How Can We Help?
A specific sequence of events indicative of an unauthorized access attempt.
SOURCE: SP 800-12
A characteristic byte pattern used in malicious code or an indicator, or set of indicators, that allows the identification of malicious network activities.
SOURCE: CNSSI-4009