Technology, Science and Universe
Results for {phrase} ({results_count} of {results_count_total})
Displaying {results_count} results of {results_count_total}
o
- On-Premises DDoS Protection Description: Local DDoS protection refers to security solutions that are installed and managed directly within an organization's infrastructure(...) Read more
- Operational Playbook Description: An operational playbook in the context of DDoS (Distributed Denial of Service) protection is a documented set of procedures and(...) Read more
- Obsolete Protocols Description: Obsolete protocols are communication standards that have become outdated and, therefore, are susceptible to various(...) Read more
- Overlapping IP Addresses Description: Overlapping IP addresses refer to those IP addresses that are duplicated across different networks, which can complicate the(...) Read more
- Open Vulnerability Assessment System Description: The Open Vulnerability Assessment System is an open-source framework designed to facilitate the identification and assessment of(...) Read more
- OWASP Description: OWASP, which stands for Open Web Application Security Project, is a non-profit organization dedicated to improving software(...) Read more
- Operating System Vulnerability Description: Operating system vulnerability refers to inherent weaknesses in the software that manages a computer's hardware. These weaknesses(...) Read more
- Overexposed Data Description: ‘Overexposed Data’ refers to information that is accessible to unauthorized users due to incorrect configurations in storage(...) Read more
- Open Source Software Vulnerability Description: Open source software vulnerability refers to weaknesses or security flaws that can be found in programs whose source code is(...) Read more
- Overprivileged Accounts **Description:** Overprivileged accounts are user accounts that have more permissions than necessary to perform their specific functions within(...) Read more
- OAuth Vulnerabilities Description: OAuth vulnerabilities refer to security weaknesses in the OAuth protocol, which is an open standard for secure authorization of(...) Read more
- OpenSSL Vulnerabilities Description: OpenSSL vulnerabilities refer to security flaws found in the OpenSSL software library, which is widely used to implement security(...) Read more
- Overhead Vulnerabilities Description: Overhead vulnerabilities are security flaws that arise when a system consumes excessive resources or fails to manage workload(...) Read more
- Outdated Protocols Description: Outdated protocols are communication standards that have become obsolete and are therefore no longer considered safe for use in(...) Read more
- Open Web Application Security Testing Description: Open Web Application Security Testing is a testing methodology focused on identifying vulnerabilities in web applications. These(...) Read more