OpenID (OpenID Connect)

OpenID Connect is an identity layer on top of the OAuth 2.0 protocol. It allows clients to verify the identity of the end-user based on the authentication performed by an authorization server, as well as to obtain basic profile information about the end-user in an interoperable and REST-like manner. What is OpenID Connect? OpenID Connect … Read more

Information Technology Amendment Act 2008 (IT Act 2008)

The Information Technology Amendment Act 2008 (IT Act 2008) was introduced in India in order to provide legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication, commonly referred to as “electronic commerce”, which involve the use of alternatives to paper-based methods of communication and storage of … Read more

Cloak of invisibility

A cloak of invisibility is a device that allows an individual to become invisible. The cloak covers the body and bends light around the wearer so that they are not visible to the naked eye. The cloak is also able to block thermal and ultraviolet light, making it difficult for infrared cameras and night vision … Read more

Local wipe

A local wipe is a security measure that can be used to remove all data from a device, making it unusable. This can be useful if a device is lost or stolen, or if you simply want to destroy all data on a device before selling or disposing of it. To perform a local wipe, … Read more

Known unknown

A “known unknown” is a term used to describe a security threat or vulnerability that is known to exist, but the specific details are not known. For example, a known unknown might be a new type of malware that has been detected in the wild, but the exact functionality or purpose of the malware is … Read more

Non-disclosure agreement (NDA)

A non-disclosure agreement (NDA) is a contract between two parties whereby one party agrees not to disclose certain confidential information to the other party. NDAs are often used in business relationships to protect trade secrets or other sensitive information. Does NDA stand for non-disclosure agreement? Yes, NDA stands for non-disclosure agreement. An NDA is a … Read more

Vulnerability (information technology)

In the context of information security, a vulnerability is a flaw or weakness in a system’s design, implementation, operation, or internal controls that could be exploited to violate the system’s security policies or security controls. A vulnerability may be present in any component of a system, including hardware, software, firmware, middleware, or even user-facing applications. … Read more

Infosys Technologies (Infosys Limited)

Infosys Technologies (Infosys Limited) is an Indian multinational corporation that provides business consulting, information technology and outsourcing services. It has its headquarters in Bengaluru, India. Infosys is the second-largest Indian IT services company by 2016 revenues, and the fifth largest employer of H-1B visa holders in the United States in FY 2013. On 15 February … Read more

Vulnerability management

Vulnerability management is the process of identifying, classifying, remediating, and mitigating vulnerabilities. It is a continuous process that includes identifying vulnerabilities, assessing the risks they pose, prioritizing based on risk, and developing and implementing mitigate plans. The goal of vulnerability management is to reduce the risk of exploitation of vulnerabilities. This is done by identifying … Read more

Mantrap (interlocking door controller)

A mantrap is an interlocking door controller which is used to control access to a secured area. It typically consists of two doors which are connected by an electronic lock. The first door is usually an outer door which is unlocked and allows entry into the mantrap. The second door is usually an inner door … Read more