Technology, Science and Universe
Results for {phrase} ({results_count} of {results_count_total})
Displaying {results_count} results of {results_count_total}
i
- Intellectual Property Theft Description: Intellectual property theft refers to the unauthorized use or distribution of original creations, such as patents, copyrights,(...) Read more
- Information Systems Security Description: Information systems security refers to the protection of information systems against unauthorized access, use, disclosure,(...) Read more
- Information Warfare Description: Information Warfare refers to the strategic use of information technology to gain a competitive advantage over adversaries, whether(...) Read more
- Information Disclosure Description: Unauthorized disclosure of confidential information refers to the act of revealing sensitive data without proper consent. This(...) Read more
- Information Systems Description: Information Systems (IS) are an integrated set of components that allow for the collection, storage, and processing of data. These(...) Read more
- Insecure Direct Object References Description: Insecure Direct Object References (IDOR) are a type of access control vulnerability that occurs when an application provides direct(...) Read more
- Information Technology Audit Description: Information Technology (IT) Audit refers to a systematic examination of management controls within an information technology(...) Read more
- Insecure Protocols Description: Insecure protocols are those that do not implement adequate security measures, making them vulnerable to various types of cyber(...) Read more
- Intelligent Threats Description: Intelligent Threats refer to a set of advanced cyber attacks that employ sophisticated techniques to bypass traditional security(...) Read more
- Identity-based Access Control Description: Identity-Based Access Control (IBAC) is a security model that grants access to resources and systems based on the identity of the(...) Read more
- Internal Firewall Description: An internal firewall is a security system implemented within a network to protect internal resources and data from external(...) Read more
- Intrusion Prevention Description: Intrusion prevention refers to the set of practices and technologies designed to stop unauthorized access to a network or system.(...) Read more
- Intelligent Firewall Description: An intelligent firewall is a network security system that uses advanced techniques to analyze data traffic and make informed(...) Read more
- Intrusion Analysis Description: Intrusion analysis is the process of examining data generated by intrusion detection systems (IDS) and intrusion prevention systems(...) Read more
- Intrusion Detection Signature Description: The 'Intrusion Detection Signature' refers to a predefined pattern used by intrusion detection systems (IDS) and intrusion(...) Read more