Discussions

  • USSD (Unstructured Supplementary Service Data)

    USSD (Unstructured Supplementary Service Data) is a Global System for Mobile (GSM) communication technology that is used to send text between a mobile phone and an application program in the network.

    ITKE352,420 pointsBadges:
  • signature analysis

    Signature analysis has two meanings. It can involve scrutinizing human signatures in order to detect forgeries and it can be a troubleshooting technique in which an AC signal with a specific waveform is applied across a component.

    Margaret Rouse3,040 pointsBadges:
  • Do you find software requirements specifications to be too vague? If so, how do you resolve this issue?

    RobinGoldsmith1190 pointsBadges:
  • soft token

    A soft token is a software-based security token that generates a single-use login PIN. Traditionally, a security token has been a hardware device that produces a new, secure and individual PIN for each use and displays it on a built-in LCD display.

    Margaret Rouse3,040 pointsBadges:
  • stakeholder

    A stakeholder is any person with a legitimate interest, or stake, in the actions of an organization.

    Margaret Rouse3,040 pointsBadges:
  • unique identifier (UID)

    A unique identifier (UID) is a numeric or alphanumeric string that is associated with a single entity within a given system.

    Margaret Rouse3,040 pointsBadges:
  • universal authentication

    Universal authentication is a network identity-verification method that allows users to move from site to site securely without having to enter identifying information multiple times.

    Margaret Rouse3,040 pointsBadges:
  • full-disk encryption (FDE)

    What is full-disk encryption (FDE)?Full-disk encryption (FDE) is encryption at the hardware level.

    Margaret Rouse3,040 pointsBadges:
  • out-of-band authentication

    Out-of-band authentication is a type of two-factor authentication that requires a secondary verification method through a separate communication channel along with the typical ID and password. Out-of-band authentication is often used in financial institutions and other organizations with high...

    Margaret Rouse3,040 pointsBadges:
  • risk-based authentication (RBA)

    Risk-based authentication (RBA) is a method of applying varying levels of stringency to authentication processes based on the likelihood that access to a given system could result in its being compromised. As the level of risk increases, the authentication process becomes more comprehensive and...

    Margaret Rouse3,040 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following