-
-
- man in the middle
- A man-in-the-middle (MitM) attack is an exp...
- man in the middle attack
- A man-in-the-middle (MitM) at...
- man-in-the-middle
- A man-in-the-middle (MitM) attack is an exp...
- man-in-the-middle (MitM) attack
- A man-in-the-mi...
- man-in-the-middle attack
- A man-in-the-middle (MitM) at...
- managed file transfer
- What is managed file transfer (MFT)...
- managed file transfer (MFT)
- What is managed file tr...
- Massachusetts data protection law
- What is the...
- message authentication code
- A message authenticatio...
- message authentication code (MAC)
- A message a...
- MFA
- Multifactor authentication (MFA) is a security system in which more tha...
- MFT
- What is managed file transfer (MFT)?Managed file transfer (MFT) is a ty...
- micropayment
- A micropayment is an e-commerce transaction involving...
- Microsoft Network Access Protection
- Network...
- Microsoft Network Access Protection (NAP)
- mitm
- A man-in-the-middle (MitM) attack is an exploit in which an intruder ...
- MitM
- Active man-in-the-middle (MitM) is an attack method that allows an in...
- MitM attack
- A man-in-the-middle (MitM) attack is an exploit in whic...
- Modes of Attack
- Test yourself. A WhatIs.com tech vocabulary qui...
- multifactor authentication
- Multifactor authenticatio...
- multifactor authentication (MFA)
- Multifactor a...
- mutual authentication
- Mutual authentication, also called ...
- NAP
- Network access protection (NAP), introduced with Windows Server 2008, i...
- national ID card
- A national identity card is a portable docume...
- national identity card
- A national identity card is a por...
- OAuth
- OAuth (Open Authorization) is an open protocol for token-based auth...
- OneID
- OneID is a digital identity management service that provides a repo...
- open id
- OpenID is a decentralized single sign-on authentication system ...
- Open System Authentication
- Open System Authenticatio...
- Open System Authentication (OSA)
- Open System A...
- OpenID
- OpenID is a decentralized single sign-on authentication system fo...
- OSA
- Open System Authentication (OSA) is a process by which a computer can g...
- partner portal
- A partner portal is a Web-based application that ...
- password
- A password is an unspaced sequence of characters used to dete...
- password chaos
- Identity chaos (sometimes called password chaos) ...
- password cracker
- A password cracker is an application program ...
- password cracking
- A password cracker is an application progra...
- password synchronization
- Password synchronization is a...
- PEAP
- PEAP (Protected Extensible Authentication Protocol) is a version of E...
- PEAP (Protected Extensible Authentication Proto...
- personal identity verification (PIV) card
- personal identity verification card
- A perso...
- PIN lock
- The PIN lock is an authentication measure for mobile phones t...
- PIV card
- A personal identity verification (PIV) card is a United State...
- privilege bracketing
- Privilege bracketing is the practice ...
- Protected Extensible Authentication Protocol
- Quiz: Authentication Methods
- There are quite a few...
- RAT
- A remote access Trojan (RAT) is a malware program that gives an intrude...
- RAT (remote access Trojan)
- A remote access Trojan (R...
- RDC
- Remote deposit capture (RDC) is a system that allows a customer to scan...
- Real ID
- Real ID is a driver's license that complies with standards mand...
- real time location system
- A real-time location system...
- real-time location system
- A real-time location system...
- real-time location system (RTLS)
- A real-time l...
- remote access Trojan
- A remote access Trojan (RAT) is a mal...
- remote deposit capture
- Remote deposit capture (RDC) is a...
- remote deposit capture (RDC)
- Remote deposit captur...
- Report on Compliance
- A Report on Compliance (ROC) is a for...
- Report on Compliance (ROC)
- A Report on Compliance (R...
- risk-based authentication (RBA)
- Risk-based auth...
- ROC
- A Report on Compliance (ROC) is a form that must be completed by all Le...
- role mining
- Role mining is the process of analyzing user-to-resourc...
- RTLS
- A real-time location system (RTLS) is one of a number of technologies...
- security information management
- Security inform...
- security information management (SIM)
- Sec...
- Security Learning Guides
- We've gathered a collection o...
- Security Quizzes
- We've gathered a collection of our quizzes on...
- SFA
- Single-factor authentication (SFA) is the traditional security process ...
- shadow password file
- In the Linux operating system, a shad...
- Shared Key Authentication
- Shared Key Authentication (...
- Shared Key Authentication (SKA)
- Shared Key Auth...
- signature analysis
- Signature analysis has two meanings. It c...
- silence suppression
- In Voice over IP (VOiP), voice activati...
- SIM
- Security information management (SIM) is the practice of collecting, mo...
- single factor authentication
- Single-factor authent...
- single-factor authentication
- Single-factor authent...
- single-factor authentication (SFA)
- Single-fa...
- SKA
- Shared Key Authentication (SKA) is a process by which a computer can ga...
- smart label
- A smart label is a slip of paper, plastic or other mate...
- speech recognition
- Voice or speech recognition is the abilit...
- strong password
- A strong password is one that is designed to be...
- TGT
- An authentication ticket, also known as a ticket-granting ticket (TGT),...
- ticket-granting ticket
- An authentication ticket, also kn...
- tokenization
- Tokenization is the process of replacing sensitive da...
- two-factor authentication
- Two-factor authentication i...
- two-way authentication
- Mutual authentication, also calle...
- UK Identity Cards Act
- The UK Identity Cards Act is a fram...
- unique identifier (UID)
- A unique identifier (UID) is a ...
- universal authentication
- Universal authentication is a...
- user account provisioning
- User account provisioning i...
- VAD
- In Voice over IP (VOiP), voice activation detection (VAD) is a software...
- vascular ID
- Finger vein ID is a biometric authentication system tha...