A device with an internal battery that allows connected devices to run for at least a short time
The group responsible for defending an enterprise’s use of information systems
A symmetric-key cryptographic algorithm that transforms one block of information
Unique symbol or character string used by an information system
A program that prevents access to undesirable Web sites, typically by comparing a
A computer that provides World Wide Web (WWW) services on the Internet.
Store files containing malware in isolation for future disinfection or examination.
The transmission of packetized voice using the internet protocol (IP)
Individual or (system) process authorized to access an information system.
Security controls for an information system that are primarily implemented
The ability for an organization’s employees and contractors to conduct work
A uniform resource locator, or URL, is a short string containing an address
Information that does not require safeguarding or dissemination controls
POODLE is referred to as both a downgrade attack, and a man-in-the-middle exploit.
Man in the Middle. An attack using active interception or eavesdropping.
Plain text is simple text displayed in a readable format. Encryption converts plain text
Security testing that does not involve any direct interaction with the targets
An event involving the exposure of information to entities not authorized access
Data on a live system that is lost after a computer is powered down.
A digital certificate containing a public key for an entity and a name for that entity..
A flexible text format designed to describe data for electronic publishing.
Security exploit where the attacker infects websites that are frequently visited
An attack that exploits a previously unknown hardware, firmware, or software
A person gains logical or physical access without permission to a network,
A discussion-based exercise where personnel with roles and responsibilities
The means used to associate a set of security attributes with a specific information object
A process or mechanism for encrypting and decrypting XML documents or parts