ecsc.co.uk

Website:http://ecsc.co.uk
Upvotes received2
Downvotes received1
Karma:2 (upvotes-downvotes)



0 earned Badges

No badges were found



Definitions (63)

1

1 Thumbs up   0 Thumbs down

SQL Injection


SQL Injection is an exploit in which the attacker adds code to a web form entry field to gain access to resources or make changes to data.
Source: ecsc.co.uk

2

1 Thumbs up   0 Thumbs down

SQL injection


SQL Injection is an exploit in which the attacker adds code to a web form entry field to gain access to resources or make changes to data.
Source: ecsc.co.uk

3

1 Thumbs up   1 Thumbs down

Quick Links


About
Source: ecsc.co.uk

4

1 Thumbs up   1 Thumbs down

Quick links


About
Source: ecsc.co.uk

5

0 Thumbs up   0 Thumbs down

Authentication


Authentication is the process of confirming a user's claimed identity is correct.
Source: ecsc.co.uk

6

0 Thumbs up   0 Thumbs down

Access control


Access Control refers to a set of processes and/or procedures which ensure that resources are only granted to authorised and required users.
Source: ecsc.co.uk

7

0 Thumbs up   0 Thumbs down

blacklist


A blacklist is a list of entities that are considered to be unacceptable/untrustworthy and are denied access or privileges.
Source: ecsc.co.uk

8

0 Thumbs up   0 Thumbs down

Botnet


A botnet is a collection of internet-connected computers that are infected with malicious software that allows an attacker to control them without their owner's knowledge, often with the purp [..]
Source: ecsc.co.uk

9

0 Thumbs up   0 Thumbs down

business continuity management


Business Continuity Management is the area of planning for how business operations will be maintained following significant disruption.
Source: ecsc.co.uk

10

0 Thumbs up   0 Thumbs down

ciphertext


Ciphertext refers to data that has been encrypted; hence, plaintext that has been encrypted becomes ciphertext.
Source: ecsc.co.uk


To view all 63 definitions, please sign in.