Technology, Science and Universe
Results for {phrase} ({results_count} of {results_count_total})
Displaying {results_count} results of {results_count_total}
m
- Macro virusDescription: The macro virus is a type of malware that embeds itself in documents that use macros, especially in office applications. Macros are(...) Read more
s
- Security guardDescription: A security guard is a person responsible for monitoring and protecting information systems, as well as the physical and human(...) Read more
c
- Configuration vulnerabilityDescription: Configuration vulnerability refers to an inherent weakness in the configuration of a computer system that can be exploited by an(...) Read more
a
- Access vulnerabilityDescription: Access vulnerability refers to a weakness in an access control system that allows unauthorized users to gain access to sensitive(...) Read more
c
- Credential vulnerabilityDescription: Credential vulnerability refers to a weakness in the handling and storage of user credentials, such as usernames and passwords,(...) Read more
s
- system vulnerabilityDescription: A system vulnerability is defined as a weakness in a system that can be exploited to compromise its integrity, confidentiality, or(...) Read more
d
- Data vulnerabilityDescription: Data vulnerability refers to a weakness in an information system that can be exploited to gain unauthorized access to sensitive(...) Read more
w
- Wireless network vulnerabilityDescription: Wireless network vulnerability refers to a weakness in networks that use wireless technology for data transmission, which can be(...) Read more
m
- Malicious software vulnerabilityDescription: Malicious software vulnerability refers to a defect or weakness in the code of a program designed to cause harm, steal information,(...) Read more
a
- Authentication vulnerabilityDescription: Authentication vulnerability refers to a weakness in the identity verification process of a user that can be exploited by attackers(...) Read more
v
- Virtual private network (VPN) vulnerabilityDescription: A virtual private network (VPN) vulnerability refers to a weakness in the infrastructure or implementation of a VPN that can be(...) Read more
p
- Protocol vulnerabilityDescription: Protocol vulnerability refers to an inherent weakness in a communication protocol that can be exploited by an attacker to(...) Read more
v
- Vuln Description: The 'vuln' is a commonly used abbreviation in the field of cybersecurity that refers to a vulnerability. In this context, a(...) Read more
- Vuln Hunter Description: A vulnerability hunter is a person or tool that actively seeks vulnerabilities in computer systems, networks, and applications.(...) Read more
- Vulnerability Metrics Description: Vulnerability metrics are quantitative measures used to assess the severity of vulnerabilities in computer systems and networks.(...) Read more