dcsimg

SECURITY ARCHIVES - Page 84

Secure Sockets Layer

01 Jan, 2009

The Secure Sockets Layer protocol secures data transmitted over the Internet

Single Sign-On

01 Jan, 2009

Single sign-on streamlines authentication and authorization, saves money

Cyber Terrorism

01 Jan, 2009

Forget what you saw on '24' and in the movies. The reality is far more frightening

DoS Attacks

01 Jan, 2009

By paying too much attention to a server, criminals may cause it to pay attention to no one

Identity Theft

01 Jan, 2009

Personal information is like gold to bad guys, but that gold belongs to you

Pharming

01 Jan, 2009

Pharming takes people to fake sites that steal personal data to be used for identity theft

Phishing

01 Jan, 2009

Phishing e-mails, which can look real or laughable, increasingly are targeted and sophisticated

Spam

01 Jan, 2009

Spam is annoying and dangerous. It's also impossible to stop and effective for crooks

Encryption

01 Jan, 2009

Properly scrambling sensitive data makes it worthless to crooks.

Botnets

01 Jan, 2009

Storm and other botnets are armies of unwilling computer soldiers serving organized crime

Rootkits

01 Jan, 2009

Want to make some potent malware even more dangerous? Just make it invisible

Trojans

01 Jan, 2009

As in the Greek saga, a Trojan horse looks like one thing but really is another

Viruses and Worms

01 Jan, 2009

Viruses attach themselves to other programs while worms are standalone pieces of bad news

Anti-Spyware

01 Jan, 2009

Anti-spyware, now a security best practice, is packaged with antivirus and other software

Anti-Virus Solutions

01 Jan, 2009

Antivirus solutions compare files against a virus database or look for suspicious activity

Content Filtering

01 Jan, 2009

Content filtering rides herd on what is leaving and entering an organization

E-mail Security

01 Jan, 2009

E-mail can carry direct infections or use social-engineering tricks get users to do something dangerous

Firewall

01 Jan, 2009

Firewalls are evolving as the perimeter becomes porous and Web 2.0 throws up security challenges

Internal Threat

01 Jan, 2009

The internal threat echoes Walt Kelly's Pogo: 'We have met the enemy, and he is us'

Intrusion-Detection Systems

01 Jan, 2009

Intrusion-detection systems sound alarms when hackers try to invade the enterprise network

First « Prev |  80 | 81 | 82 | 83 | 84|85 | Next »
Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

By submitting your information, you agree that itbusinessedge.com may send you ITBbusinessEdge offers via email, phone and text message, as well as email offers about other products and services that ITBbusinessEdge believes may be of interest to you. ITBbusinessEdge will process your information in accordance with the Quinstreet Privacy Policy.


×
We have made updates to our Privacy Policy to reflect the implementation of the General Data Protection Regulation.