• SYN flood (half open attack)

    SYN flooding is a method that the user of a hostile client program can use to conduct a denial-of-service (DoS) attack on a computer server.

  • digital certificate

    A digital certificate is an electronic "passport" that allows a person, computer or organization to exchange information securely over the Internet using the public key infrastructure (PKI). A digi...

  • COBIT

    COBIT  is a framework for developing, implementing, monitoring and improving information technology (IT) governance and management practices.

  • computer forensics (cyber forensics)

    Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a cou...

Security Resources

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • backscatter body scanning

    Backscatter body scanning is an X-ray-based technology that yields a high-resolution image of a person's body beneath their clothing and reveals concealed objects... (Continued) 

  • wildcard certificate

    A wildcard certificate is a digital certificate that is applied to a domain and all its subdomains. 

  • privilege escalation attack

    A privilege escalation attack is a type of network intrusion that takes advantage of programming errors or design flaws to grant the attacker elevated access to the network and its associated data and applications. 

  • domain rotation

    Domain rotation is a technique use by malware distributors to drive traffic from multiple domains to a single IP address that is controlled by the distributor. The goal of domain rotation is to make it harder for a network administrator to blacklist ... 

  • user account provisioning

    User account provisioning is a business process for creating and managing access to resources in an information technology (IT) system. To be effective, an account provisioning process should ensure that the creation of accounts and provisioning of ... 

  • Certified Information Systems Auditor (CISA)

    The Certified Information Systems Auditor (CISA) is a certification issued by the Information Systems Audit and Control Association (ISACA). 

  • cybercrime

    Cybercrime is a term for any illegal activity that uses a computer as its primary means of commission. 

  • advanced evasion technique (AET)

    An advanced evasion technique (AET) is a type of network attack that combines several different known evasion techniques on-the-fly to create a new technique that won't be recognized by an intrusion detection system 

  • metamorphic and polymorphic malware

    Metamorphic and polymorphic malware are two categories of malicious programs that have the ability to change their code as they propagate. 

  • Microsoft to address 49 flaws in record patching cycle

    The software giant said it would release 16 bulletins next week addressing flaws in Internet Explorer, Microsoft Office, and the .NET Framework.