Flaw
Definition: A flaw can refer to either a Bug, in the case of a flaw in the actual code of an application or operating system, or a flaw could be a vulnerability, in the case of a weakness or oversight […]
Definition: A flaw can refer to either a Bug, in the case of a flaw in the actual code of an application or operating system, or a flaw could be a vulnerability, in the case of a weakness or oversight […]
Definition: Basically, a firewall is a protective barrier between your computer, or internal network, and the outside world. Traffic into and out of the firewall is blocked or restricted as you choose. By blocking all unnecessary traffic and restricting other
Definition: An exploit is a term used to describe an attack against a specific vulnerability. The attack “exploits” or takes advantage of a certain vulnerability in order to compromise a target system in some way.
Definition: Encryption is taking your text, data or other communications and encoding it so that those who should not see or hear it will not be able to. An encrypted file will appear as gibberish unless you have the password
Definition: Email spoofing is the act of forging the header information on an email so that it appears to have originated from somewhere other than its true source. The protocol used for email, SMTP (Simple Mail Transfer Protocol), does not
Definition: Dumpster diving is a fancy, glorified way of saying “trash picking”. Dumpster diving, or trash picking, can lead to information which could be used to compromise a network or identity. If you discard bank statements, credit card statements or
Definition: The Domain Name System (DNS) was created to provide a way to translate domain names to their corresponding IP addresses. It is easier for users to remember the domain name, such as yahoo.com, than to try and remember the
Definition: Dynamic Host Configuration Protocol (DHCP) is used to automate the assignment of IP addresses to Hosts on a network. Each machine on the network must have a unique address. Rather than manually having to enter the IP address, track
Definition: A denial of service (DoS) attack floods a network with an overwhelming amount of traffic, slowing its response time for legitimate traffic or grinding it to a halt completely. The more common attacks use built-in features of the TCP/IP