The following is a list in alphabetical order of articles relating to security technology, law and regulations.
“An input validation attack is "where an attacker intentionally sends unusual input in the hopes...Input validation attack
“Subversion refers to an attempt to overthrow structures of authority, including the state.Subversion
“A host-based firewall is a piece of software running on a single host that can restrict incoming...Host-based firewall
“The Clinton Administration, Presidential Decision Directive 63 (PDD-63): Policy on Critical...Presidential Decision Directive 63
“The National Media Exploitation Center (NMEC) was established in late 2001 to coordinate FBI...National Media Exploitation Center
“An audit file is a file that contains records of audit events and provides an audit trail.Audit file
“Joint COMSEC Monitoring Activity (JCMA) provides communications security monitoring and analysis...Joint COMSEC Monitoring Activity
Pages in category "Security"
The following 200 pages are in this category, out of 5,491 total.