Technology, Science and Universe
Results for {phrase} ({results_count} of {results_count_total})
Displaying {results_count} results of {results_count_total}
i
- Incident Log Description: Incident logging is a critical component in security management and incident response, consisting of a detailed record of events(...) Read more
- Incident Command Description: The Incident Command is a structure and process designed to effectively manage incidents, ensuring a quick and organized response(...) Read more
- Interception Description: Interception is the act of capturing data as it is transmitted over a network. This process can occur intentionally or accidentally(...) Read more
- Intellectual Property Theft Description: Intellectual property theft refers to the unauthorized use or distribution of original creations, such as patents, copyrights,(...) Read more
- Information Systems Security Description: Information systems security refers to the protection of information systems against unauthorized access, use, disclosure,(...) Read more
- Information Warfare Description: Information Warfare refers to the strategic use of information technology to gain a competitive advantage over adversaries, whether(...) Read more
- Information Disclosure Description: Unauthorized disclosure of confidential information refers to the act of revealing sensitive data without proper consent. This(...) Read more
- Information Systems Description: Information Systems (IS) are an integrated set of components that allow for the collection, storage, and processing of data. These(...) Read more
- Insecure Direct Object References Description: Insecure Direct Object References (IDOR) are a type of access control vulnerability that occurs when an application provides direct(...) Read more
- Information Technology Audit Description: Information Technology (IT) Audit refers to a systematic examination of management controls within an information technology(...) Read more
- Insecure Protocols Description: Insecure protocols are those that do not implement adequate security measures, making them vulnerable to various types of cyber(...) Read more
- Intelligent Threats Description: Intelligent Threats refer to a set of advanced cyber attacks that employ sophisticated techniques to bypass traditional security(...) Read more
- Identity-based Access Control Description: Identity-Based Access Control (IBAC) is a security model that grants access to resources and systems based on the identity of the(...) Read more
- Internal Firewall Description: An internal firewall is a security system implemented within a network to protect internal resources and data from external(...) Read more
- Intrusion Prevention Description: Intrusion prevention refers to the set of practices and technologies designed to stop unauthorized access to a network or system.(...) Read more