Search this site
Embedded Files
Skip to main content
Skip to navigation
DEFINITIONS
Home
Malware / Threats
101 - Virus
102 - Worm
103 - Trojan Horse
104 - Ransomware
105 - Scareware
106 - Adware
107 - Spyware
108 - Rootkit
109 - Botnet
110 - Backdoor
201 - Phishing
202 - DDoS Attack
203 - MitM (Man-In-The-Middle) Attack
204 - SQL Injection
205 - Cross-Site Scripting (XSS)
206 - DNS Spoofing
207 - Packet Sniffing
208 - Eavesdropping
209 - Brute Force Attack
210 - ARP Spoofing
Protective Measures
301 - Encryption
302 - Data Protection
303 - Two Factor Authentication (2FA)
304 - Data Masking
305 - Anonymization
306 - Data Loss Prevention (DLP)
307 - Digital Rights Management (DRM)
308 - Privacy Policy
309 - Identity and Access Management (IAM)
310 - Data Retention Policy
401 - Symmetric Encryption
402 - Asymmetric Encryption
403 - Hash Function
404 - Digital Signature
405 - Cryptographic Protocols
406 - Public Key Infrastructure (PKI)
407 - Cryptanalysis
408 - Key Exchange
409 - Steganography
410 - Zero-Knowledge Proof
Security Practices and Policies
501 - Security Awareness Training
502 - Incident Response Plan
503 - Security Policy
504 - Vulnerability Management
505 - Risk Assessment
506 - Penetration Testing
507 - Access Control
508 - Network Security
509 - Patch Management
510 - Business Continuity Plan (BCP)
PUPs
Browser Hijackers
DEFINITIONS
Home
Malware / Threats
101 - Virus
102 - Worm
103 - Trojan Horse
104 - Ransomware
105 - Scareware
106 - Adware
107 - Spyware
108 - Rootkit
109 - Botnet
110 - Backdoor
201 - Phishing
202 - DDoS Attack
203 - MitM (Man-In-The-Middle) Attack
204 - SQL Injection
205 - Cross-Site Scripting (XSS)
206 - DNS Spoofing
207 - Packet Sniffing
208 - Eavesdropping
209 - Brute Force Attack
210 - ARP Spoofing
Protective Measures
301 - Encryption
302 - Data Protection
303 - Two Factor Authentication (2FA)
304 - Data Masking
305 - Anonymization
306 - Data Loss Prevention (DLP)
307 - Digital Rights Management (DRM)
308 - Privacy Policy
309 - Identity and Access Management (IAM)
310 - Data Retention Policy
401 - Symmetric Encryption
402 - Asymmetric Encryption
403 - Hash Function
404 - Digital Signature
405 - Cryptographic Protocols
406 - Public Key Infrastructure (PKI)
407 - Cryptanalysis
408 - Key Exchange
409 - Steganography
410 - Zero-Knowledge Proof
Security Practices and Policies
501 - Security Awareness Training
502 - Incident Response Plan
503 - Security Policy
504 - Vulnerability Management
505 - Risk Assessment
506 - Penetration Testing
507 - Access Control
508 - Network Security
509 - Patch Management
510 - Business Continuity Plan (BCP)
PUPs
Browser Hijackers
More
Home
Malware / Threats
101 - Virus
102 - Worm
103 - Trojan Horse
104 - Ransomware
105 - Scareware
106 - Adware
107 - Spyware
108 - Rootkit
109 - Botnet
110 - Backdoor
201 - Phishing
202 - DDoS Attack
203 - MitM (Man-In-The-Middle) Attack
204 - SQL Injection
205 - Cross-Site Scripting (XSS)
206 - DNS Spoofing
207 - Packet Sniffing
208 - Eavesdropping
209 - Brute Force Attack
210 - ARP Spoofing
Protective Measures
301 - Encryption
302 - Data Protection
303 - Two Factor Authentication (2FA)
304 - Data Masking
305 - Anonymization
306 - Data Loss Prevention (DLP)
307 - Digital Rights Management (DRM)
308 - Privacy Policy
309 - Identity and Access Management (IAM)
310 - Data Retention Policy
401 - Symmetric Encryption
402 - Asymmetric Encryption
403 - Hash Function
404 - Digital Signature
405 - Cryptographic Protocols
406 - Public Key Infrastructure (PKI)
407 - Cryptanalysis
408 - Key Exchange
409 - Steganography
410 - Zero-Knowledge Proof
Security Practices and Policies
501 - Security Awareness Training
502 - Incident Response Plan
503 - Security Policy
504 - Vulnerability Management
505 - Risk Assessment
506 - Penetration Testing
507 - Access Control
508 - Network Security
509 - Patch Management
510 - Business Continuity Plan (BCP)
PUPs
Browser Hijackers
110 - Backdoor
Google Sites
Report abuse
Google Sites
Report abuse