-
-
- JAAS
- The Java Authentication and Authorization Service (JAAS) is a set of ...
- Java Authentication and Authorization Service
- Java Authentication and Authorization Service (...
- JavaScript hijacking
- JavaScript hijacking is a technique t...
- key value pair
- A key-value pair (KVP) is a set of two linked dat...
- key-value pair
- A key-value pair (KVP) is a set of two linked dat...
- key-value pair (KVP)
- A key-value pair (KVP) is a set of tw...
- keystroke dynamics
- Keystroke dynamics are the patterns of rh...
- keyword stuffing
- Keyword stuffing is the practice of inserting...
- kill switch
- A kill switch is a mechanism used to shut down or disab...
- killswitch
- A kill switch is a mechanism used to shut down or disable...
- knowledge process outsourcing
- Knowledge process o...
- knowledge process outsourcing (KPO)
- Knowled...
- KPO
- Knowledge process outsourcing (KPO) is the allocation of relatively hig...
- KVP
- A key-value pair (KVP) is a set of two linked data items: a key, which ...
- LDAP injection
- LDAP injection is a specific form of attack that ...
- load testing
- Load testing is the process of subjecting a computer,...
- longevity testing
- Load testing is the process of subjecting a...
- malvertizement
- A malvertizement is malicious coding served throu...
- man in the browser
- Man in the browser refers to an emerging ...
- man in the middle
- A man-in-the-middle (MitM) attack is an exp...
- man in the middle attack
- A man-in-the-middle (MitM) at...
- man-in-the-middle
- A man-in-the-middle (MitM) attack is an exp...
- man-in-the-middle (MitM) attack
- A man-in-the-mi...
- man-in-the-middle attack
- A man-in-the-middle (MitM) at...
- managed file transfer
- What is managed file transfer (MFT)...
- managed file transfer (MFT)
- What is managed file tr...
- Massachusetts data protection law
- What is the...
- meet-in-the-middle attack
- Meet-in-the-middle is a typ...
- metamorphic malware
- Metamorphic malware is malicious softwa...
- MFA
- Multifactor authentication (MFA) is a security system in which more tha...
- MFT
- What is managed file transfer (MFT)?Managed file transfer (MFT) is a ty...
- micropayment
- A micropayment is an e-commerce transaction involving...
- Microsoft System Center Mobile Device Manager
- Microsoft System Center Mobile Device Manager (...
- MIEL e-Security
- MIEL e-Security is a Mumbai-based organization ...
- mitm
- A man-in-the-middle (MitM) attack is an exploit in which an intruder ...
- MitM
- Active man-in-the-middle (MitM) is an attack method that allows an in...
- MitM attack
- A man-in-the-middle (MitM) attack is an exploit in whic...
- mobile app security
- Mobile app security is the extent of pr...
- Modes of Attack
- Test yourself. A WhatIs.com tech vocabulary qui...
- MSCMDM
- Microsoft System Center Mobile Device Manager (MSCMDM) is server-...
- multifactor authentication
- Multifactor authenticatio...
- multifactor authentication (MFA)
- Multifactor a...
- mutual authentication
- Mutual authentication, also called ...
- NBAR
- Network Based Application Recognition (NBAR) is a mechanism that clas...
- NBAR (Network Based Application Recognition)
- Network Based Application Recognition
- Net...
- OneID
- OneID is a digital identity management service that provides a repo...
- Open Source Hardening Project
- The Open Source Har...
- Open Web Application Security Project
- The...
- operating system commanding
- OS commanding is a meth...
- OS commanding
- OS commanding is a method of attacking a Web server...
- OS Security
- Application security is the use of software, hardware, ...
- out-of-band patch
- An out-of-band patch is a patch released at...
- OWASP
- The Open Web Application Security Project (OWASP) is an organizatio...
- OWASP (Open Web Application Security Project)
- partner portal
- A partner portal is a Web-based application that ...
- password hardening
- Password hardening is any one of a variet...
- pastebin
- A pastebin is a Web application that allows users to upload a...
- personal health record
- A personal health record (PHR) is...
- personal health record (PHR)
- A personal health rec...
- pharma hack
- The pharma hack is an exploit that takes advantage of v...
- PHR
- A personal health record (PHR) is a collection of health-related inform...
- POLP
- The principle of least privilege (POLP) is the practice of limiting a...
- polymorphic malware
- Polymorphic malware is harmful, destruc...
- pretexting
- Pretexting is a form of social engineering in which one i...
- principle of least privilege
- The principle of leas...
- principle of least privilege (POLP)
- The pri...
- private cloud
- Private cloud (also called internal cloud) is a mar...
- private cloud (internal cloud or corporate cloud)
- privilege bracketing
- Privilege bracketing is the practice ...
- proxy hacking
- Proxy hacking, also known as proxy hijacking, is an...
- Pwn2Own
- Pwn2Own is an annual hacking competition sponsored by security ...
- QSA
- A Qualified Security Assessor (QSA) is a person who has been certified ...
- Qualified Security Assessor
- A Qualified Security As...
- Qualified Security Assessor (QSA)
- A Qualified...
- ransomware
- Ransomware is a type of malware used for data kidnapping,...
- ransomware (cryptovirus, cryptotrojan or crypto...
- RAT
- A remote access Trojan (RAT) is a malware program that gives an intrude...
- RAT (remote access Trojan)
- A remote access Trojan (R...
- RDC
- Remote deposit capture (RDC) is a system that allows a customer to scan...
- real time location system
- A real-time location system...
- real-time location system
- A real-time location system...
- real-time location system (RTLS)
- A real-time l...
- remote access Trojan
- A remote access Trojan (RAT) is a mal...
- remote deposit capture
- Remote deposit capture (RDC) is a...
- remote deposit capture (RDC)
- Remote deposit captur...
- remote desktop
- Remote desktop is a program or an operating syste...
- Report on Compliance
- A Report on Compliance (ROC) is a for...
- Report on Compliance (ROC)
- A Report on Compliance (R...
- ROC
- A Report on Compliance (ROC) is a form that must be completed by all Le...
- Rock Phish
- Rock Phish is both a phishing toolkit and the entity that...
- RTLS
- A real-time location system (RTLS) is one of a number of technologies...
- SaaS
- Security-as-a-service (SaaS) is an outsourcing model for security man...
- scareware
- Scareware is a type of malware designed to trick victims in...