A security solution that aggregates and analyzes security data to detect and respond to threats.
A cryptographic protocol used to establish secure communications over a network.
An attack where an attacker takes control of a user's session to gain unauthorized access.
A cyberattack targeting vulnerabilities in a supplier’s system to compromise its clients.
Manipulating individuals to disclose confidential information through deception or coercion.
A centralized team responsible for monitoring, detecting, and responding to cybersecurity incidents.
A method to create encrypted connections between computers using the SSH protocol.
The practice of hiding information within files or images to evade detection.
Techniques used by malware to detect and bypass security sandboxes.
An attack that injects malicious SQL queries to manipulate a database.
A security standard ensuring that only trusted software loads during system startup.
Malicious software designed to secretly collect user information.
An approach where security measures are integrated into software development from the beginning.
Unauthorized IT systems or applications used within an organization without approval.
A physical or digital device used for authentication to secure access to systems.
A phishing attack conducted through SMS messages to steal personal information.
An attack that exploits information gained from the physical implementation of a system.
Development practices that minimize security vulnerabilities in software.
A buffer overflow attack that overwrites memory to execute arbitrary code.
A comprehensive list of components in a software product for security assessment.