Security through minority

The security through minority principle is the idea that a security system can be made more secure by making it accessible to only a small number of people. The thinking behind this principle is that if only a few people have access to a system, it will be more difficult for an attacker to gain … Read more

Behavior-based security

Behavior-based security is a type of security that is based on the behavior of users. This type of security can be used to identify and prevent security threats. Behavior-based security uses a variety of techniques to identify and track the behavior of users. These techniques can include monitoring user activity, analyzing user behavior, and using … Read more

Business risk

The term “business risk” is used to describe the potential for financial loss or other negative outcomes that could result from the actions of a business or individual. In the context of security administration, business risk is often used to refer to the possibility that a security breach could lead to the loss of sensitive … Read more

Peltzman Effect

The Peltzman effect is a phenomenon in which individuals react to a perceived increase in safety by becoming more reckless, leading to a net increase in accidents. The effect is named after University of Chicago economist Sam Peltzman, who first proposed the idea in a 1975 paper. The Peltzman effect has been invoked to explain … Read more

Payment Card Industry (PCI)

The Payment Card Industry Data Security Standard (PCI DSS) is a set of security standards designed to protect sensitive credit card information. PCI DSS is managed by the Payment Card Industry Security Standards Council (PCI SSC), a consortium of major credit card companies. PCI DSS compliance is required for any organization that stores, processes, or … Read more

UK Government Connect Secure Extranet (GCSX)

The UK Government Connect Secure Extranet (GCSX) is a secure network infrastructure that connects UK government departments and agencies with their approved suppliers. It provides a secure and reliable way for organisations to share sensitive information and collaborate on projects. GCSX is based on an IP VPN (Virtual Private Network) and uses a variety of … Read more

Digital footprint management (DFM)

Digital footprint management (DFM) is the proactive and reactive process of monitoring, measuring, and regulating an individual’s or organization’s online activity and presence. The goal of DFM is to protect and enhance one’s reputation and privacy, and to minimize the digital footprint left behind by online activity. DFM involves monitoring and managing what is said … Read more

Infosys Technologies (Infosys Limited)

Infosys Technologies (Infosys Limited) is an Indian multinational corporation that provides business consulting, information technology and outsourcing services. It has its headquarters in Bengaluru, India. Infosys is the second-largest Indian IT services company by 2016 revenues, and the fifth largest employer of H-1B visa holders in the United States in FY 2013. On 15 February … Read more

Nuclear option

The term “Nuclear option” is often used to describe a last resort option that is used when all other options have failed. This term is often used in the context of security, where the “nuclear option” would be to completely wipe a system and start from scratch. This is seen as a last resort because … Read more

Mantrap (interlocking door controller)

A mantrap is an interlocking door controller which is used to control access to a secured area. It typically consists of two doors which are connected by an electronic lock. The first door is usually an outer door which is unlocked and allows entry into the mantrap. The second door is usually an inner door … Read more