 (en) Media Sanitization.............................................................................................................................. 989
2.1009.6 (en) Sanitize.................................................................................................................................................. 989
2.1009.7 (en) Disintegration...................................................................................................................................... 989
2.1009.8 (en) Incineration.......................................................................................................................................... 989
2.1009.9 (en) Melting................................................................................................................................................. 989
2.1009.10 (en) Overwrite........................................................................................................................................ 989
2.1009.11 (en) Physical Destruction...................................................................................................................... 989
2.1009.12 (en) Pulverization................................................................................................................................... 990
2.1009.13 (en) Secure Erase................................................................................................................................... 990
2.1009.14 (en) Shred................................................................................................................................................ 990
2.1010 Texto cifrado..................................................................................................................................................... 990
2.1010.1 Texto cifrado................................................................................................................................................ 990
2.1010.2 Texto cifrado o cripto................................................................................................................................. 990
2.1010.1 (en) Cipher text / ciphertext...................................................................................................................... 990
2.1010.2 (en) cipher text............................................................................................................................................ 991
2.1010.3 (en) Ciphertext............................................................................................................................................. 991
2.1010.4 (en) ciphertext............................................................................................................................................. 991
2.1010.5 (en) Ciphertext............................................................................................................................................. 991
2.1010.6 (en) Ciphertext............................................................................................................................................. 991
2.1011 Texto cifrado
elegido dinámicamente............................................................................................................. 991
2.1011.1 Texto cifrado elegido dinámicamente..................................................................................................... 991
2.1011.2 (en) Adaptive chosen ciphertext............................................................................................................... 991
2.1012 Texto en claro.................................................................................................................................................... 992
2.1012.1 Texto en claro.............................................................................................................................................. 992
2.1012.2 Texto claro.................................................................................................................................................... 992
2.1012.3 texto claro.................................................................................................................................................... 992
2.1012.4 (en) clear text............................................................................................................................................... 992
2.1012.5 (en) cleartext................................................................................................................................................ 992
2.1012.6 (en) Cleartext............................................................................................................................................... 992
2.1012.7 (fr) texte en clair.......................................................................................................................................... 992
2.1013 Texto en claro
elegido dinámicamente............................................................................................................ 992
2.1013.1 Texto en claro elegido dinámicamente................................................................................................... 993
2.1013.2 (en) Adaptive chosen plaintext................................................................................................................. 993
2.1014 TKIP -
Temporal Key Integrity Protocol.......................................................................................................... 993
2.1014.1 TKIP - Temporal Key Integrity Protocol................................................................................................... 993
2.1014.2 (en) TKIP (Temporal Key Integrity Protocol)........................................................................................... 993
2.1015 TLS -
Transport Layer Security......................................................................................................................... 993
2.1015.1 TLS.................................................................................................................................................................. 994
2.1015.2 TLS - Transport Layer Security................................................................................................................... 994
2.1015.3 (en) TLS......................................................................................................................................................... 994
2.1015.4 (en) Transport Layer Security Protocol - TLS.......................................................................................... 994
2.1015.5 (en) Transport Layer Security (TLS).......................................................................................................... 994
2.1015.6 (fr) TLS........................................................................................................................................................... 994
2.1016 Token................................................................................................................................................................... 994
2.1016.1 token............................................................................................................................................................. 995
2.1016.2 Token............................................................................................................................................................. 995
2.1016.1 (en) Token..................................................................................................................................................... 995
2.1016.2 (en) token..................................................................................................................................................... 995
2.1016.3 (en) token..................................................................................................................................................... 995
2.1016.4 (fr) Token...................................................................................................................................................... 996
2.1016.5 (fr) Token...................................................................................................................................................... 996
2.1017 Token
criptográfico.......................................................................................................................................... 996
2.1017.1 Token criptográfico..................................................................................................................................... 996
2.1017.2 Token criptográfico..................................................................................................................................... 996
2.1017.3 (en) Cryptographic Token.......................................................................................................................... 997
2.1017.4 (en) cryptographic token........................................................................................................................... 997
2.1018 Token de
autentificación.................................................................................................................................. 997
2.1018.1 testigo de autenticación; testigo.............................................................................................................. 997
2.1018.2 Token de autentificación........................................................................................................................... 997
2.1018.3 (en) identity token....................................................................................................................................... 997
2.1018.4 (en) Authentication token.......................................................................................................................... 997
2.1018.5 (fr) jeton d'authentification (jeton).......................................................................................................... 997
2.1019 Token de
seguridad............................................................................................................................................ 997
2.1019.1 testigo de seguridad................................................................................................................................... 998
2.1019.2 (en) Security token...................................................................................................................................... 998
2.1019.3 (fr) jeton de sécurité................................................................................................................................... 998
2.1020 Tokenization....................................................................................................................................................... 998
2.1020.1 Tokenization................................................................................................................................................. 998
2.1020.2 (en) Tokenization........................................................................................................................................ 998
2.1020.3 (en) Tokenization........................................................................................................................................ 998
2.1020.4 (en) Tokenization........................................................................................................................................ 999
2.1021 Tolerancia a
fallos............................................................................................................................................ 999
2.1021.1 Tolerancia a fallos....................................................................................................................................... 999
2.1021.2 (en) Fault tolerance.................................................................................................................................... 999
2.1022 Tolerancia al
riesgo.......................................................................................................................................... 999
2.1022.1 actitud ante el riesgo.................................................................................................................................. 999
2.1022.2 apetito por el riesgo................................................................................................................................... 999
2.1022.3 aversión al riesgo........................................................................................................................................ 999
2.1022.4 tolerancia al riesgo..................................................................................................................................... 999
2.1022.5 (en) risk appetite......................................................................................................................................... 999
2.1022.6 (en) risk attitude....................................................................................................................................... 1000
2.1022.7 (en) risk aversion....................................................................................................................................... 1000
2.1022.8 (en) risk tolerance..................................................................................................................................... 1000
2.1022.9 (en) risk tolerance..................................................................................................................................... 1000
2.1022.10 (en) Risk appetite................................................................................................................................. 1000
2.1022.11 (en) Risk tolerance............................................................................................................................... 1000
2.1022.12 (en) RISK TOLERANCE.......................................................................................................................... 1000
2.1022.13 (fr) attitude face au risque................................................................................................................. 1000
2.1022.14 (fr) aversion pour le risque................................................................................................................. 1000
2.1022.15 (fr) goût du risque............................................................................................................................... 1000
2.1022.16 (fr) tolérance au risque....................................................................................................................... 1001
2.1023 TRANSEC -
Seguridad de las transmisiones.................................................................................................. 1001
2.1023.1 Seguridad de
las transmisiones (TRANSEC)......................................................................................... 1001
2.1023.2 (en) transmission security (TRANSEC)................................................................................................... 1001
2.1023.3 (en) transmission security (TRANSEC)................................................................................................... 1001
2.1024 Transporte de
claves....................................................................................................................................... 1001
2.1024.1 Transporte de claves................................................................................................................................ 1001
2.1024.2 (en) key transport (algorithm or protocol)........................................................................................... 1002
2.1024.3 (en) Key transport..................................................................................................................................... 1002
2.1024.4 (en) key transport..................................................................................................................................... 1002
2.1024.5 (en) electronic key transport................................................................................................................... 1002
2.1024.6 (en) Key transport..................................................................................................................................... 1002
2.1025 Transposición.................................................................................................................................................. 1002
2.1025.1 Transposición............................................................................................................................................. 1002
2.1025.2 Transposición o permutación................................................................................................................. 1003
2.1025.3 (en) transposition..................................................................................................................................... 1003
2.1025.4 (en) Transposition..................................................................................................................................... 1003
2.1025.5 (en) Transposition Cipher........................................................................................................................ 1003
2.1026 Tratamiento
del riesgo................................................................................................................................... 1003
2.1026.1 tratamiento del riesgo:............................................................................................................................ 1003
2.1026.2 tratamiento del riesgo............................................................................................................................. 1004
2.1026.3 Tratamiento de riesgos............................................................................................................................ 1004
2.1026.4 Evitación de riesgos.................................................................................................................................. 1004
2.1026.5 Optimización de riesgos.......................................................................................................................... 1004
2.1026.6 Transferencia de riesgos.......................................................................................................................... 1004
2.1026.7 evitación del riesgo................................................................................................................................... 1004
2.1026.8 reparto del riesgo..................................................................................................................................... 1004
2.1026.9 financiación del riesgo............................................................................................................................. 1005
2.1026.10 retención del riesgo............................................................................................................................. 1005
2.1026.11 (en) risk treatment.............................................................................................................................. 1005
2.1026.12 (en) risk treatment.............................................................................................................................. 1005
2.1026.13 (en) risk avoidance.............................................................................................................................. 1006
2.1026.14 (en) RISK AVOIDANCE......................................................................................................................... 1006
2.1026.15 (en) risk sharing................................................................................................................................... 1006
2.1026.16 (en) risk financing................................................................................................................................ 1006
2.1026.17 (en) risk retention................................................................................................................................ 1006
2.1026.18 (fr) traitement du risque.................................................................................................................... 1006
2.1026.19 (fr) refus du risque............................................................................................................................... 1007
2.1026.20 (fr) partage du risque.......................................................................................................................... 1007
2.1026.21 (fr) financement du risque................................................................................................................. 1007
2.1026.22 (fr) prise de risque............................................................................................................................... 1007
2.1026.23 (fr) Traitement des risques................................................................................................................ 1007
2.1026.24 (fr) Transfert de risques...................................................................................................................... 1008
2.1027 Trazabilidad
(imputabilidad).......................................................................................................................... 1008
2.1027.1 Imputabilidad............................................................................................................................................ 1008
2.1027.2 Trazabilidad............................................................................................................................................... 1008
2.1027.3 Responsabilidad........................................................................................................................................ 1008
2.1027.4 Responsabilidad........................................................................................................................................ 1008
2.1027.5 trazabilidad................................................................................................................................................ 1008
2.1027.6 imputabilidad............................................................................................................................................ 1008
2.1027.1 (en) accountability.................................................................................................................................... 1008
2.1027.2 (en)individual accountability.................................................................................................................. 1008
2.1027.3 (en) accountability.................................................................................................................................... 1009
2.1027.4 (en) Accountability................................................................................................................................... 1009
2.1027.5 (en) accountability.................................................................................................................................... 1009
2.1027.6 (en) accountability.................................................................................................................................... 1009
2.1027.7 (en) Accountability................................................................................................................................... 1009
2.1027.8 (fr) Imputabilité......................................................................................................................................... 1009
2.1028 Triple DES......................................................................................................................................................... 1009
2.1028.1 Triple DES................................................................................................................................................... 1009
2.1028.2 Triple DES................................................................................................................................................... 1009
2.1028.3 (en) triple DES (3DES)............................................................................................................................... 1010
2.1028.4 (en) Triple Data Encryption Algorithm.................................................................................................. 1010
2.1028.5 (en) Triple DES........................................................................................................................................... 1010
2.1029 Troyano............................................................................................................................................................ 1010
2.1030 TrueCrypt......................................................................................................................................................... 1010
2.1030.1 truecrypt..................................................................................................................................................... 1010
2.1030.2 (en) truecrypt............................................................................................................................................. 1010
2.1031 Truncamiento.................................................................................................................................................. 1011
2.1031.1 Truncamiento............................................................................................................................................ 1011
2.1031.2 (en) Truncation:........................................................................................................................................ 1011
2.1031.3 (fr) Troncature........................................................................................................................................... 1011
2.1032 Túnel................................................................................................................................................................. 1011
2.1032.1 túnel............................................................................................................................................................ 1011
2.1032.2 (en) tunneling............................................................................................................................................ 1011
2.1032.3 (en) tunnel.................................................................................................................................................. 1011
2.1032.4 (en) tunnel.................................................................................................................................................. 1012
2.1032.5 (en) Tunnel................................................................................................................................................. 1012
2.1032.6 (fr) Tunneling............................................................................................................................................. 1012
2.1033 Twofish............................................................................................................................................................. 1012
2.1033.1 Twofish....................................................................................................................................................... 1012
2.1033.2 (en) Twofish............................................................................................................................................... 1012
2.1033.3 (en) Twofish............................................................................................................................................... 1013
2.1034 Vacuna.............................................................................................................................................................. 1013
2.1034.1 Vacuna........................................................................................................................................................ 1013
2.1034.2 Vacunación................................................................................................................................................ 1013
2.1034.3 (en) Vaccine............................................................................................................................................... 1013
2.1035 validación......................................................................................................................................................... 1013
2.1035.1 validación................................................................................................................................................... 1013
2.1035.2 Validación.................................................................................................................................................. 1013
2.1035.3 (en) validation........................................................................................................................................... 1014
2.1035.4 (en) validation........................................................................................................................................... 1014
2.1035.5 (en) validation........................................................................................................................................... 1014
2.1035.6 (fr) validation............................................................................................................................................. 1014
2.1036 Validación de
certificados.............................................................................................................................. 1014
2.1036.1 validación de certificado......................................................................................................................... 1014
2.1036.2 (en) certificate validation........................................................................................................................ 1014
2.1036.3 (en) Certificate validation........................................................................................................................ 1015
2.1036.4 (en) path validation.................................................................................................................................. 1015
2.1036.5 (fr) validation de certificat...................................................................................................................... 1015
2.1037 Validar.............................................................................................................................................................. 1015
2.1037.1 Validación.................................................................................................................................................. 1015
2.1037.2 validación................................................................................................................................................... 1015
2.1037.3 (en) validate............................................................................................................................................... 1015
2.1037.4 (en) Validation........................................................................................................................................... 1016
2.1038 Valor................................................................................................................................................................ 1016
2.1038.1 Valor............................................................................................................................................................ 1016
2.1038.2 Valor (de un activo).................................................................................................................................. 1016
2.1038.3 Valor acumulado....................................................................................................................................... 1016
2.1038.4 (en) Value................................................................................................................................................... 1016
2.1038.5 (en) Value................................................................................................................................................... 1016
2.1038.6 (en) information value............................................................................................................................. 1016
2.1038.7 (en) Asset value......................................................................................................................................... 1017
2.1039 Valoración....................................................................................................................................................... 1017
2.1039.1 Evaluación.................................................................................................................................................. 1017
2.1039.2 Valorar........................................................................................................................................................ 1017
2.1039.3 (en) Assessment........................................................................................................................................ 1017
2.1039.4 (en) Assessment........................................................................................................................................ 1017
2.1039.5 (en) Assessment........................................................................................................................................ 1017
2.1039.6 (fr) Évaluation............................................................................................................................................ 1017
2.1040 Valor de
inicialización.................................................................................................................................... 1017
2.1040.1 Valor de inicialización.............................................................................................................................. 1018
2.1040.2 Vector de inicialización............................................................................................................................ 1018
2.1040.3 (en) initialization value (IV)..................................................................................................................... 1018
2.1040.4 (en) Initialization vector (IV)................................................................................................................... 1018
2.1040.5 (en) Initialization value............................................................................................................................ 1018
2.1041 Valor resumen................................................................................................................................................. 1018
2.1041.1 Valor resumen........................................................................................................................................... 1018
2.1041.2 (en) Hash value......................................................................................................................................... 1018
2.1041.3 (en) hash-value.......................................................................................................................................... 1018
2.1042 verificación...................................................................................................................................................... 1019
2.1042.1 Verificación................................................................................................................................................ 1019
2.1042.2 (en) verification......................................................................................................................................... 1019
2.1042.3 (en) verification......................................................................................................................................... 1019
2.1043 Verificación
de firma....................................................................................................................................... 1019
2.1043.1 Verificación de forma............................................................................................................................... 1019
2.1043.2 (en) verification process.......................................................................................................................... 1019
2.1043.3 (en) Message signature verification...................................................................................................... 1019
2.1044 Verificación
visual.......................................................................................................................................... 1019
2.1044.1 Verificación visual..................................................................................................................................... 1020
2.1044.2 (en) Visual Verification............................................................................................................................ 1020
2.1045 Verificador....................................................................................................................................................... 1020
2.1045.1 Verificador................................................................................................................................................. 1020
2.1045.2 (en) Verifier................................................................................................................................................ 1020
2.1045.3 (en) Verifier................................................................................................................................................ 1020
2.1045.4 (en) Verifier................................................................................................................................................ 1020
2.1045.5 (en) verifier................................................................................................................................................ 1020
2.1046 Verificador
del sello de tiempo...................................................................................................................... 1020
2.1046.1 verificador del sello de tiempo............................................................................................................... 1021
2.1046.2 (en) time-stamp verifier........................................................................................................................... 1021
2.1047 Verificador de
privilegios............................................................................................................................... 1021
2.1047.1 verificador de privilegios......................................................................................................................... 1021
2.1047.2 (en) Privilege verifier................................................................................................................................ 1021
2.1047.3 (fr) vérificateur de privilège.................................................................................................................... 1021
2.1048 Verificar........................................................................................................................................................... 1021
2.1048.1 Verificación................................................................................................................................................ 1021
2.1048.2 verificación................................................................................................................................................. 1022
2.1048.3 (en) verify................................................................................................................................................... 1022
2.1048.4 (en) verification......................................................................................................................................... 1022
2.1048.5 (en) Verification........................................................................................................................................ 1022
2.1049 Virus................................................................................................................................................................. 1022
2.1049.1 Virus............................................................................................................................................................ 1022
2.1049.2 Virus............................................................................................................................................................ 1022
2.1049.3 Virus polimórfico....................................................................................................................................... 1022
2.1049.4 Virus solapado........................................................................................................................................... 1023
2.1049.5 (en) Virus.................................................................................................................................................... 1023
2.1049.6 (en) Virus.................................................................................................................................................... 1023
2.1049.7 (en) virus..................................................................................................................................................... 1023
2.1049.8 (en) virus..................................................................................................................................................... 1023
2.1049.9 (en) Virus.................................................................................................................................................... 1023
2.1049.10 (en) Virus............................................................................................................................................... 1023
2.1049.11 (en) virus............................................................................................................................................... 1023
2.1049.12 (en) Virus............................................................................................................................................... 1024
2.1049.13 (en) Virus............................................................................................................................................... 1024
2.1049.14 (en) Viruses........................................................................................................................................... 1024
2.1049.15 (en) Macro virus................................................................................................................................... 1024
2.1049.16 (en) Polymorphic Virus....................................................................................................................... 1024
2.1049.17 (en) Retrovirus..................................................................................................................................... 1024
2.1049.18 (fr) Virus informatique........................................................................................................................ 1024
2.1049.19 (fr) Métamorphique (Virus)............................................................................................................... 1025
2.1049.20 (fr) Polymorphe (Virus)....................................................................................................................... 1025
2.1050 Vulnerabilidad................................................................................................................................................. 1025
2.1050.1 vulnerable.................................................................................................................................................. 1025
2.1050.2 vulnerabilidad:.......................................................................................................................................... 1025
2.1050.3 vulnerabilidad:.......................................................................................................................................... 1025
2.1050.4 Vulnerabilidad........................................................................................................................................... 1026
2.1050.5 Vulnerabilidad........................................................................................................................................... 1026
2.1050.6 Vulnerabilidad........................................................................................................................................... 1026
2.1050.7 Vulnerabilidad........................................................................................................................................... 1026
2.1050.8 Vulnerabilidad........................................................................................................................................... 1026
2.1050.9 vulnerabilidad............................................................................................................................................ 1026
2.1050.10 Vulnerabilidad...................................................................................................................................... 1026
2.1050.11 Vulnerabilidad...................................................................................................................................... 1026
2.1050.12 Vulnerabilidad...................................................................................................................................... 1026
2.1050.13 Vulnerabilidad...................................................................................................................................... 1027
2.1050.14 (en) vulnerability.................................................................................................................................. 1027
2.1050.1 (en) Vulnerability:..................................................................................................................................... 1027
2.1050.2 (en) Vulnerability Assessment:............................................................................................................... 1027
2.1050.3 (en) Vulnerability...................................................................................................................................... 1027
2.1050.4 (en) vulnerability analysis....................................................................................................................... 1027
2.1050.5 (en) vulnerability assessment................................................................................................................. 1027
2.1050.6 (en) vulnerability....................................................................................................................................... 1027
2.1050.7 (en) VULNERABILITY................................................................................................................................. 1028
2.1050.8 (en) VULNERABILITY ASSESSMENT........................................................................................................ 1028
2.1050.9 (en) Vulnerability:..................................................................................................................................... 1028
2.1050.10 (en) Vulnerability................................................................................................................................. 1028
2.1050.11 (en) Vulnerability event...................................................................................................................... 1028
2.1050.12 (en) vulnerability.................................................................................................................................. 1028
2.1050.13 (en) Vulnerability................................................................................................................................. 1029
2.1050.14 (en) Vulnerability................................................................................................................................. 1029
2.1050.15 (en) vulnerability.................................................................................................................................. 1029
2.1050.16 (en) vulnerability.................................................................................................................................. 1029
2.1050.17 (en) residual vulnerability.................................................................................................................. 1029
2.1050.18 (en) vulnerability.................................................................................................................................. 1029
2.1050.19 (en) Vulnerability................................................................................................................................. 1029
2.1050.20 (en) Vulnerability................................................................................................................................. 1030
2.1050.21 (en) Vulnerability................................................................................................................................. 1030
2.1050.22 (en) Vulnerability................................................................................................................................. 1030
2.1050.23 (en) Vulnerability................................................................................................................................. 1030
2.1050.24 (en) technical vulnerability................................................................................................................ 1030
2.1050.25 (en) Vulnerability................................................................................................................................. 1030
2.1050.26 (en) vulnerability.................................................................................................................................. 1030
2.1050.27 (en) Vulnerability................................................................................................................................. 1030
2.1050.28 (en) potential vulnerability................................................................................................................ 1031
2.1050.29 (en) encountered potential vulnerabilities...................................................................................... 1031
2.1050.30 (en) residual vulnerability.................................................................................................................. 1031
2.1050.31 (en) exploitable vulnerability............................................................................................................. 1031
2.1050.32 (en) vulnerability.................................................................................................................................. 1031
2.1050.33 (en) vulnerability.................................................................................................................................. 1031
2.1050.34 (en) Vulnerability................................................................................................................................. 1032
2.1050.35 (en) Vulnerability................................................................................................................................. 1032
2.1050.36 (en) vulnerabilities............................................................................................................................... 1032
2.1050.37 (en) Vulnerability................................................................................................................................. 1032
2.1050.38 (fr) vulnérabilité................................................................................................................................... 1032
2.1050.39 (fr) Vulnérabilité.................................................................................................................................. 1033
2.1050.40 (fr) Vulnérabilité.................................................................................................................................. 1033
2.1050.41 (fr) Vulnérabilité.................................................................................................................................. 1033
2.1050.42 (fr) Vulnérabilité.................................................................................................................................. 1033
2.1051 War Chalking.................................................................................................................................................. 1033
2.1051.1 War Chalking............................................................................................................................................. 1033
2.1051.2 (en) War Chalking..................................................................................................................................... 1033
2.1052 War Dialer....................................................................................................................................................... 1033
2.1052.1 War Dialer.................................................................................................................................................. 1033
2.1052.2 (en) war dialer........................................................................................................................................... 1034
2.1052.3 (en) War Dialer.......................................................................................................................................... 1034
2.1052.4 (en) War Dialing........................................................................................................................................ 1034
2.1053 War Driving..................................................................................................................................................... 1034
2.1053.1 War Driving................................................................................................................................................ 1034
2.1053.2 (en) War Driving........................................................................................................................................ 1034
2.1053.3 (fr) Wardriving........................................................................................................................................... 1034
2.1054 Warez............................................................................................................................................................... 1034
2.1054.1 Warez.......................................................................................................................................................... 1035
2.1054.2 (en) Warez.................................................................................................................................................. 1035
2.1055 warm_standby................................................................................................................................................. 1035
2.1055.1 (en) Warm Standby.................................................................................................................................. 1035
2.1055.2 (en) Intermediate Recovery.................................................................................................................... 1035
2.1056 Warm site......................................................................................................................................................... 1035
2.1056.1 Warm site................................................................................................................................................... 1035
2.1056.2 (en) warm site........................................................................................................................................... 1035
2.1056.3 (en) Warm site........................................................................................................................................... 1035
2.1056.4 (en) Warm site........................................................................................................................................... 1036
2.1057 Web services
security...................................................................................................................................... 1036
2.1057.1 Web services security............................................................................................................................... 1036
2.1057.2 (en) WS-Security........................................................................................................................................ 1036
2.1058 Watering hole................................................................................................................................................. 1036
2.1058.1 Watering hole............................................................................................................................................ 1036
2.1058.2 (en) Watering hole................................................................................................................................... 1036
2.1059 WEP - Wired
Equivalent Privacy................................................................................................................... 1037
2.1059.1 WEP - Wired Equivalent Privacy............................................................................................................. 1037
2.1059.2 WEP............................................................................................................................................................. 1037
2.1059.3 WEP............................................................................................................................................................. 1037
2.1059.4 Wired Equivalent Privacy........................................................................................................................ 1037
2.1059.5 (en) WEP..................................................................................................................................................... 1038
2.1059.6 (en) Wired Equivalent Privacy (WEP).................................................................................................... 1038
2.1059.7 (en) Wired Equivalent Privacy - WEP..................................................................................................... 1038
2.1059.8 (en) WEP - Wired Equivalent Privacy..................................................................................................... 1038
2.1059.9 (en) Wired Equivalent Privacy................................................................................................................ 1038
2.1059.10 (fr) WEP................................................................................................................................................. 1038
2.1059.11 (fr) WEP................................................................................................................................................. 1038
2.1060 Whaling............................................................................................................................................................ 1039
2.1060.1 Whaling...................................................................................................................................................... 1039
2.1060.2 (en) Whaling.............................................................................................................................................. 1039
2.1061 Whirlpool -
Algoritmo resumen (hash)....................................................................................................... 1039
2.1061.1 Whirlpool - Algoritmo resumen (hash)................................................................................................. 1039
2.1061.2 (en) Whirlpool - Hash Algorithm............................................................................................................ 1040
2.1062 Wiretapping..................................................................................................................................................... 1040
2.1062.1 Wiretapping............................................................................................................................................... 1040
2.1062.2 (en) passive wiretapping......................................................................................................................... 1040
2.1062.3 (en) Wiretapping....................................................................................................................................... 1040
2.1062.4 (en) wiretapping....................................................................................................................................... 1040
2.1062.5 (en) passive wiretapping......................................................................................................................... 1040
2.1063 WPA - Wi-Fi Protected
Access....................................................................................................................... 1040
2.1063.1 WPA/WPA2................................................................................................................................................ 1041
2.1063.2 WPA / WPA2.............................................................................................................................................. 1041
2.1063.3 Wi-Fi Protected Access............................................................................................................................. 1041
2.1063.4 (en) WPA/WPA2:...................................................................................................................................... 1041
2.1063.5 (en) Wi-Fi Protected Access-2 (WPA2).................................................................................................. 1041
2.1063.6 (en) WiFi Protected Access - WPA.......................................................................................................... 1042
2.1063.7 (en) WPA - Wi-Fi Protected Access........................................................................................................ 1042
2.1063.8 (en) Wi-Fi Protected Access.................................................................................................................... 1042
2.1063.9 (fr) WPA/WPA2......................................................................................................................................... 1042
2.1064 XER - XML
Encoding Rules............................................................................................................................. 1042
2.1064.1 XER - XML Encoding Rules....................................................................................................................... 1042
2.1064.2 (en) XER - XML Encoding Rules............................................................................................................... 1042
2.1065 XPath
injection................................................................................................................................................ 1043
2.1065.1 XPath injection.......................................................................................................................................... 1043
2.1065.2 (en) XPath injection.................................................................................................................................. 1043
2.1066 Zombi................................................................................................................................................................ 1043
2.1066.1 zombi.......................................................................................................................................................... 1043
2.1066.2 Zombie........................................................................................................................................................ 1043
2.1066.3 zombi.......................................................................................................................................................... 1044
2.1066.4 (en) zombie................................................................................................................................................ 1044
2.1066.5 (en) Zombie................................................................................................................................................ 1044
2.1066.6 (en) Zombie computer............................................................................................................................. 1044
2.1066.7 (en) zombie................................................................................................................................................ 1044
2.1067 ZONA................................................................................................................................................................ 1045
2.1067.1 zona............................................................................................................................................................. 1045
2.1067.2 (en) Zone.................................................................................................................................................... 1045
2.1067.3 (en) Enclave:.............................................................................................................................................. 1045
2.1067.4 (en) enclave................................................................................................................................................ 1045
2.1067.5 (en) enclave boundary............................................................................................................................. 1045
2.1068 Zona
desmilitarizada (DMZ).......................................................................................................................... 1045
2.1068.1 DMZ............................................................................................................................................................. 1045
2.1068.2 DMZ - Zona desmilitarizada.................................................................................................................... 1045
2.1068.1 (en) Demilitarized Zone (DMZ)............................................................................................................... 1046
2.1068.2 (en) demilitarized zone (DMZ)................................................................................................................ 1046
2.1068.3 (en) demilitarized zone (DMZ)................................................................................................................ 1046
2.1068.4 (en) De-militarised zone - DMZ.............................................................................................................. 1046
2.1068.5 (en) DMZ..................................................................................................................................................... 1046
2.1068.6 (en) DMZ (Demilitarized Zone)............................................................................................................... 1046
2.1068.7 (en) DMZ - Demilitarized zone................................................................................................................ 1046
2.1068.8 (en) Demilitarized Zone (DMZ)............................................................................................................... 1046
2.1068.9 (fr) DMZ...................................................................................................................................................... 1047
2.1068.10 (fr) zone démilitarisée......................................................................................................................... 1047
2.1068.11 (fr) DMZ - DeMilitarised Zone........................................................................................................... 1047
2.1069 Zona
intermedia............................................................................................................................................... 1047
2.1069.1 Zona intermedia........................................................................................................................................ 1048
2.1069.2 (en) buffer zone......................................................................................................................................... 1048
3 Acrónimos.......................................................................................................................... 1049
4 Referencias......................................................................................................................... 1059