Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

651 total results found

Multifactor Authentication

Documentation

A form of user authentication that requires several methods instead of just one in order to grant access to secured property. There are three basic types of authentication: something you know (username/password; PIN) something you have (key; keycard; key fob)...

Password Policy

Documentation

A document that defines password requirements on company-owned systems. It specifies: Minimum length of a password (usually 8 char.) Character types required in a password (upper/lower; numbers; special characters/punctuation) How many failed attempts before ...

Physical Security Policy

Documentation

A document that defines restricted areas within company premises, identifies which employees are granted access to those restricted areas and outlines how that access is granted and under which terms access should be revoked. Authentication methods include: A...

Network Medium

Documentation

The physical channel through which data communications travel; the connecting method between network hosts. Network mediums can be divided into several categories: Bound-Media Unbound-Media Fiber-Optic-Media #III

Intrusion Detection System

Documentation

A hardware device designed to monitor and protect computer networks from suspicious, malicious, and prohibited network activity. IDS' can be configured to adhere to a security policy created by an organization by the network admin. IDS use signature patterns ...

Liquid Crystal Display Monitor

Documentation

A type of monitor that produces image by moving liquid crystals that block or allow light to pass through them. Features Light is provided to the monitor via a backlight on the flat panel display. A polarizing glass filter is placed both in front of and behin...

Chain of Custody

Documentation

A set of procedures defining how evidence is handled after a security breach in an enterprise settings. This is usually listed out in an organizations security policy. #XIV

Payment Card Industry Data Security Standards

Documentation

aliases: PCI DSS The legal standards for financial data storage at enterprise levels. There are 12 requirements under 6 categories that an organization needs to adhere to if they want to be able to process card payments. Legislation Sarbanes-Oxley-Act-of-...

Sarbanes Oxley Act of 2002

Documentation

A congressional act that forces public companies to be transparent in regards to creating and maintaining financial records. Often abbreviated as the SOX Act. #XIV

Gramm Leach Bliley Act of 1999

Documentation

A Congressional act that forces companies that offer loans, investment advice, or loans to adhere to certain rules when storing customer data securely, and how to properly share customer data. The GLBA is enforced by the Federal Trade Commission, so this is ta...

Port

Documentation

A hardware piece on a computer where an electrical connector can be used to link the device to other devices. A logical communication channel that network nodes use to send and receive data on. A list of the ports and their protocols can be found here. #III

Phishing

Documentation

The act of sending malicious messages intended to fool and/or manipulate a victim into giving up sensitive information or to perform actions that will result in a compromised system. #XIV

Whaling

Documentation

A specific type of phishing that targets high-value individuals within an organization, such as the CEO. #XIV

Spear Phishing

Documentation

A type of phishing where the attacker researches the target extensively to craft a personalized message designed to fool the target and the target specifically. #XIV

Tailgating

Documentation

A social engineering attack where the attacker gains access to a secured place simply by closely following an authorized person. #XIV

Shoulder Surfing

Documentation

A type of social engineering that allows the attacker to gain critical and/or sensitive information simply by looking over the shoulder of a target and viewing their computer screen. #XIV

Impersonation

Documentation

A social engineering attack where the attacker attempts to gain access to secured data by pretending to be a verified, authorized person. #XIV

Evil Twin Attack

Documentation

A type of social engineering attack where the attacker configures a rogue access point designed to mimic the legitimate network. The attacker can then kick off targets from the actual network, and when the clients attempt to reconnect, they will instead connec...