Terms related to application security, including procedural definitions for preventing software vulnerabilities and words and phrases about secure code development.
Browse ACT - IV
-
- active man in the middle attack - Active man-in-t...
- active man-in-the-middle attack - Active man-in-t...
- active man-in-the-middle attack (MitM)
- AIDC - Automatic Identification and Data Capture (AIDC) is a broad set of te...
- alureon - TDL-4 is sophisticated malware that facilitates the creation an...
- app wrapping (application wrapping) - App wra...
- application blacklisting - Application blacklisting, som...
- application firewall - An application firewall is an enhance...
- application security - Application security is the use of so...
- application whitelisting - Application whitelisting is a...
- Automatic Identification and Data Capture
- Automatic Identification and Data Capture (AIDC)
- BitLocker - BitLocker is an operating system-level extension to Vista t...
- bot worm - A bot worm is a self-replicating malware program that resides...
- bot-worm - A bot worm is a self-replicating malware program that resides...
- botworm - A bot worm is a self-replicating malware program that resides i...
- bug convergence - In a software development project, bug converge...
- Centre for the Protection of National Infrastru...
- Centre for the Protection of National Infrastru...
- CERT In - CERT-In (the Indian Computer Emergency Response Team) is a gove...
- CERT-In - CERT-In (the Indian Computer Emergency Response Team) is a gove...
- CERT-In (the Indian Computer Emergency Response...
- CGI scanner - A CGI (common gateway interface) scanner is a program t...
- Chief Risk Officer - The chief risk officer (CRO) is the corpo...
- Chief Risk Officer (CRO) - The chief risk officer (CRO) ...
- Class C2 - Class C2 is a security rating established by the U.S. Nationa...
- clickjacking - Clickjacking (also known as user-interface or UI redr...
- clickjacking (user-interface or UI redressing a...
- clipboard hijack attack - A clipboard hijacking is an exp...
- Clonezilla - Clonezilla is a free open source disk cloning application...
- CloudAudit - CloudAudit is a specification for the presentation of inf...
- CloudAV - CloudAV is a program that combines multiple antivirus applicati...
- column-level encryption - Column-level encryption is a me...
- Common Weakness Enumeration - Common Weakness Enumera...
- Common Weakness Enumeration (CWE) - Common Weak...
- Conficker - Conficker is a fast-spreading worm that targets a vulnerabi...
- content spoofing - Content spoofing is a type of exploit used by...
- control framework - A control framework is a data structure tha...
- corporate cloud - Private cloud (also called internal cloud) is a...
- CPNI - The Centre for the Protection of National Infrastructure (CPNI) is th...
- CRO - The chief risk officer (CRO) is the corporate executive tasked with ass...
- cross site tracing - Cross-site tracing (XST) is a sophisticat...
- cross-site request forgery - Cross-site request forger...
- cross-site request forgery (XSRF or CSRF)
- cross-site tracing - Cross-site tracing (XST) is a sophisticat...
- cross-site tracing (XST) - Cross-site tracing (XST) is a...
- cryptotrojan - Ransomware is a type of malware used for data kidnapp...
- cryptovirus - Ransomware is a type of malware used for data kidnappin...
- cryptovirus cryptoworm - Ransomware is a type of malware u...
- cryptoworm - Ransomware is a type of malware used for data kidnapping,...
- Crypzip - Ransomware is a type of malware used for data kidnapping, an ex...
- CSRF - Cross-site request forgery (XSRF or CSRF) is a method of attacking a ...
- CWE - Common Weakness Enumeration (CWE) is a universal online dictionary of w...
- cybercrime - Cybercrime is a term for any illegal activity that uses a...
- cybersecurity - Cybersecurity is the body of technologies, processe...
- cyberwarfare - Cyberwarfare is Internet-based conflict involving pol...
- data breach - A data breach is an incident in which sensitive, protec...
- data masking - Data masking is a method of creating a structurally s...
- DCPromo (Domain Controller Promoter) - DCPro...
- disposable email - What is a disposable email?Disposable email i...
- DNS Security Extensions - DNS Security Extensions (DNSSEC...
- DNS Security Extensions (DNSSEC) - DNS Security ...
- DNSSEC - DNS Security Extensions (DNSSEC) are a set of Internet Engineerin...
- eavesdropping - Eavesdropping is the unauthorized real-time interce...
- encryption key management - Encryption key management i...
- endpoint fingerprinting - Endpoint fingerprinting is a fe...
- endurance testing - Load testing is the process of subjecting a...
- Federal Financial Institutions Examination Council
- Fennec - Fennec is a version of the Firefox browser adapted for mobile pho...
- FFIEC compliance - FFIEC compliance is conformance to a set of s...
- FFIEC compliance (Federal Financial Institution...
- Firefox 3.5 - Firefox 3.5 is a version of the Mozilla Foundation's We...
- Firesheep - Firesheep is a Firefox plug-in that automates session hijac...
- Five Steps to Incident Management in a Virtuali...
- Flexible Mandatory Access Control - Flexible Ma...
- Flexible Mandatory Access Control (FMAC)
- FMAC - Flexible Mandatory Access Control (FMAC) is an ongoing project intend...
- fuzz testing - Fuzz testing or fuzzing is a technique used by ethica...
- fuzz testing (fuzzing) - Fuzz testing or fuzzing is a tech...
- fuzzing - Fuzz testing or fuzzing is a technique used by ethical hackers ...
- geolocation - Geolocation is the detection of the physical location o...
- Google Docs - Google Docs is a free Web-based application in which do...
- hackerazzi - Hackerazzi are cybercriminals who hack into the email acc...
- health informatics - Health informatics is the study of resour...
- Higgins Project - The Higgins Trust Framework (HTF) is an API (ap...
- Higgins Trust Framework - The Higgins Trust Framework (HT...
- Higgins Trust Framework (HTF) - The Higgins Trust F...
- honey monkey - A honey monkey is a virtual computer system that is p...
- HTF - The Higgins Trust Framework (HTF) is an API (application program interf...
- IFrame - An IFrame (Inline Frame) is an HTML document embedded inside anot...
- IFrame (Inline Frame) - An IFrame (Inline Frame) is an HTML...
- initialization vector - An initialization vector (IV) is an...
- initialization vector (IV) - An initialization vector ...
- Inline Frame - An IFrame (Inline Frame) is an HTML document embedded...
- intelligent video - Intelligent video is digital video technolo...
- internal cloud - Private cloud (also called internal cloud) is a m...
- iris recognition - Iris recognition is a method of identifying p...
- ISO 27001 - ISO 27001 (formally known as ISO/IEC 27001:2005) is a speci...
- ISO/IEC 38500 - ISO/IEC 38500 is an international standard created ...
- IV - An initialization vector (IV) is an arbitrary number that can be used alo...