Technology, Science and Universe
Results for {phrase} ({results_count} of {results_count_total})
Displaying {results_count} results of {results_count_total}
i
- Intelligence Lifecycle Description: The Intelligence Lifecycle in the field of cyber intelligence refers to the systematic stages that intelligence data goes through,(...) Read more
- Insecure Direct Object References (IDOR) Description: Insecure Direct Object References (IDOR) are a security vulnerability in web applications that allows an attacker to access objects(...) Read more
- Injection Attacks Description: Injection attacks are a type of security vulnerability in web applications where an attacker sends untrusted data to an(...) Read more
- Internet Protocol Security (IPsec) Description: Internet Protocol Security (IPsec) is a set of protocols designed to secure communications over the Internet Protocol (IP). Its(...) Read more
- IP Address Filtering Description: IP filtering is a security measure that allows or denies network traffic based on the source or destination IP address. This(...) Read more
- Internet of Things Security (IoT Security) Description: IoT security refers to the practice of securing connected devices and networks in the IoT. This involves protecting both the(...) Read more
- Integrity Constraints Description: Integrity constraints are fundamental rules that ensure the accuracy and consistency of data in a database. These constraints are(...) Read more
- Intranet Security Description: Intranet security refers to the measures implemented to protect an organization's internal network from unauthorized access and(...) Read more
- Intelligent DDoS Protection Description: Intelligent DDoS Protection refers to advanced systems that use machine learning techniques to detect and mitigate Distributed(...) Read more
- Interference Detection Description: Interference detection is the process of identifying interruptions in network traffic, which can be indicative of cyber attacks,(...) Read more
- Integrity Violations Description: Integrity violations refer to instances where the integrity of data is compromised, which can result in alteration, loss, or(...) Read more
- Internet of Things Vulnerabilities Description: The vulnerabilities of the Internet of Things (IoT) refer to security weaknesses that can be exploited in interconnected devices(...) Read more
- Interoperability Issues Description: Interoperability issues refer to the challenges that arise when different systems or applications do not work together as expected.(...) Read more
- Insufficient Logging Description: Insufficient Logging refers to the lack of sufficient information logging to detect and respond to security incidents in computer(...) Read more
- Insecure APIs Description: Insecure APIs are Application Programming Interfaces that have vulnerabilities that can be exploited by attackers. These interfaces(...) Read more