Cybersecurity and Infrastructure Security Agency (CISA)

The Cybersecurity and Infrastructure Security Agency (CISA) is a United States federal agency within the Department of Homeland Security (DHS) charged with improving the security of the United States’ critical infrastructure and cyber infrastructure. CISA’s mission is to protect the nation’s critical infrastructure from physical and cyber threats. CISA was established in November 2018 by … Read more

Iris recognition

Iris recognition is a method of biometric identification that uses patterns in the iris of an individual’s eye to uniquely identify them. The iris is the colored, donut-shaped part of the eye that surrounds the pupil. The patterns in the iris are as unique to an individual as a fingerprint, and can be used to … Read more

Conficker

Conficker is a computer worm that targets the Microsoft Windows operating system. It was first discovered in 2008, and has since been responsible for a number of high-profile infections, including those of government agencies and major corporations. The worm is notable for its use of advanced evasion techniques, which make it difficult to detect and … Read more

Secure container

Secure container is a type of security measure that is often used in conjunction with other security measures, such as firewalls and intrusion detection systems. A secure container is a physical or virtual container that is used to store data or run applications in a way that is isolated from other parts of the system. … Read more

Banner grabbing

Banner grabbing is the process of identifying a target system by its identifying information, such as an IP address or hostname. This information is usually displayed in a banner, which is a small piece of text or an image that is displayed on a web page or in an email. By looking at the banner, … Read more

Threat intelligence feed (TI feed)

A threat intelligence feed is a constantly updated collection of information about current security threats. This information can come from a variety of sources, including news reports, security blogs, and government agencies. A TI feed can help security professionals stay up-to-date on the latest threats and take appropriate steps to protect their networks. What are … Read more

DNS amplification attack

A DNS amplification attack is a type of distributed denial of service (DDoS) attack in which attackers exploit public-facing DNS servers to amplify the size of the traffic directed at a target system. These attacks take advantage of the fact that DNS servers are typically configured to allow recursive queries from any source. In a … Read more

Input validation attack

An input validation attack is a type of attack where the attacker attempts to inject malicious input into a system in order to compromise its security. This can be done in a number of ways, but the most common is via web forms. The attacker will attempt to enter malicious code into the form in … Read more

Email security gateway

An email security gateway is a network security appliance that inspects and filters email traffic to and from an organization. It is designed to protect email servers and users from email-borne threats, such as spam, phishing, and viruses. The email security gateway may be deployed as a hardware appliance, a virtual appliance, or a cloud-based … Read more

Banner screen

A banner screen is a graphical display that provides information about a computer system, such as the name of the system, the version of the operating system, the system’s current status, and so on. Banner screens are often used to provide users with information about the system before they log in. What does RW mean … Read more