Get started

Bring yourself up to speed with our introductory content.

Security Resources

  • black hat

    Black hat refers to a hacker who breaks into a computer system or network with malicious intent. Continue Reading

  • copyright

    Copyright is a legal term describing ownership of control of the rights to the use and distribution of certain works of creative expression, including books, video, movies, music and computer programs. Continue Reading

  • password

    A password is an unspaced sequence of characters used to determine that a computer user requesting access to a computer system is really that particular user. Continue Reading

  • MD5

    The MD5 hashing algorithm is a one-way cryptographic function that accepts a message of any length as input and returns as output a fixed-length digest value to be used for authenticating the original message. Continue Reading

  • Advanced Encryption Standard (AES)

    The Advanced Encryption Standard, or AES, is a symmetric block cipher used by the U.S. government to protect classified information and is implemented in software and hardware throughout the world to encrypt sensitive data. Continue Reading

  • spear phishing

    Spear phishing is an email-spoofing attack that targets a specific organization or individual, seeking unauthorized access to sensitive information.Continue Reading

  • insider threat

    An insider threat is a malicious hacker (also called a cracker or a black hat) who is an employee or officer of a business, institution, or agency. The term can also apply to an outside person who poses as an employee or officer by obtaining false ...Continue Reading

  • virus (computer virus)

    A computer virus is malicious code that replicates by copying itself to another program, computer boot sector or document.Continue Reading

  • Certified Information Systems Security Professional (CISSP)

    Certified Information Systems Security Professional (CISSP) is an information security certification developed by the International Information Systems Security Certification Consortium, also known as (ISC)².Continue Reading

  • smart card

    A smart card is a device, often the size of a credit card, which includes an embedded microcontroller or memory chip and can securely process or store data.Continue Reading

  • email spoofing

    Email spoofing is the forgery of an email header so that the message appears to have originated from someone or somewhere other than the actual source.Continue Reading

  • physical security

    Physical security is the protection of people and systems from damage or loss due to physical events such as fire, flood, disasters, crimes or accidents.Continue Reading

  • buffer overflow

    A buffer overflow occurs when a program attempts to write more data to a fixed length block of memory, or buffer, than the buffer is allocated to hold. Buffer overflow exploits may enable remote execution of malicious code or denial of service ...Continue Reading

  • private key (secret key)

    A private (secret) key is an encryption key whose value should never be made public. The term may refer to the private key of an asymmetric key pair or a key shared by parties who are using symmetric encryption.Continue Reading

  • spyware

    Spyware is software that is installed on a computing device without the user's knowledge or permission.Continue Reading

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close