Critical infrastructure security

Critical infrastructure security refers to the security of systems and assets that are essential to the functioning of a society or enterprise. These systems and assets may include, but are not limited to, communications, transportation, energy, financial, and government systems. The security of critical infrastructure is a shared responsibility among all levels of government, the … Read more

Fast flux DNS

“Fast flux DNS” is a technique used by hackers to make it difficult to track and shutdown their websites and other online resources. The term “fast flux” refers to the way in which the hackers change the IP address associated with their domain name very rapidly – often every few minutes – making it hard … Read more

SANS Institute

The SANS Institute is a professional organization that specializes in providing training and certifications in the field of network security. The organization was founded in 1989 and is headquartered in Bethesda, Maryland. The SANS Institute offers a variety of courses and programs that cover topics such as ethical hacking, forensics, and incident response. What does … Read more

Password blacklist

A password blacklist is a list of passwords that have been previously guessed or stolen and are therefore known to be insecure. Password blacklists are used as a security measure to prevent users from choosing passwords that are known to be insecure. Password blacklists are typically created by monitoring password guessing attacks and collecting the … Read more

Internet Crime Complaint Center (IC3)

The Internet Crime Complaint Center (IC3) is a partnership between the Federal Bureau of Investigation (FBI) and the National White Collar Crime Center (NW3C) that allows the public to report internet-related criminal complaints online. The IC3 was established in May 2000 in response to the growing amount of internet crime. The IC3 accepts complaints from … Read more

Cyber vigilantism

Cyber vigilantism is a term used to describe the act of individuals or groups who take it upon themselves to monitor and police online activity in order to protect others from harm. This can take the form of identifying and reporting online predators, hate speech, or other harmful content. It can also involve taking action … Read more

Industrial espionage

Industrial espionage is the act of secretly gathering information about a competitor’s business operations, products, or services. The information gathered may be used to gain a competitive advantage or to help a company develop countermeasures against the competitor’s products or services. Industrial espionage is often conducted by employees of a company who are in a … Read more

Rich Internet Application (RIA)

Rich Internet Applications (RIAs) are web-based applications that have many of the features and functionality of traditional desktop applications. RIAs are typically built using web technologies such as HTML, CSS, and JavaScript, and can be deployed on a web server or hosted in a cloud environment. RIAs are becoming increasingly popular as they offer a … Read more

Passive attack

A passive attack is a type of network attack in which an attacker does not directly interact with the target system or network. Instead, the attacker observes and monitors the target system or network in order to gather information that can be used to launch a more sophisticated attack at a later time. Passive attacks … Read more

Session replay script

A session replay script is a piece of code that allows you to record and replay user sessions on your website. This can be useful for debugging purposes, or for recording user interactions for later analysis. Session replay scripts work by recording all of the user input and output during a session, and then playback … Read more