Browse Definitions :
224 results for:

credential stuffing

credential stuffing

Definition | WhatIs.com

Credential stuffing is the practice of using stolen login information from one account to gain access to accounts on a number of sites through ...

bit stuffing

Definition | SearchNetworking

Bit stuffing is the insertion of one or more bits into a transmission unit as a way to provide signaling information to a receiver... (Continued)

keyword stuffing

Definition | SearchITChannel

Keyword stuffing is the practice of inserting a large number of keywords into Web page content and meta tags in the attempt to artificially increase ...

credential theft

Definition | SearchSecurity

Credential theft is a type of cybercrime that involves stealing the proof of identity of the victim, which can be either an individual or a business....

Microsoft Windows Defender Credential Guard

Definition | SearchEnterpriseDesktop

Microsoft Windows Defender Credential Guard is a security feature that isolates users' login information from the rest of the operating system to ...

session prediction (credential/session prediction)

Definition | SearchSoftwareQuality

Session prediction, also called credential/session prediction, is a method of surreptitiously obtaining data (called a session ID) about an ...

single-factor token

Definition | SearchSecurity

A single-factor token is a small hardware device that produces one confirming credential for user authentication; the devices may be used in ...

bimodal IAM (bimodal identity access management)

Definition | SearchSecurity

Bimodal identity and access management (IAM) uses two forms of credentials, internal and external, as a method of authentication.

mimikatz

Definition | WhatIs.com

Mimikatz is an open source malware program used by hackers and penetration testers to gather credentials on Windows computers.

multifactor token

Definition | SearchSecurity

Multifactor tokens are security tokens that use more than one category of credential to confirm user authentication. The standard categories of ...

-ADS BY GOOGLE

SearchCompliance

SearchSecurity

  • computer worm

    A computer worm is a type of malicious software program whose primary function is to infect other computers while remaining ...

  • Single Sign-On (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials (e.g., ...

  • Certified Information Systems Auditor (CISA)

    Certified Information Systems Auditor (CISA) is a certification issued by ISACA to people in charge of ensuring that an ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • VRAM (video RAM)

    VRAM (video RAM) is a reference to any type of random access memory (RAM) used to store image data for a computer display.

  • Kilo, mega, giga, tera, peta, exa, zetta and all that

    Kilo, mega, giga, tera, peta, exa, zetta are among the list of prefixes used to denote the quantity of something, such as a byte ...

  • flash memory

    Flash memory, also known as flash storage, is a type of nonvolatile memory that erases data in units called blocks.

Close