Information about cyber threats used to proactively defend against attacks.
An authentication method requiring two different types of verification to access a system.
A hardware security component used for cryptographic operations and secure storage.
A method where users authenticate using tokens instead of passwords.
Protecting data collected remotely from devices or applications.
A technique that monitors communication patterns to infer sensitive information.
Malware disguised as legitimate software to trick users into executing it.
A temporary passcode that changes based on time for authentication.
Mechanisms to identify and respond to unauthorized modifications of devices or data.
Protocols used to encapsulate network traffic within another network to enhance security.
A physical security breach where an unauthorized person follows an authorized individual into a restricted area.
The process of identifying and evaluating security threats in a system.
A cyberattack where attackers register misspelled domain names to trick users into visiting malicious sites.
Security measures to protect TCP communications from cyber threats.
Proactively searching for security threats that have evaded detection.
A cryptographic protocol used to secure communications over the internet.
A proxy server that intercepts requests without requiring client configuration.
A race condition attack that exploits timing vulnerabilities in software execution.
A cybersecurity training scenario where teams practice responding to incidents.
A hidden security vulnerability in software that allows unauthorized access.