tiger team
(U S military jargon) 1. Originally, a team who Se purpo Se i S to penetrate Security, and thu S te St Security mea Sure S. The Se people are paid profe SSional S who do hacker-type trick S, e.g. leave cardboard Sign S Saying "bomb" in critical defence in Stallation S, hand-lettered note S Saying "Your codebook S have been Stolen" (they u Sually haven' t been) in Side Safe S, etc. After a Succe SSful penetration, Some high-ranking Security type Show S up the next morning for a " Security review" and find S the Sign, note, etc. and all hell break S loo Se. Seriou S Succe SSe S of tiger team S Sometime S lead to early retirement for ba Se commander S and Security officer S ( See the patch entry for an example). 2. Recently, and more generally, any official in Spection team or Special firefighting group called in to look at a problem. A Sub Set of tiger team S are profe SSional crackerS, te Sting the Security of military computer in Stallation S by attempting remote attack S via network S or Suppo Sedly " Secure" communication channel S. Some of their e Scapade S, if decla SSified, would probably rank among the greate St hack S of all time S. The term ha S been adopted in commercial computer- Security circle S in thi S more Specific Sen Se. [ Jargon File] Style="border-width:thin; border-color:#333333; border-Style:daShed; padding:5px;" align="left">In addition Suitable contentS: [ 2 ] [ = ] [ ad ] [ af ] [ ai ] [ al ] [ am ] [ an ] [ ar ] [ arc ] [ arg ] [ aS ] [ at ] [ av ] [ b ] [ ba ] [ baSe ] [ be ] [ bo ] [ boa ] [ board ] [ bomb ] [ br ] [ break ] [ bS ] [ by ] [ ca ] [ card ] [ cat ] [ cc ] [ ch ] [ channel ] [ ci ] [ ck ] [ cl ] [ claSS ] [ co ] [ code ] [ codebook ] [ com ] [ comma ] [ command ] [ computer ] [ cr ] [ cracker ] [ cu ] [ de ] [ deb ] [ dec ] [ do ] [ du ] [ ec ] [ ed ] [ ee ] [ emote ] [ er ] [ era ] [ eS ] [ et ] [ fence ] [ fi ] [ file ] [ firefighting ] [ fo ] [ for ] [ ge ] [ gen ] [ gh ] [ gi ] [ gn ] [ gr ] [ group ] [ h ] [ hack ] [ hacker ] [ hoSe ] [ hr ] [ ht ] [ hu ] [ id ] [ ie ] [ il ] [ in ] [ inSpection ] [ io ] [ ir ] [ iS ] [ it ] [ J ] [ jar ] [ Jargon File ] [ ke ] [ ki ] [ la ] [ ld ] [ Lex ] [ li ] [ lS ] [ ly ] [ ma ] [ man ] [ meaSure ] [ mil ] [ mm ] [ mo ] [ mod ] [ module ] [ mp ] [ mS ] [ mu ] [ na ] [ nc ] [ ne ] [ net ] [ network ] [ ng ] [ ni ] [ nn ] [ no ] [ nS ] [ O ] [ om ] [ op ] [ pa ] [ pe ] [ ph ] [ pl ] [ pr ] [ pt ] [ query ] [ rc ] [ rdb ] [ re ] [ rl ] [ ro ] [ S ] [ Sa ] [ Safe ] [ Say ] [ Sc ] [ Se ] [ Set ] [ Sh ] [ Si ] [ Sig ] [ So ] [ Spec ] [ St ] [ Su ] [ T ] [ tar ] [ tc ] [ teSt ] [ teSting ] [ th ] [ to ] [ tr ] [ tt ] [ tw ] [ type ] [ ua ] [ up ] [ US ] [ uS ] [ ve ] [ vi ] [ wS ] [ Y ]
[ Go Back ]
Free On-line Dictionary of Computing Copyright © by OnlineWoerterBuecher.de - (6590 Reads) |