key.com

Website:https://www.key.com/personal/index.jsp
Upvotes received0
Downvotes received0
Karma:0 (upvotes-downvotes)



0 earned Badges

No badges were found



Definitions (23)

1

0 Thumbs up   0 Thumbs down

A   B   C   D   E


   F   G   H   I   J   K   L   M   N   O   P   Q   R   S   T   U   V   W   X   Y   Z
Source: key.com

2

0 Thumbs up   0 Thumbs down

Authentication


A security measure designed to verify the identity of a transmission, user, user device, entity, or data.
Source: key.com

3

0 Thumbs up   0 Thumbs down

Back door


 Hidden software or hardware mechanism used to get around security controls.
Source: key.com

4

0 Thumbs up   0 Thumbs down

Card skimmers


A means of electronically capturing information from credit or debit card readers, such as ATMs
Source: key.com

5

0 Thumbs up   0 Thumbs down

Data Driven Attack


Malicious code that is embedded in seemingly safe data to break through firewalls
Source: key.com

6

0 Thumbs up   0 Thumbs down

Dictionary Attack


A decryption method that successively tries all similar words in a lengthy list
Source: key.com

7

0 Thumbs up   0 Thumbs down

Firewall


Hardware or software that permits only authorized users to enter, and logs attempted intrusions
Source: key.com

8

0 Thumbs up   0 Thumbs down

Flooding


Insertion of a large volume of data that results in service denial
Source: key.com

9

0 Thumbs up   0 Thumbs down

Hacker


An individual who attempts to gain unauthorized access to an information system 
Source: key.com

10

0 Thumbs up   0 Thumbs down

malicious code


Any type of software capable of performing an unauthorized process on an information system
Source: key.com


To view all 23 definitions, please sign in.