GLOSSARY ENTRY (DERIVED FROM QUESTION BELOW) | ||||||
---|---|---|---|---|---|---|
|
22:05 Sep 14, 2020 |
Portuguese to English translations [PRO] Tech/Engineering - Internet, e-Commerce / malware, virus, etc. | |||||||
---|---|---|---|---|---|---|---|
|
| ||||||
| Selected response from: Luciano Eduardo de Oliveira Brazil | ||||||
Grading comment
|
Summary of answers provided | ||||
---|---|---|---|---|
3 | persistence |
|
persistence Explanation: Persistence consists of techniques that adversaries use to keep access to systems across restarts, changed credentials, and other interruptions that could cut off their access. Techniques used for persistence include any access, action, or configuration changes that let them maintain their foothold on systems, such as replacing or hijacking legitimate code or adding startup code. https://attack.mitre.org/tactics/TA0003/ https://www.google.com/search?q="obtain persistence"&oq="obt... |
| |
Login to enter a peer comment (or grade) |
Login or register (free and only takes a few minutes) to participate in this question.
You will also have access to many other tools and opportunities designed for those who have language-related jobs (or are passionate about them). Participation is free and the site has a strict confidentiality policy.