All | # A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
There are currently 27 names in this directory
A computer security audit is a manual or systematic measurable technical assessment of a system or application.

Brute Force
In cryptography, a brute-force attack consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing correctly. The attacker systematically checks all possible passwords and passphrases until the correct one is found. 

Burp Suite
Burp or Burp Suite is a graphical tool for testing Web application security.

Confidentiality, Integrity & Availability
Confidentiality, integrity and availability, also known as the CIA triad, is a model designed to guide policies for information security within an organization. The elements of the triad are considered the three most crucial components of security.

Cyber attacks
In computer networks and websites an attack is any attempt to expose, alter, disable, destroy, steal or gain unauthorized access to or make unauthorized use of an value resource.

Cybersecurity or IT security is the protection of computer systems from theft or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide.

Data breach
A data breach is the intentional or unintentional release of secure or private/confidential information to an untrusted environment.

A defacement is an attack on a website that changes the visual appearance of the site or a webpage.

Denial of Service (DDoS)
A denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.

It is a software tool designed to take advantage of a flaw in a computer system, typically for malicious purposes.

Computer forensics (also known as computer forensic science) is a branch of digital forensic science pertaining to evidence found in computers and digital storage media.

Google Dorks
Google hacking, also named Google dorking, is a computer hacking technique that uses Google Search and other Google applications to find security holes in the configuration and computer code that websites use

A computer hacker is any skilled computer expert that uses their technical knowledge to overcome a problem. Someone who, with their technical knowledge, uses bugs or exploits to break into computer systems.

Hardening is the process of securing a system by reducing its surface of vulnerability.

Information Gathering
Data collection is the process of gathering information and measuring information on targeted variables in an established system, which then enables one to answer relevant questions and evaluate outcomes.

ISO 27001
ISO/IEC 27001 is an information security standard, developed to provide a model for establishing, implementing, operating, monitoring, reviewing, maintaining and improving an information security management system (ISMS).

Malicious Redirect
Website redirects or DNS redirection is the practice of subverting the resolution of Domain Name System (DNS) queries, where site visitors are automatically redirected to malicious websites.

Malware (malicious software) is any software intentionally designed to cause damage to a computer, server or computer network. Malware does the damage after it is implanted or introduced in some way into a target’s computer and can take the form of executable code, scripts, active content, and other software.

The Open Web Application Security Project (OWASP), an online community, produces freely-available articles, methodologies, testing guides, tools, and technologies in the field of web application security.

Penetration Testing
It is a penetration test, colloquially known as a pentest, is an authorized simulated attack on a computer system, performed to evaluate the security of the system.

Ransomware is a type of malicious software from cryptovirology that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid.

Risk is commonly defined as threat or vulnerability. It applies to anything that could be exposing you to danger, such as individuals.

Web scraping, web harvesting, or web data extraction is data scraping used for extracting data from websites.

Spammers use the messaging systems to send an unsolicited message (spam), especially advertising, as well as sending messages repeatedly on the same site.

A threat is anything that has the potential to cause serious harm to an informatic system, possibly lead to attacks on computer systems, networks or others.

A weakness which can be exploited by an attacker to perform unauthorized actions within a computer system. To exploit a vulnerability, an attacker must have at least one applicable tool or technique that can connect to a system weakness.

Vulnerability Scanner
A vulnerability scanner is a computer program designed to assess computers, networks or applications for known weaknesses. In plain words, these scanners are used to discover the weaknesses of a given system.

Need a customised Security Solution?

We are pleased to help.

Do you have any questions?

Feel free to send us a message

By using this form you agree with the storage and handling of your data by this website.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Notify Incident

Notify Incident

By using this form you agree with the storage and handling of your data by this website.

WordPress Appliance - Powered by TurnKey Linux