The IT Law Wiki
Prevention is ideal but detection is a must.



Detection is the extraction of particular information from a larger stream of information without specific cooperation from or synchronization with the sender.

Electronic warfare[]

Detection is

the active and passive monitoring of an operational environment for radio frequency, electro-optical, laser, infrared, and ultraviolet electromagnetic threats. Detection is the first step in EW for exploitation, targeting, and defensive planning. Friendly forces maintain the capability to detect and characterize interference as hostile jamming or unintentional electromagnetic interference.[1]


Detection is

[d]evelopment and implementation of the appropriate activities in order to identify the occurrence of a cyber event.[2]


Detection is

the process whereby a service provider or end-user comes to be aware that a particular system or device has been infected with malicious software. A service provider may detect that a system has become infected many different ways, including as a result of receiving complaints from third parties about spam, network scanning, or attacks that have been sourced from that system. End-users may detect system infections through software tools or other means.[3]


This page uses Creative Commons Licensed content from Wikipedia (view authors). Smallwikipedialogo.png