Encryption
Definition: Encryption is taking your text, data or other communications and encoding it so that those who should not see or hear it will not be able to. An encrypted file will appear as gibberish unless you have the password […]
Definition: Encryption is taking your text, data or other communications and encoding it so that those who should not see or hear it will not be able to. An encrypted file will appear as gibberish unless you have the password […]
Definition: Email spoofing is the act of forging the header information on an email so that it appears to have originated from somewhere other than its true source. The protocol used for email, SMTP (Simple Mail Transfer Protocol), does not
Definition: Dumpster diving is a fancy, glorified way of saying “trash picking”. Dumpster diving, or trash picking, can lead to information which could be used to compromise a network or identity. If you discard bank statements, credit card statements or
Definition: The Domain Name System (DNS) was created to provide a way to translate domain names to their corresponding IP addresses. It is easier for users to remember the domain name, such as yahoo.com, than to try and remember the
Definition: Dynamic Host Configuration Protocol (DHCP) is used to automate the assignment of IP addresses to Hosts on a network. Each machine on the network must have a unique address. Rather than manually having to enter the IP address, track
Definition: A denial of service (DoS) attack floods a network with an overwhelming amount of traffic, slowing its response time for legitimate traffic or grinding it to a halt completely. The more common attacks use built-in features of the TCP/IP
Definition: A neutral zone or buffer that separates the internal and external networks. The DMZ (demilitarized zone) usually exists between two firewalls. External users can access servers in the DMZ, but not the computers on the internal network. The servers
Definition: The term cyberterrorism is used to describe officially sanctioned hacking as a political or military tool. Some hackers have used stolen information, or the threat of stealing information, as a tool to attempt to extort money from companies.
Definition: Cross site scripting (XSS) refers to the ability to use some of the functionality of active scripting against the user by inserting malicious code into the HTML that will run code on the user’s computer, redirect them to a
Cross-Site Scripting Read More »