Que se ha
introducido sin derecho.
DRAE. Diccionario
de la Lengua Española.
Apropiarse,
sin razón ni derecho, de un cargo, una autoridad, una jurisdicción, etc.
DRAE.
Diccionario de la Lengua Española.
Cuando un
atacante accede a un sistema informático sin autorización con el objetivo de
tomar el control de la máquina o recopilar información confidencial.
Para hacerlo,
suelen aprovechar alguna vulnerabilidad del sistema afectado.
http://www.inteco.es/glossary/Formacion/Glosario/
Acción de
soslayar o violar los mecanismos de seguridad instalados y los procedimientos
de seguridad establecidos con objeto de atacar a un sistema. [Ribagorda:1997]
Dispositivo
físicamente robusto, diseñado para destruir sus microcircuitos internos cuando
se intenta penetrar o, en general, violar de cualquier manera. [Ribagorda:1997]
the act of entering a place
which is private or where you may not be wanted.
Oxford
Advanced Learner's Dictionary.
Unauthorized act of
bypassing the security mechanisms of a system. [CNSSI_4009:2010]
(I) An entity that gains or
attempts to gain access to a system or system resource without having
authorization to do so. (See: intrusion. Compare: adversary, cracker, hacker.) [RFC4949:2007]
1. (I) A security event, or
a combination of multiple security events, that constitutes a security incident
in which an intruder gains, or attempts to gain, access to a system or system
resource without having authorization to do so. (See: IDS.)
2. (I) A type of threat
action whereby an unauthorized entity gains access to sensitive data by
circumventing a system's security protections. (See: unauthorized disclosure.)
Usage: This type of threat
action includes the following subtypes:
·
"Trespass":
Gaining physical access to sensitive data by circumventing a system's
protections.
·
"Penetration":
Gaining logical access to sensitive data by circumventing a system's
protections.
·
"Reverse
engineering": Acquiring sensitive data by disassembling and analyzing the design
of a system component.
·
"Cryptanalysis":
Transforming encrypted data into plain text without having prior knowledge of
encryption parameters or processes. (See: main entry for "cryptanalysis".)
[RFC4949:2007]
unauthorized access to a
network or a network-connected system i.e. deliberate or accidental
unauthorized access to an information system, to include malicious activity
against an information system, or unauthorized use of resources within an
information system. [ISO-18028-1:2006]
Une combinaison
délibérée ou accidentelle d' évènements qui peuvent potentiellement causer un
accès non autorisé et constituer une activité allant à l'encontre du système IT
au sein même ou à l'extérieur du système. [ISO-15947:2002]