Wikia

The IT Law Wiki

Recent changes

Special page

Recent changes options Show last 50 | 100 | 250 | 500 changes in last 1 | 3 | 7 | 14 | 30 days
Hide minor edits | Show bots | Hide anons | Hide users | Hide my edits | Hide grouped recent changes | Hide logs
Show new changes starting from 08:55, November 22, 2014
   

November 22, 2014

 N    05:01 Elasticity‎ (diff | hist) . . (+83)‎ . . Mdscott (Talk | contribs) (Created page with "== Definition == '''Elasticity''' is the ability of something to change and adapt.")
+-N    04:47 Director of Information Management‎‎ (2 changes | hist) . . (+222)‎ . . [Mdscott‎ (2×)]
     04:47 (cur | prev) . . (+48)‎ . . Mdscott (Talk | contribs) (Adding categories)
N    04:46 (cur) . . (+174)‎ . . Mdscott (Talk | contribs) (Created page with "== Overview == A '''Director of Information Management''' ('''DOIM''') leads and directs the management and development of information technology within an organization.")
+-N    04:43 Commerce, Internet and E-mail Access Services‎‎ (2 changes | hist) . . (+697)‎ . . [Mdscott‎ (2×)]
     04:43 (cur | prev) . . (+85)‎ . . Mdscott (Talk | contribs) (Adding categories)
N    04:43 (cur) . . (+612)‎ . . Mdscott (Talk | contribs) (Created page with "== Overview == '''Commerce, Internet, and E-mail Access Services''' ('''CINEMA''') is a contract vehicle that provides a comprehensive package of value-added [[electr...")
+-N    04:23 Address space layout randomization‎‎ (2 changes | hist) . . (+631)‎ . . [Mdscott‎ (2×)]
     04:23 (cur | prev) . . (+67)‎ . . Mdscott (Talk | contribs) (Adding categories)
N    04:23 (cur) . . (+564)‎ . . Mdscott (Talk | contribs) (Created page with "== Definition == '''Address space layout randomization''' ('''ASLR''') is a computer security technique involved in protection from buffer overflow attacks. To preven...")
      04:19 ASLR‎ (diff | hist) . . (0)‎ . . Mdscott (Talk | contribs) (Redirected page to Address space layout randomization)

November 21, 2014

+-N    16:52 University Research Initiative‎‎ (4 changes | hist) . . (+685)‎ . . [Mdscott‎ (4×)]
     16:52 (cur | prev) . . (+22)‎ . . Mdscott (Talk | contribs) (Adding categories)
     16:52 (cur | prev) . . (+48)‎ . . Mdscott (Talk | contribs) (Adding categories)
     16:52 (cur | prev) . . (+6)‎ . . Mdscott (Talk | contribs)
N    16:51 (cur) . . (+609)‎ . . Mdscott (Talk | contribs) (Created page with "== Overview == The '''University Research Initiative''' seeks to improve the quality of defense research conducted by universities and supports the education of engineers and...")
      16:47 Inter-cloud computing‎ (diff | hist) . . (0)‎ . . Mdscott (Talk | contribs)
+-N    16:42 Software Assurance Metrics and Tool Evaluation‎‎ (4 changes | hist) . . (+394)‎ . . [Mdscott‎ (4×)]
     16:42 (cur | prev) . . (-2)‎ . . Mdscott (Talk | contribs)
     16:42 (cur | prev) . . (+95)‎ . . Mdscott (Talk | contribs)
     06:03 (cur | prev) . . (+43)‎ . . Mdscott (Talk | contribs) (Adding categories)
N    06:03 (cur) . . (+258)‎ . . Mdscott (Talk | contribs) (Created page with "== Overview == The NIST '''[http://samate.nist.gov/index.php/SAMATE_Publications.html Software Assurance Metrics and Tool Evaluation]''' ('''SAMATE''') project seeks to d...")
+-N    06:01 SAMATE‎‎ (2 changes | hist) . . (+81)‎ . . [Mdscott‎ (2×)]
     06:01 (cur | prev) . . (+22)‎ . . Mdscott (Talk | contribs) (Adding categories)
N    06:01 (cur) . . (+59)‎ . . Mdscott (Talk | contribs) (Redirected page to Software Assurance Metrics and Tool Evaluation)
      05:59 Traffic light protocol‎ (diff | hist) . . (+4)‎ . . Mdscott (Talk | contribs)
+-N    05:37 Weaponize‎‎ (2 changes | hist) . . (+771)‎ . . [Mdscott‎ (2×)]
     05:37 (cur | prev) . . (+72)‎ . . Mdscott (Talk | contribs) (Adding categories)
N    05:36 (cur) . . (+699)‎ . . Mdscott (Talk | contribs) (Created page with "== Definition == '''Weaponize''' is to {{Quote|[d]evelop, deploy, and refine high-fidelity signatures based on analysis of artifacts observed in malware [[pa...")
 N    04:56 Weaponization‎ (diff | hist) . . (+22)‎ . . Mdscott (Talk | contribs) (Redirected page to Weaponize)
+-N    04:56 Proactive network defense‎‎ (3 changes | hist) . . (+726)‎ . . [Mdscott‎ (3×)]
     04:56 (cur | prev) . . (+51)‎ . . Mdscott (Talk | contribs) (Adding categories)
     04:55 (cur | prev) . . (+152)‎ . . Mdscott (Talk | contribs)
N    04:46 (cur) . . (+523)‎ . . Mdscott (Talk | contribs) (Created page with "== Definition == '''Proactive network defense''' {{Quote|consists of deploying protective and detective measures that disrupt an adversary before an exploit has been success...")
      04:45 Proactive cyber defense‎ (diff | hist) . . (+49)‎ . . Mdscott (Talk | contribs)
+-N    04:38 Cyber-relevant time‎‎ (2 changes | hist) . . (+397)‎ . . [Mdscott‎ (2×)]
     04:38 (cur | prev) . . (+51)‎ . . Mdscott (Talk | contribs) (Adding categories)
N    04:37 (cur) . . (+346)‎ . . Mdscott (Talk | contribs) (Created page with "== Definition == '''Cyber-relevant time''' is {{Quote|a relative value that is based on the attack speed of the adversary. If an attack is unfolding then the [[n...")
      03:56 Guide to Cyber Threat Information Sharing‎ (diff | hist) . . (+321)‎ . . Mdscott (Talk | contribs)
+-N    03:53 TLP‎‎ (2 changes | hist) . . (+57)‎ . . [Mdscott‎ (2×)]
     03:53 (cur | prev) . . (+22)‎ . . Mdscott (Talk | contribs) (Adding categories)
N    03:53 (cur) . . (+35)‎ . . Mdscott (Talk | contribs) (Redirected page to Traffic light protocol)
+-N    03:48 OpenIOC‎‎ (2 changes | hist) . . (+64)‎ . . [Mdscott‎ (2×)]
     03:48 (cur | prev) . . (+22)‎ . . Mdscott (Talk | contribs) (Adding categories)
N    03:48 (cur) . . (+42)‎ . . Mdscott (Talk | contribs) (Redirected page to Open Indicators of Compromise)
+-N    03:45 IODEF‎‎ (2 changes | hist) . . (+78)‎ . . [Mdscott‎ (2×)]
     03:45 (cur | prev) . . (+22)‎ . . Mdscott (Talk | contribs) (Adding categories)
N    03:45 (cur) . . (+56)‎ . . Mdscott (Talk | contribs) (Redirected page to Incident Object Description Exchange Format)
+-N    03:43 DFIR‎‎ (2 changes | hist) . . (+74)‎ . . [Mdscott‎ (2×)]
     03:43 (cur | prev) . . (+22)‎ . . Mdscott (Talk | contribs) (Adding categories)
N    03:43 (cur) . . (+52)‎ . . Mdscott (Talk | contribs) (Redirected page to Digital Forensics for Incident Response)
+-N    03:42 DEP‎‎ (2 changes | hist) . . (+60)‎ . . [Mdscott‎ (2×)]
     03:42 (cur | prev) . . (+22)‎ . . Mdscott (Talk | contribs) (Adding categories)
N    03:42 (cur) . . (+38)‎ . . Mdscott (Talk | contribs) (Redirected page to Data Execution Prevention)
+-N    03:30 CybOX‎‎ (2 changes | hist) . . (+62)‎ . . [Mdscott‎ (2×)]
     03:30 (cur | prev) . . (+22)‎ . . Mdscott (Talk | contribs) (Adding categories)
N    03:30 (cur) . . (+40)‎ . . Mdscott (Talk | contribs) (Redirected page to Cyber Observable Expression)
      02:56 CFM‎ (diff | hist) . . (+52)‎ . . Mdscott (Talk | contribs)
+-N    02:54 CEE‎‎ (2 changes | hist) . . (+58)‎ . . [Mdscott‎ (2×)]
     02:54 (cur | prev) . . (+22)‎ . . Mdscott (Talk | contribs) (Adding categories)
N    02:54 (cur) . . (+36)‎ . . Mdscott (Talk | contribs) (Redirected page to Common Event Expression)
+-N    02:53 CCE‎‎ (2 changes | hist) . . (+67)‎ . . [Mdscott‎ (2×)]
     02:53 (cur | prev) . . (+22)‎ . . Mdscott (Talk | contribs) (Adding categories)
N    02:53 (cur) . . (+45)‎ . . Mdscott (Talk | contribs) (Redirected page to Common Configuration Enumeration)
      02:53 Common Attack Pattern Enumeration and Classification‎ (diff | hist) . . (+27)‎ . . Mdscott (Talk | contribs) (Adding categories)
+-N    02:52 ASLR‎‎ (2 changes | hist) . . (+69)‎ . . [Mdscott‎ (2×)]
     02:52 (cur | prev) . . (+22)‎ . . Mdscott (Talk | contribs) (Adding categories)
N    02:52 (cur) . . (+47)‎ . . Mdscott (Talk | contribs) (Redirected page to Address Space Layout Randomization)

Around Wikia's network

Random Wiki