Security

Ranked by notability

38
Articles
0
Images
30
Keywords Tracked
6
Websites Tracked
776,230
Monthly Searches
1
Pages

Browse by Type

Threat Modelling (7)
Computer Security Model (4)
Cybersecurity (2)
Computer Security (2)
De Facto Standard (1)
Expedited Border Crossing Scheme (1)
Information Security (1)
Instruction Set Extension (1)
Mobile App (1)
Professional Secrecy (1)
Project (1)
Mobile Security (1)
Action (1)
Software (1)
Business (1)

access control
Intangible
selective restriction of access to a place or other resource, allowing only authorized users
Same origin policy
Thing
The idea is to organize content based on the origin from which it arrives at the browser, preventing
Bell–LaPadula model
Thing
state machine model used for enforcing access control in government and military applications
red team
Thing
group tasked with providing security feedback to an organization by playing the role of an enemy or
cloud security
class
broad set of policies, technologies, applications, and controls utilized to protect virtualized IP,
Common Vulnerability Scoring System
CreativeWork
standard for assessing computer system vulnerabilities
Juice jacking
Thing
mobile security risk
Global Entry
Legislation
U.S. Customs and Border Protection service traveler program
automotive security
Thing
branch of computer security related to the automotive context
Wireless Transport Layer Security
CreativeWork
WAP security protocol
STRIDE
class
Process for modelling software security threats, standing for Spoofing, Tampering, Repudiation, Info
Admission control
Thing
a validation process for connections in communication systems
Cisco ASA
Thing
widely used multi-function Adaptive Security Appliance by Cisco Systems
Capability Hardware Enhanced RISC Instructions
Thing
computer architecture for security
Graham-Denning model
Thing
computer security model
Attack tree
class
conceptual diagrams showing how an asset, or target, might be attacked, often used to describe threa
HRU
Thing
computer security model
Clean Network Project
Intangible
American government program and policy regarding China
deception technology
Thing
category of computer security defense
Group-IB
Organization
Global cybersecurity technology company
TraceX Guard
Thing
Real-Time Antivirus & Mobile Security App
Bangladesh e-Government Computer Incident Response Team
Thing
National cybersecurity agency of Bangladesh
PPAP
Thing
security theater often seen in Japan, i.e. sending a password-protected zip file and the password in
Hudson Rock (Company)
Organization
Israeli cybersecurity company co-founded by Alon Gal
LA Cyber Lab
Thing
nonprofit cybersecurity for small business in Los Angeles
cameraftp
Thing
cloud surveillance and recording service
Security Cards
Thing
Process to identify unusual and complex attacks with help from a deck of cards.
address restricted
Thing
designation by an official archaeological or historic preservation authority that a cultural site's
VAST
Thing
The Visual, Agile, and Simple Threat (VAST) Modeling method
OCTAVE
Thing
the Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE), an approach for man
Trustbox
SoftwareApplication
security and backup software
US Vegan Climate ETF
Organization
exchange-traded fund
CERT-GIB
Organization
Computer Emergency Response Team Group-IB
LINDDUN
Thing
Process for threat modelling, standing for linkability, identifiability, nonrepudiation, detectabili
AT GO
MobileApplication
ATFX mobile app: MT4 accounts with 300+ instruments including forex, metals, energies, commodities,
hard drive destruction
Thing
The act of destroying a hard disk drive or similar digital storage devices to preventing the retriev
hTMM
Thing
Hybrid Threat Modeling Method
Trike
Thing
Methodology for threat modelling