Technology, Science and Universe
Results for {phrase} ({results_count} of {results_count_total})
Displaying {results_count} results of {results_count_total}
a
- Account Hijacking Description: Account hijacking is a form of identity theft where an attacker takes control of a user's account, whether on social media, email,(...) Read more
- Adversarial Attack Description: An adversarial attack is a technique that manipulates input data with the aim of deceiving machine learning models, causing them to(...) Read more
- Application Security Architecture Description: Application security architecture refers to the design and structure of security measures implemented within an application. This(...) Read more
- Application Layer Attack Description: Application layer attack is a type of DDoS (Distributed Denial of Service) attack that specifically targets the application layer(...) Read more
- Address Spoofing Description: Address spoofing is a technique used in distributed denial-of-service (DDoS) attacks where the attacker sends data packets from a(...) Read more
- Asset Protection Description: Asset protection refers to the measures implemented to safeguard organizational assets against various types of threats, including(...) Read more
- Anti-DDoS Description: Anti-DDoS refers to a set of technologies and strategies specifically designed to prevent and mitigate Distributed Denial of(...) Read more
- Attack Detection Description: Attack detection is the process of identifying and responding to security threats that may compromise the integrity,(...) Read more
- Attack Pattern Description: The 'Attack Pattern' refers to a recognized method for carrying out an attack in the context of cybersecurity. This term is(...) Read more
- Attack Code Description: The 'Attack Code' refers to a set of instructions designed to exploit vulnerabilities in computer systems or networks. These(...) Read more
- Attack Framework Description: The 'Attack Framework' is a structured approach that allows Red Teams to carry out and analyze simulated attacks in a controlled(...) Read more
- Attack Response Description: The 'Attack Response' refers to the actions and strategies implemented to mitigate or remediate the effects of a cyber attack. In(...) Read more
- Autonomous Database Description: An autonomous database is a database management system that uses machine learning and automation techniques to perform routine(...) Read more
- Active Data Description: Active data refers to data that is currently being used or processed in real-time within a system or application. This data is(...) Read more
- Application Database Description: An application database is a data management system specifically designed to support the needs of a particular application. Unlike(...) Read more