CHAPTER 26

image

Z

ZeroAccess attack: A Trojan horse bot used to download other malware on an infected machine from a botnet, while remaining hidden on a building control system using rootkit techniques.

zero-day exploit attack: A worm, virus, or other cyber-threat that hits users on the same day the vulnerability is announced.

zero fill: To fill unused storage locations in a building control system with the representation of the character denoting 0. SOURCE: CNSSI-4009

zeroize: To remove or eliminate the key from a cryptographic equipment or fill device. SOURCE: CNSSI-4009

zeroization: A method of erasing electronically stored data, cryptographic ...

Get Cybersecurity Lexicon now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.