A harmful, destructive or intrusive computer software such as a virus, worm, Trojan or spyware that constantly changes
The fraudulent practice of sending emails ostensibly from a known or trusted sender in order to induce targeted individuals to reveal confidential information
Is an anomaly where a program, while writing data to a buffer, overruns the buffer's boundary and overwrites adjacent memory locations
Software products and services combine security information management and security event management. They provide real-time analysis of security alerts generated by applications and network hardware.
A short-range wireless connectivity standard (Ecma-340, ISO/IEC 18092) that uses magnetic field induction to enable communication between devices when they're touched together, or brought within a few centimeters of each other.
A computer program that records every keystroke made by a computer user, especially in order to gain fraudulent access to passwords and other confidential information.
Searching through trash or garbage looking for useful information that may help an individual get access to a particular network
An attack that is yet unknown to the software maker or to antivirus vendors.
A computer networking solution that uses a set of protocols to define and implement a policy that describes how to secure access to network nodes by devices when they initially attempt to access the network.
Used to remove restrictions imposed by the manufacturer or operator, e.g. to allow the installation of unauthorized software.
A piece of software that allows a remote "operator" to control a system as if he has physical access to that system.
A simple denial of service condition that happens when the resources required to execute an action are entirely expended, preventing that action from occurring
A list of permissions attached to an object that specifies which users or system processes are granted access to objects, as well as what operations are allowed on given objects.
A model where employees choose from a limited selection of approved, corporate-liable devices with the pre-configured security and control that IT needs to protect company data.
A set of instructions secretly incorporated into a program so that if a particular condition is satisfied they will be carried out, usually with harmful effects
The fraudulent practice of directing Internet users to a bogus website that mimics the appearance of a legitimate one, in order to obtain personal information such as passwords, account numbers, etc.
It describes a set of situations that can occur in data centers that result in poor hardware resource utilization, poor system and software level security, and wasted energy.
A protection feature built into many firewalls that allow the administrator to tweak the tolerance for unanswered login attacks. It tracks network traffic to identify scenarios that will overwhelm our network through conditions such as SYN, ping, port floods, etc.
A type of security software used by an IT department to monitor, manage and secure employees' mobile devices that are deployed across multiple mobile service providers and across multiple mobile operating systems being used in the organization.
A computer virus that contains a variety of mechanisms specifically coded to make its detection and decryption very difficult
A security exploit in which the attacker seeks to compromise a specific group of end users by infecting websites that members of the group are known to visit
A failure in a program to release discarded memory, causing impaired performance or failure
A physical computing device that safeguards and manages digital keys for strong authentication and provides cryptoprocessing. These modules traditionally come in the form of a plug-in card or an external device that attaches directly to a computer or network server.
A term used mostly on the Internet, similar to "upload" and "download", but in reference to the process of transferring data between two local devices, in particular between a computer and a mobile device such as a mobile phone, smartphone, PDA, tablet, portable media player or e-reader