Skip to main content

Recently Updated Pages

Application Level Encryption

Documentation

A form of database encryption where the program that's used to create and manage the stored data ...

Updated 1 month ago by table!

Column Level Encryption

Documentation

A form of database encryption that allows the database administrator to encrypt each column or se...

Updated 1 month ago by table!

Cryptominer

Documentation

A malware program that uses the resources of a system to mine cryptocurrency for the attacker.

Updated 1 month ago by table!

Ransomware

Documentation

A malware program that forces the victim to either send a form of payment in order to decrypt the...

Updated 1 month ago by table!

Spyware

Documentation

A type of malware that's designed to collect information about the victim who's system got infect...

Updated 1 month ago by table!

Keylogger

Documentation

A type of malware that logs every keystroke a user makes and sends it back to the attacker. This ...

Updated 1 month ago by table!

Trojan Horse

Documentation

A type of malware that provides an attacker remote access to an infected system. This program is ...

Updated 1 month ago by table!

Virus

Documentation

A self-replicating type of malware that often mimic or attach to legitimate programs and hide ins...

Updated 1 month ago by table!

Master File Table

Documentation

A database that stores information about all files and directories in the NTFS file system. It al...

Updated 1 month ago by table!

Principle of Least Privilege

Documentation

This principle states that users should only have enough permissions to do their job effectively,...

Updated 1 month ago by table!

Zero Day Attack

Documentation

A type of network attack where the attacker exploits a vulnerability previously unknown to the ne...

Updated 1 month ago by table!

MAC Spoofing

Documentation

A type of network attack where the attacker scans the network for valid MAC addresses, matches th...

Updated 1 month ago by table!

Insider Attack

Documentation

A type of network attack where an active or former employee of an organization still has access t...

Updated 1 month ago by table!

Brute Force Attack

Documentation

A password attack method where the attacker attempts to guess the password through trial and erro...

Updated 1 month ago by table!

SQL Injection

Documentation

A type of web server attack where the injects malicious SQL code into an input field in order to ...

Updated 1 month ago by table!

Cross site Scripting

Documentation

A type of web server attack where the attacker exploits misconfigured input fields, inputting mal...

Updated 1 month ago by table!

Liquid Crystal Display Monitor

Documentation

A type of monitor that produces image by moving liquid crystals that block or allow light to pass...

Updated 1 month ago by table!

Extended File System

Documentation

Extended File System: a file system originally designed for the Silicon Graphics IRIX OS, but sup...

Updated 1 month ago by table!

Cyclic Redundancy Check

Documentation

A form of error-correcting code that's used to detect accidental changes or corruption in digital...

Updated 1 month ago by table!

Long Term Evolution

Documentation

An extension of the 3G cellular network technology. It increased downlink/uplink speeds to 100/50...

Updated 1 month ago by table!