• distributed denial-of-service attack (DDoS)

    On the Internet, a distributed denial-of-service (DDoS) attack is one in which a multitude of compromised systems attack a single target, thereby causing denial of service for users of the targeted...

  • computer forensics (cyber forensics)

    Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a cou...

  • multifactor authentication (MFA)

    Multifactor authentication (MFA) is a security system in which more than one form of authentication is implemented to verify the legitimacy of a transaction... (Continued)

  • attack vector

    An attack vector is a path or means by which a hacker (or cracker) can gain access to a computer or network server in order to deliver a payload or malicious outcome.

Security Resources

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • distributed denial-of-service attack (DDoS)

    On the Internet, a distributed denial-of-service (DDoS) attack is one in which a multitude of compromised systems attack a single target, thereby causing denial of service for users of the targeted system. 

  • computer forensics (cyber forensics)

    Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law. 

  • multifactor authentication (MFA)

    Multifactor authentication (MFA) is a security system in which more than one form of authentication is implemented to verify the legitimacy of a transaction... (Continued) 

  • attack vector

    An attack vector is a path or means by which a hacker (or cracker) can gain access to a computer or network server in order to deliver a payload or malicious outcome. 

  • Zeus Trojan (Zbot)

    Zeus, also known as Zbot, is a malware toolkit that allows a cybercriminal to build his own Trojan Horse. A Trojan Horse is programming that appears to be legitimate but actually hides an attack. 

  • differential power analysis (DPA)

    A differential power analysis (DPA) attack is an exploit based on analysing the correlation between the electricity usage of a chip in a smart card and the encryption key it contains. 

  • typeprint analysis

    Typeprint analysis is a technology in which the rhythmic patterns of a person's keyboard behavior, known as keystroke dynamics, are analyzed over a period of time and then stored... (Continue) 

  • role-based access control (RBAC)

    Role-based access control (RBAC) is a method of regulating access to computer or network resources based on the roles of individual users within an enterprise... 

  • botnet (zombie army)

    A zombie army (also known as a botnet) is a number of Internet computers that, although their owners are unaware of it, have been set up to forward spam or viruses to other computers on the Internet... (Continued) 

  • spear phishing

    Spear phishing is an e-mail spoofing fraud attempt that targets a specific organization, seeking unauthorized access to confidential data. As with the e-mail messages used in regular phishing expeditions, spear phishing messages appear to come from ... 

  • See more Definitions on Security Resources
  • Adobe: Increasing transparency and the secure product lifecycle

    Brad Arkin discusses why Adobe created his role, how it engages the security research community and how Adobe has learned that talking about security isn't a bad thing. 

  • 201 CMR 17 compliance: What you need to know

    The new Massachusetts data protection law, 201 CMR 17, is known as one of the most stringent laws of its kind. In this interview, David Navetta of the Information Law Group discusses how enterprises should approach compliance with this law. 

  • OWASP Security Spending Benchmarks Project

    An OWASP project investigates company spending on software development. A survey found a majority of firms getting an independent third-party security review of software code. 

  • distributed denial-of-service attack (DDoS)

    On the Internet, a distributed denial-of-service (DDoS) attack is one in which a multitude of compromised systems attack a single target, thereby causing denial of service for users of the targeted system. 

  • computer forensics (cyber forensics)

    Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law. 

  • multifactor authentication (MFA)

    Multifactor authentication (MFA) is a security system in which more than one form of authentication is implemented to verify the legitimacy of a transaction... (Continued) 

  • attack vector

    An attack vector is a path or means by which a hacker (or cracker) can gain access to a computer or network server in order to deliver a payload or malicious outcome. 

  • Zeus Trojan (Zbot)

    Zeus, also known as Zbot, is a malware toolkit that allows a cybercriminal to build his own Trojan Horse. A Trojan Horse is programming that appears to be legitimate but actually hides an attack. 

  • differential power analysis (DPA)

    A differential power analysis (DPA) attack is an exploit based on analysing the correlation between the electricity usage of a chip in a smart card and the encryption key it contains. 

  • typeprint analysis

    Typeprint analysis is a technology in which the rhythmic patterns of a person's keyboard behavior, known as keystroke dynamics, are analyzed over a period of time and then stored... (Continue) 

  • role-based access control (RBAC)

    Role-based access control (RBAC) is a method of regulating access to computer or network resources based on the roles of individual users within an enterprise... 

  • botnet (zombie army)

    A zombie army (also known as a botnet) is a number of Internet computers that, although their owners are unaware of it, have been set up to forward spam or viruses to other computers on the Internet... (Continued) 

  • spear phishing

    Spear phishing is an e-mail spoofing fraud attempt that targets a specific organization, seeking unauthorized access to confidential data. As with the e-mail messages used in regular phishing expeditions, spear phishing messages appear to come from ... 

  • See more All on Security Resources