Fandom

The IT Law Wiki

Signature

32,189pages on
this wiki
Add New Page
Talk0 Share

Ad blocker interference detected!


Wikia is a free-to-use site that makes money from advertising. We have a modified experience for viewers using ad blockers

Wikia is not accessible if you’ve made further modifications. Remove the custom ad blocker rule(s) and the page will load as expected.

Definitions Edit

Cybersecurity Edit

A signature is

[a] recognizable, distinguishing pattern associated with an attack, such as a binary string in a virus or a particular set of keystrokes used to gain unauthorized access to a system.[1]
specific machine readable patterns of network traffic that affect the integrity, confidentiality, or availability of computer networks, systems, and information.[2]

General Edit

A signature is a handwritten (and sometimes stylized) depiction of someone's name, nickname or even a simple "X" that a person writes on documents as a proof of identity and intent.

Malware Edit

A signature is the "fingerprint" that is used by anti-virus software to detect an infection.

Military Edit

A signature is

[a] distinctive characteristic or set of characteristics that consistently recurs and identifies a piece of equipment, material, activity, individual, or event such as a radio frequency or acoustic characteristics.[3]

U.S. Code Edit

A signature "includes a mark when the person making the same intended it as such."[4]

Overview Edit

Cybersecurity Edit

Signatures are based upon indicators of known or suspected cyber threats. Signatures are specific patterns of network traffic that affect the integrity, confidentiality, or availability of computer networks, systems, and information. For example, a specific signature might identify a known computer virus that is designed to delete files from a computer without authorization. Signatures may contain instructions to copy pre-defined portions of the participating agency’s traffic associated with such cyber threats. Alerts from signatures contain descriptive information about the cyber threats identified by the signature.[5]

References Edit

  1. NIST Special Publication 800-61 (rev. 2), Glossary, at C-1.
  2. Privacy Impact Assessment for EINSTEIN 3-Accelerated (E3A), at 3 n.4.
  3. DoD Directive 5250.01, Glossary, at 13.
  4. 1 U.S.C. §1.
  5. Department of Homeland Security, Privacy Impact Assessment for the Initiative Three Exercise 7 (Mar. 18, 2010) (full-text).

See also Edit

Also on Fandom

Random Wiki