Technology, Science and Universe
Results for {phrase} ({results_count} of {results_count_total})
Displaying {results_count} results of {results_count_total}
j
- JWT (JSON Web Token) Description: JWT (JSON Web Token) is a compact and secure means of representing claims that are transferred between two parties. This token(...) Read more
- Job role-based access control Description: Role-Based Access Control (RBAC) is a security model that assigns permissions and privileges to users based on their roles within(...) Read more
- Joint Security Operations Center Description: The Joint Security Operations Center (JSOC) is a collaborative approach to security operations that combines resources and(...) Read more
- Juxtaposition of Security Policies Description: The juxtaposition of security policies in the context of 'Zero Trust in the cloud' refers to the comparison and alignment of(...) Read more
- JSON security Description: JSON security refers to the methods and practices implemented to protect data structures in JavaScript Object Notation (JSON)(...) Read more
- JavaScript Security Description: JavaScript security refers to the measures taken to protect JavaScript code and its execution environment from vulnerabilities.(...) Read more
- Job Function Segmentation Description: Job Function Segmentation is a security practice that involves dividing roles and responsibilities within an organization to limit(...) Read more
- Juvenile data protection Description: Youth data protection refers to the measures and policies implemented to safeguard minors' personal information in digital(...) Read more
- Java Applet Security Description: The security of Java applets refers to the measures implemented to protect users from vulnerabilities and threats that may arise(...) Read more
- Jailbreak Detection Description: Jailbreak detection is the process of identifying whether a device has been compromised by a jailbreak, which is a technique(...) Read more
- Java Runtime Environment Security Description: Java runtime environment security refers to the measures and practices implemented to protect Java applications and their runtime(...) Read more
- Joint Risk Assessment Description: Joint Risk Assessment is a collaborative approach that allows multiple stakeholders or organizations to identify, analyze, and(...) Read more
- Jargon-Free Security Policies Description: Jargon-free security policies are guidelines designed to be understandable by all users, regardless of their technical level. These(...) Read more
- Juvenile Cybersecurity Awareness Description: Youth Cybersecurity Awareness refers to educational initiatives designed to enhance young people's understanding and preparedness(...) Read more
- Java security policies Description: Java security policies are a set of guidelines and rules that govern the safe use of applications developed in this programming(...) Read more