Information_Security
Ranked by notability
34
Articles
0
Images
27
Keywords Tracked
6
Websites Tracked
218,040
Monthly Searches
1
Pages
Browse by Type
Threat Modelling (7)
Computer Security Model (4)
Cybersecurity (2)
Computer Security (2)
De Facto Standard (1)
Information Security (1)
Instruction Set Extension (1)
Professional Secrecy (1)
Project (1)
Mobile Security (1)
Action (1)
Software (1)
Business (1)
Cloud Security (1)
Communication Protocol (1)
Computer Security Model (4)
Cybersecurity (2)
Computer Security (2)
De Facto Standard (1)
Information Security (1)
Instruction Set Extension (1)
Professional Secrecy (1)
Project (1)
Mobile Security (1)
Action (1)
Software (1)
Business (1)
Cloud Security (1)
Communication Protocol (1)
access control
Intangible
selective restriction of access to a place or other resource, allowing only authorized users
Same origin policy
Thing
The idea is to organize content based on the origin from which it arrives at the browser, preventing
Bell–LaPadula model
Thing
state machine model used for enforcing access control in government and military applications
red team
Thing
group tasked with providing security feedback to an organization by playing the role of an enemy or
Common Vulnerability Scoring System
CreativeWork
standard for assessing computer system vulnerabilities
Juice jacking
Thing
mobile security risk
automotive security
Thing
branch of computer security related to the automotive context
Wireless Transport Layer Security
CreativeWork
WAP security protocol
STRIDE
class
Process for modelling software security threats, standing for Spoofing, Tampering, Repudiation, Info
Admission control
Thing
a validation process for connections in communication systems
Cisco ASA
Thing
widely used multi-function Adaptive Security Appliance by Cisco Systems
Capability Hardware Enhanced RISC Instructions
Thing
computer architecture for security
HRU
Thing
computer security model
Attack tree
class
conceptual diagrams showing how an asset, or target, might be attacked, often used to describe threa
Graham-Denning model
Thing
computer security model
Clean Network Project
Intangible
American government program and policy regarding China
Group-IB
Organization
Global cybersecurity technology company
deception technology
Thing
category of computer security defense
Bangladesh e-Government Computer Incident Response Team
Thing
National cybersecurity agency of Bangladesh
TraceX Guard
Thing
Real-Time Antivirus & Mobile Security App
Hudson Rock (Company)
Organization
Israeli cybersecurity company co-founded by Alon Gal
PPAP
Thing
security theater often seen in Japan, i.e. sending a password-protected zip file and the password in
LA Cyber Lab
Thing
nonprofit cybersecurity for small business in Los Angeles
hTMM
Thing
Hybrid Threat Modeling Method
Trike
Thing
Methodology for threat modelling
hard drive destruction
Thing
The act of destroying a hard disk drive or similar digital storage devices to preventing the retriev
LINDDUN
Thing
Process for threat modelling, standing for linkability, identifiability, nonrepudiation, detectabili
CERT-GIB
Organization
Computer Emergency Response Team Group-IB
Trustbox
SoftwareApplication
security and backup software
OCTAVE
Thing
the Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE), an approach for man
VAST
Thing
The Visual, Agile, and Simple Threat (VAST) Modeling method
address restricted
Thing
designation by an official archaeological or historic preservation authority that a cultural site's
Security Cards
Thing
Process to identify unusual and complex attacks with help from a deck of cards.
cameraftp
Thing
cloud surveillance and recording service
1