data exfiltration


Also found in: Dictionary.

data exfiltration

Data exfiltration is the unauthorized extraction of data from a computer. The word exfiltration means to withdraw secretly from a hostile situation. See malware and data extrusion.
Mentioned in ?
References in periodicals archive ?
So far, the security industry hasn't found a way to reliably detect the data exfiltration conducted in this way and the goal of our investigations is to draw industry attention to the problem and enforce the development of reliable yet affordable technologies, allowing the identification of steganography in malware attacks.
Attackers leverage ordinary end-user programs such as web browsers, file transfer clients, and native system tools for command-and-control and data exfiltration activity, the report stated, going on to remind IT administrators that "the most mundane applications, in the wrong hands, can be used for malicious purposes.
This dual certification extends Bloombase support with HPE data-center and security products in offering an interoperable encryption solution to mitigate data exfiltration threats (adding to HPE Atalla Enterprise Secure Key Manager (ESKM), HPE on-premise 3PAR storage and StoreEver tape libraries, HPE ProLiant servers, and Integrity Certified for OpenVMS).
Whether unwittingly, or perhaps at times deliberately, devices that are "allowed" on the network by firewalls and IPSs become the launch pad for large-scale attacks and data exfiltration.
To tackle the two existing network security problems are ensuring anonymous communications and preventing data exfiltration through network covert channels.
DDoS event data allows security teams to see all threat vectors associated with an attack--even complex hybrid attacks that are well disguised in order to achieve the goal of data exfiltration.
For example, you need to understand basics such as: identifying all your hardware and software assets, the ingress and egress points to the Internet, where your data is stored, how it's secured, who touches your supply chain, your methodology to ensure product integrity, techniques used to stop data exfiltration, denial of service, data destruction, data corruption, service disruption, and what choices you are making about the use of encryption.
An example of the other end of the cyberspace capability spectrum is the requirement for covert data exfiltration or manipulation.
Although there are well-established phases of an attack in the data forensics and incident response world, a simplified version entails three: initial infiltration, lateral movement, and data exfiltration, he said.
Although there are well-established phases of an attack in the data forensics and incident response world, I'm going to focus on a simplified version with three: initial infiltration, lateral movement, and data exfiltration.
Also, McAfee Threat Intelligence Exchange allows organisations to orchestrate security controls to identify patterns, immunize assets against newly-identified malware, and prevent data exfiltration in real-time - optimizing security for each organization.
What happens when the adversary moves from a CNE posture of data exfiltration to a CNA posture to manipulate data and/or to disrupt, deny, and/or destroy our information systems due to political or kinetic triggers?

Full browser ?