Word of the Day: Tech Definitions from WhatIs.com:

Security


May 25, 2017  3:40 AM

voice signature

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
biometric, Encryption

A voice signature is a type of electronic signature that uses an individual’s recorded verbal agreement in place of a handwritten signature. Continued… Quote of the Day

"Voice has been around...

May 15, 2017  6:26 PM

ransomware

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Encryption, malware, Ransomware

Ransomware is malicious code that is used by cybercriminals to launch data kidnapping and lockscreen attacks. Continued… Quote of the Day

"Ransomware attacks...


May 8, 2017  1:34 AM

Signaling System 7 (SS7)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Networking, Security

Signaling System 7 (SS7) is an international telecommunications standard that defines how network elements in a public switched telephone network (PSTN) exchange information over a digital signaling network.


May 5, 2017  9:00 PM

behavior-based security

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Breach detection, Phishing, Security

Behavior-based security is a proactive approach to managing security incidents that involves monitoring end user devices, networks and servers in order to flag or block suspicious activity. Continued… Quote...


March 24, 2017  8:34 PM

Facebook cloning

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Facebook, Identity theft, Social networking

Facebook cloning is a scam in which the attacker copies the profile picture of an authorized user, creates a new account using that person’s name and sends friend requests to people on the user’s list.


January 11, 2017  8:06 PM

exploit kit

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
malware, Threat actor

An exploit kit is a programming tool that allows someone who does not have any experience writing software code to create, customize and distribute malware. Continued… Quote of the...


January 6, 2017  11:16 PM

two-factor authentication (2FA)

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
2FA, Authentication

Two-factor authentication (2FA) is a security process in which the user provides two authentication factors to verify they are who they say they are. 2FA can be contrasted with single-factor authentication (SFA), a security process in which the user provides only one factor -- typically a password....


November 30, 2016  9:13 PM

FRPC Rule 41

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
Security, VPN

FRPC Rule 41 is the part of the United States Federal Rules of Criminal Procedure that covers the search and seizure of physical and digital evidence. Continued… Quote of the Day

"While the...


November 10, 2016  9:21 PM

network behavior anomaly detection

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
Security

Network behavior anomaly detection (NBAD) is the continuous monitoring of a proprietary network for unusual events or trends. Continued… Quote of the Day

"It's...


October 6, 2016  8:12 PM

fuzz testing (fuzzing)

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
Debugging, Security, Software testing

Fuzz testing or fuzzing is a software testing technique used to discover coding errors and security loopholes in software, operating systems or networks by inputting massive amounts of random data, called fuzz, to the system in an attempt to make it crash. If a vulnerability is found, a tool called...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: