All public logs

From Encyclopedia of Cybersecurity

Combined display of all available logs of Encyclopedia of Cybersecurity. You can narrow down the view by selecting a log type, the username (case-sensitive), or the affected page (also case-sensitive).

Logs
(newest | oldest) View ( | ) (20 | 50 | 100 | 250 | 500)
  • 22:45, 5 May 2024 Ccocrick talk contribs created page Data Sanitization (Created page with "== Data Sanitization == '''Data Sanitization''' refers to the process of cleansing, scrubbing, or purging sensitive or confidential information from storage devices, digital media, or electronic systems to prevent unauthorized access, disclosure, or recovery of data remnants after the end of its useful life or intended use. Also known as data wiping, data erasure, or data destruction, data sanitization aims to render data irrecoverable by overwriting, degaussing, or phy...")
  • 22:42, 5 May 2024 Ccocrick talk contribs created page Data Masking (Created page with "== Data Masking == '''Data Masking''' is a data protection technique used to conceal or obfuscate sensitive information within a dataset while preserving its usability and integrity for legitimate purposes. Also known as data obfuscation or anonymization, data masking replaces sensitive data elements, such as personally identifiable information (PII), financial records, or classified information, with fictitious, modified, or scrambled values to prevent unauthorized acc...")
  • 22:40, 5 May 2024 Ccocrick talk contribs created page Data Loss Prevention (Created page with "== Data Loss Prevention == '''Data Loss Prevention''' (DLP) refers to a set of technologies, processes, and strategies designed to identify, monitor, control, and prevent the unauthorized or accidental exposure, leakage, or misuse of sensitive data across networks, endpoints, and cloud environments to safeguard against data breaches, compliance violations, and insider threats. === Overview === Data Loss Prevention aims to protect sensitive information, such as persona...")
  • 22:38, 5 May 2024 Ccocrick talk contribs created page Data Exfiltration (Created page with "== Data Exfiltration == '''Data Exfiltration''' refers to the unauthorized or illicit transfer, extraction, or theft of sensitive or proprietary data from a computer network, system, or device by an attacker or insider with the intent to access, misuse, or disclose the stolen information for malicious purposes. === Overview === Data exfiltration is a common tactic employed by cybercriminals, hackers, insiders, or advanced persistent threat (APT) groups to steal valuab...")
  • 22:35, 5 May 2024 Ccocrick talk contribs created page Data Encryption Standard (Created page with "== Data Encryption Standard == The '''Data Encryption Standard''' (DES) is a symmetric-key block cipher algorithm used for encrypting and decrypting electronic data. Developed by IBM in the early 1970s, DES was adopted as a federal standard for encryption in the United States and became widely used in various applications, including financial transactions, communications, and data security. === Overview === DES operates on fixed-size blocks of plaintext data, typicall...")
  • 21:57, 5 May 2024 Ccocrick talk contribs created page Data Dump (Created page with "== Data Dump == A '''Data Dump''' refers to the unauthorized or unintentional release, disclosure, or exposure of a large volume of data, information, or files, typically stored in electronic format, onto the internet, dark web, or other public forums, often resulting in privacy breaches, security vulnerabilities, and potential harm to individuals or organizations. === Overview === A Data Dump occurs when a significant amount of data is leaked, stolen, or made publicl...")
  • 21:52, 5 May 2024 Ccocrick talk contribs created page Data Classification (Created page with "== Data Classification == '''Data Classification''' is the process of categorizing and organizing data assets based on their sensitivity, value, importance, and regulatory requirements to facilitate effective data management, protection, and security controls. === Overview === Data Classification is a fundamental component of information security and data governance practices, enabling organizations to identify, label, and manage data according to its level of confide...")
  • 21:50, 5 May 2024 Ccocrick talk contribs created page Wireshark Certified Network Analyst (Created page with "== Data Breach == A '''Data Breach''' occurs when sensitive, confidential, or protected information is accessed, disclosed, or compromised without authorization, potentially exposing individuals, organizations, or systems to security risks, identity theft, financial fraud, or reputational damage. === Overview === A Data Breach occurs when cybercriminals, hackers, or malicious actors gain unauthorized access to sensitive data, such as personal identifiable information...")
  • 21:44, 5 May 2024 Ccocrick talk contribs created page Dark Web (Created page with "== Dark Web == The '''Dark Web''' is a part of the internet that is not indexed by traditional search engines and is accessible only through specialized software, configurations, or authorization, allowing users to operate anonymously and conduct illicit activities, trade illegal goods, and exchange sensitive information without detection. === Overview === The Dark Web is a subset of the Deep Web, which refers to all web pages that are not indexed by standard search e...")
  • 21:43, 5 May 2024 Ccocrick talk contribs created page Cybersecurity Maturity Model Certification (Created page with "== Cybersecurity Maturity Model Certification == The '''Cybersecurity Maturity Model Certification''' (CMMC) is a unified standard and certification framework developed by the United States Department of Defense (DoD) to assess and enhance the cybersecurity posture of defense contractors and subcontractors in the Defense Industrial Base (DIB) supply chain. === Overview === The CMMC framework aims to strengthen the cybersecurity defenses and resilience of organizations...")
  • 18:40, 5 May 2024 Ccocrick talk contribs created page Cybersecurity Framework (Created page with "== Cybersecurity Framework == A '''Cybersecurity Framework''' is a set of guidelines, best practices, standards, and methodologies designed to help organizations manage cybersecurity risks, protect critical assets, and enhance cybersecurity posture through effective governance, risk management, and compliance strategies. === Overview === Cybersecurity frameworks provide a structured approach to cybersecurity governance, risk assessment, and mitigation, enabling organi...")
  • 18:35, 5 May 2024 Ccocrick talk contribs created page Cyberespionage (Created page with "== Cyberespionage == '''Cyberespionage''' refers to the use of computer networks and digital technologies to conduct espionage activities, gather intelligence, and steal sensitive information from government agencies, businesses, organizations, or individuals, typically for strategic, political, economic, or military purposes. === Overview === Cyberespionage involves the covert acquisition of confidential data, intellectual property, trade secrets, or classified infor...")
  • 18:30, 5 May 2024 Ccocrick talk contribs created page Cyberattack (Created page with "== Cyberattack == A '''Cyberattack''' is a deliberate, malicious attempt to disrupt, damage, or gain unauthorized access to computer systems, networks, or digital devices, often with the intent to steal sensitive information, cause financial harm, or disrupt normal operations. === Overview === Cyberattacks exploit vulnerabilities in software, hardware, or human behavior to compromise the confidentiality, integrity, or availability of digital assets, data, and services...")
  • 18:29, 5 May 2024 Ccocrick talk contribs created page Cyber Range (Created page with "== Cyber Range == A '''Cyber Range''' is a controlled and secure environment designed to simulate real-world cybersecurity scenarios, providing a platform for training, testing, and evaluating the skills, capabilities, and responses of cybersecurity professionals, incident responders, and IT personnel. === Overview === A Cyber Range is an essential tool for cybersecurity training, education, and preparedness. It allows organizations to simulate cyber threats, attack s...")
  • 16:07, 5 May 2024 Ccocrick talk contribs created page Cyber Insurance (Created page with "== Cyber Insurance == '''Cyber Insurance''' is a type of insurance coverage designed to protect individuals and organizations against financial losses and liabilities resulting from cyber-related incidents, data breaches, and security breaches. === Overview === Cyber insurance provides financial protection and risk transfer mechanisms to policyholders in the event of cybersecurity incidents, such as data breaches, ransomware attacks, business interruption, network int...")
  • 16:05, 5 May 2024 Ccocrick talk contribs created page Cyber Hygiene (Created page with "== Cyber Forensics == '''Cyber Forensics''', also known as digital forensics or computer forensics, is the practice of collecting, analyzing, and preserving digital evidence from computers, networks, and electronic devices to investigate cybercrimes and security incidents. === Overview === Cyber forensics involves the application of forensic techniques, tools, and methodologies to identify, collect, and analyze digital evidence related to cybercrimes, data breaches, h...")
  • 16:04, 5 May 2024 Ccocrick talk contribs created page Cyber Forensics (Created page with "== Cyber Forensics == '''Cyber Forensics''', also known as digital forensics or computer forensics, is the practice of collecting, analyzing, and preserving digital evidence from computers, networks, and electronic devices to investigate cybercrimes and security incidents. === Overview === Cyber forensics involves the application of forensic techniques, tools, and methodologies to identify, collect, and analyze digital evidence related to cybercrimes, data breaches, h...")
  • 15:59, 5 May 2024 Ccocrick talk contribs created page Cryptography (Created page with "== Cryptography == '''Cryptography''' is the science and practice of securing communication and data by encoding it into an unintelligible form, making it unreadable to unauthorized users. === Overview === Cryptography encompasses techniques and methods for ensuring the confidentiality, integrity, and authenticity of information through the use of mathematical algorithms and cryptographic protocols. It involves the transformation of plaintext (readable data) into ciph...")
  • 15:51, 5 May 2024 Ccocrick talk contribs created page Cryptographic Vulnerabilities (Created page with "== Cryptographic Vulnerabilities == '''Cryptographic vulnerabilities''' refer to weaknesses or flaws in cryptographic systems that can be exploited to compromise the security and integrity of encrypted data and communications. === Overview === Cryptographic vulnerabilities arise due to design flaws, implementation errors, or weaknesses in cryptographic algorithms, protocols, or key management practices. These vulnerabilities can be exploited by attackers to bypass enc...")
  • 15:50, 5 May 2024 Ccocrick talk contribs created page Cryptanalysis (Created page with "== Cryptanalysis == '''Cryptanalysis''' is the study of cryptographic systems with the goal of analyzing and breaking them to gain access to encrypted data without knowledge of the decryption key. === Overview === Cryptanalysis is an interdisciplinary field that combines elements of mathematics, computer science, and cryptography to analyze the security of cryptographic algorithms and protocols. The primary objective of cryptanalysis is to identify weaknesses, vulnera...")
  • 15:48, 5 May 2024 Ccocrick talk contribs created page Cross-Site Scripting (Created page with "== Cross-Site Scripting == '''Cross-Site Scripting''' (XSS) is a type of security vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users. === Overview === Cross-Site Scripting (XSS) is a prevalent web security vulnerability that arises when a web application accepts user input without proper validation or sanitization and then includes that input in its output HTML content. Attackers exploit XSS vulnerabilities to inject m...")
  • 15:45, 5 May 2024 Ccocrick talk contribs created page Cross-Site Request Forgery (Created page with "== Cross-Site Request Forgery == '''Cross-Site Request Forgery''' (CSRF) is a type of security vulnerability that occurs when a malicious actor tricks a user into performing unauthorized actions on a web application in which the user is authenticated. === Overview === Cross-Site Request Forgery (CSRF) is a common web security threat that exploits the trust relationship between a user's browser and a web application. In a CSRF attack, the attacker crafts a malicious re...")
  • 15:41, 5 May 2024 Ccocrick talk contribs created page Cross-Origin Resource Sharing (Created page with "== Cross-Origin Resource Sharing == '''Cross-Origin Resource Sharing''' (CORS) is a security mechanism implemented by web browsers to allow web servers to specify which origins are permitted to access resources on a web page from a different domain. === Overview === Cross-Origin Resource Sharing (CORS) is a fundamental security feature of modern web browsers that enables web servers to control access to resources, such as APIs, fonts, images, and scripts, from differe...")
  • 15:32, 5 May 2024 Ccocrick talk contribs created page Content Security Policy (Created page with "== Content Disarm & Reconstruction == '''Content Disarm & Reconstruction''' (CDR) is a cybersecurity technique used to mitigate the risk of malicious content by sanitizing and rebuilding files to remove potential threats while preserving their functionality and usability. === Overview === Content Disarm & Reconstruction (CDR) is an advanced security approach that aims to protect organizations from malware, exploits, and other cyber threats hidden within files, documen...")
  • 15:31, 5 May 2024 Ccocrick talk contribs created page Content Disarm and Reconstruction (Created page with "== Content Disarm & Reconstruction == '''Content Disarm & Reconstruction''' (CDR) is a cybersecurity technique used to mitigate the risk of malicious content by sanitizing and rebuilding files to remove potential threats while preserving their functionality and usability. === Overview === Content Disarm & Reconstruction (CDR) is an advanced security approach that aims to protect organizations from malware, exploits, and other cyber threats hidden within files, documen...")
  • 15:28, 5 May 2024 Ccocrick talk contribs created page Container Security (Created page with "== Container Security == '''Container Security''' refers to the practices, tools, and processes used to secure containerized applications and environments against cyber threats, vulnerabilities, and attacks. === Overview === Containerization technology, popularized by platforms like Docker and Kubernetes, allows developers to package applications and their dependencies into lightweight, portable containers that can run consistently across different computing environme...")
  • 15:24, 5 May 2024 Ccocrick talk contribs created page Construction Industry Institute Cybersecurity Guidelines (Created page with "== Construction Industry Institute (CII) Cybersecurity Guidelines == The '''Construction Industry Institute (CII) Cybersecurity Guidelines''' are a set of best practices, recommendations, and standards developed by the Construction Industry Institute (CII) to address cybersecurity challenges and risks in the construction industry. === Overview === The CII Cybersecurity Guidelines provide guidance and resources for construction companies, contractors, project owners, a...")
  • 15:22, 5 May 2024 Ccocrick talk contribs created page Concealment Cipher (Created page with "== Concealment Cipher == A '''Concealment Cipher''' is a type of cryptographic algorithm or technique used to hide or disguise the presence of encrypted data within innocuous or inconspicuous cover objects, such as images, audio files, text documents, or other digital media. === Overview === Concealment ciphers are designed to conceal the existence of encrypted information by embedding it within the content of seemingly ordinary or benign carrier files, making it diff...")
  • 15:20, 5 May 2024 Ccocrick talk contribs created page Compliance Auditing (Created page with "== Compliance Auditing == '''Compliance Auditing''' is the process of assessing and evaluating an organization's adherence to regulatory requirements, industry standards, internal policies, and best practices to ensure legal and ethical compliance, risk mitigation, and operational effectiveness. === Overview === Compliance auditing involves reviewing and analyzing various aspects of an organization's operations, processes, systems, and controls to determine whether th...")
  • 15:19, 5 May 2024 Ccocrick talk contribs created page Command and Control (Created page with "== Command and Control == '''Command and Control''' (C2), also known as C&C or C2C, refers to the centralized infrastructure and communication channels used by attackers to manage and control compromised computer systems, networks, or devices remotely. === Overview === In cyberattacks, Command and Control servers serve as the centralized hubs through which attackers can remotely communicate with and control compromised devices, execute malicious commands, exfiltrate d...")
  • 15:17, 5 May 2024 Ccocrick talk contribs created page Cold Storage Backup (Created page with "== Cold Storage Backup == '''Cold Storage Backup''' is a data backup strategy that involves storing backup copies of data in offline or disconnected storage media, such as tape drives, optical discs, or external hard drives, to protect against data loss, corruption, or unauthorized access. === Overview === Cold Storage Backup is designed to provide a secure and reliable means of preserving data for long-term retention and disaster recovery purposes. Unlike online or c...")
  • 15:16, 5 May 2024 Ccocrick talk contribs created page Code Signing Certificate (Created page with "== Code Signing Certificate == A '''Code Signing Certificate''' is a digital certificate used by software developers to digitally sign their code, scripts, and executables to verify their authenticity and integrity. This cryptographic signature allows users and systems to confirm that the code has not been tampered with or altered since it was signed by the developer. === Overview === Code Signing Certificates provide a way for software developers to assure users that...")
  • 15:15, 5 May 2024 Ccocrick talk contribs created page Code Injection (Created page with "== Code Injection == '''Code Injection''' is a security vulnerability that occurs when an attacker is able to insert and execute malicious code within a computer program or application. This technique is commonly used to exploit weaknesses in web applications, allowing attackers to perform unauthorized actions, steal data, or compromise the integrity of the system. === Overview === Code Injection attacks typically involve inserting malicious code into input fields, pa...")
  • 15:14, 5 May 2024 Ccocrick talk contribs created page Cloud Security Alliance (Created page with "== Cloud Security Alliance == The '''Cloud Security Alliance''' (CSA) is a nonprofit organization dedicated to promoting the adoption of best practices and standards for securing cloud computing environments and advancing cloud security research, education, and certification. === Overview === The Cloud Security Alliance was established in 2009 by a group of industry leaders, security experts, and researchers to address the security challenges and concerns associated w...")
  • 15:13, 5 May 2024 Ccocrick talk contribs created page Cloud Security (Created page with "== Cloud Security == '''Cloud Security''' refers to the set of policies, controls, technologies, and best practices designed to protect data, applications, and infrastructure in cloud computing environments from security threats, vulnerabilities, and risks. === Overview === Cloud Security encompasses various aspects of security, including data protection, identity and access management, network security, and compliance, tailored to the unique characteristics and chall...")
  • 15:11, 5 May 2024 Ccocrick talk contribs created page Cloud Encryption (Created page with "== Cloud Controls Matrix == The '''Cloud Controls Matrix''' (CCM) is a cybersecurity framework developed by the Cloud Security Alliance (CSA) to provide organizations with a standardized set of security controls and best practices for assessing, implementing, and managing security in cloud environments. === Overview === The Cloud Controls Matrix offers a comprehensive catalog of security controls mapped to leading standards, frameworks, and regulations, such as ISO/IE...")
  • 15:10, 5 May 2024 Ccocrick talk contribs created page Cloud Controls Matrix (Created page with "== Cloud Controls Matrix == The '''Cloud Controls Matrix''' (CCM) is a cybersecurity framework developed by the Cloud Security Alliance (CSA) to provide organizations with a standardized set of security controls and best practices for assessing, implementing, and managing security in cloud environments. === Overview === The Cloud Controls Matrix offers a comprehensive catalog of security controls mapped to leading standards, frameworks, and regulations, such as ISO/IE...")
  • 15:09, 5 May 2024 Ccocrick talk contribs created page Cloud Access Security Broker (Created page with "== Cloud Access Security Broker == A '''Cloud Access Security Broker''' (CASB) is a security solution or service that acts as an intermediary between cloud service users and cloud service providers to enforce security policies, monitor activity, and protect data in cloud environments. === Overview === Cloud Access Security Brokers provide organizations with visibility, control, and security capabilities to manage the use of cloud services and applications, including S...")
  • 15:08, 5 May 2024 Ccocrick talk contribs created page Clickjacking (Created page with "== Clickjacking == '''Clickjacking''' is a malicious technique used by attackers to trick users into clicking on elements of a webpage without their knowledge or consent, often resulting in unintended actions or disclosure of sensitive information. === Overview === Clickjacking involves overlaying or embedding transparent or opaque elements, such as buttons, links, or forms, on top of legitimate web content, making them invisible or partially visible to users. Attacke...")
  • 15:05, 5 May 2024 Ccocrick talk contribs created page Children's Internet Protection Act (Created page with "== Children's Internet Protection Act == The '''Children's Internet Protection Act''' (CIPA) is a United States federal law enacted to address concerns about children's access to harmful or inappropriate online content and to promote internet safety in schools and libraries that receive federal funding for internet access. === Overview === The Children's Internet Protection Act requires schools and libraries that receive federal funding for internet access to implemen...")
  • 14:56, 5 May 2024 Ccocrick talk contribs created page Childrens Online Privacy Protection Act (Created page with "== Children's Online Privacy Protection Act == The '''Children's Online Privacy Protection Act''' (COPPA) is a United States federal law enacted to protect the online privacy and personal information of children under the age of 13. === Overview === The Children's Online Privacy Protection Act aims to regulate the collection, use, and disclosure of personal information from children by commercial websites, online services, and mobile apps. COPPA imposes requirements o...")
  • 14:55, 5 May 2024 Ccocrick talk contribs created page Certificate Revocation List (Created page with "== Certificate Revocation List == A '''Certificate Revocation List''' (CRL) is a digital document maintained by a Certificate Authority (CA) that contains a list of digital certificates that have been revoked or invalidated before their scheduled expiration date. === Overview === Certificate Revocation Lists serve as a mechanism for informing users, applications, and network devices about the status of digital certificates that are no longer trusted or valid due to va...")
  • 14:51, 5 May 2024 Ccocrick talk contribs created page Certificate Pinning (Created page with "== Certificate Pinning == '''Certificate Pinning''' is a security mechanism used to enhance the trust and integrity of SSL/TLS connections by associating a specific digital certificate or public key with a particular domain or service, thereby preventing potential man-in-the-middle (MITM) attacks and unauthorized certificate substitutions. === Overview === Certificate Pinning helps to mitigate the risk of attacks where an attacker presents a fraudulent or compromised...")
  • 14:51, 5 May 2024 Ccocrick talk contribs created page Certificate Authority (Created page with "== Certificate Authority == A '''Certificate Authority''' (CA) is a trusted entity that issues digital certificates, which are used to authenticate the identity of individuals, organizations, or devices in online communications and transactions. === Overview === Certificate Authorities play a crucial role in establishing trust and security on the Internet by issuing digital certificates that bind cryptographic keys to the identities of entities, such as websites, serv...")
  • 14:49, 5 May 2024 Ccocrick talk contribs created page California Consumer Privacy Act (Created page with "== California Consumer Privacy Act == The '''California Consumer Privacy Act''' (CCPA) is a state-level data privacy law enacted in California, United States, designed to enhance privacy rights and consumer protections for residents of California. === Overview === The California Consumer Privacy Act establishes new privacy rights, disclosure obligations, and compliance requirements for businesses that collect, process, or share personal information of California resid...")
  • 14:45, 5 May 2024 Ccocrick talk contribs created page Business Email Compromise (Created page with "== Business Email Compromise == '''Business Email Compromise''' (BEC) is a type of cyber attack in which cybercriminals use social engineering techniques to deceive employees, executives, or business partners into transferring funds, sensitive information, or executing fraudulent transactions via compromised email accounts. === Overview === Business Email Compromise attacks typically involve impersonation of trusted individuals, such as company executives, suppliers,...")
  • 14:43, 5 May 2024 Ccocrick talk contribs created page Business Continuity Plan (Created page with "== Business Continuity Plan == A '''Business Continuity Plan''' (BCP) is a comprehensive strategy and set of procedures designed to ensure the continued operation of an organization's critical business functions and processes during and after disruptive events, such as natural disasters, cyber attacks, or other emergencies. === Overview === A Business Continuity Plan outlines the steps and measures that an organization will take to maintain essential operations, servi...")
  • 14:38, 5 May 2024 Ccocrick talk contribs created page Bug Bounty Program (Created page with "== Bug Bounty Program == A '''Bug Bounty Program''' is a crowdsourced cybersecurity initiative that rewards individuals, often referred to as security researchers or ethical hackers, for discovering and responsibly disclosing security vulnerabilities and weaknesses in software, applications, websites, or digital assets. === Overview === Bug Bounty Programs are established by organizations, including technology companies, software developers, financial institutions, an...")
  • 14:37, 5 May 2024 Ccocrick talk contribs created page Brute Force Attack (Created page with "== Brute Force Attack == A '''Brute Force Attack''' is a cybersecurity technique used to gain unauthorized access to a system, account, or encrypted data by systematically trying all possible combinations of passwords or encryption keys until the correct one is found. === Overview === In a Brute Force Attack, an attacker attempts to guess the correct password or decryption key by systematically trying all possible combinations, typically starting with the simplest or...")
  • 14:36, 5 May 2024 Ccocrick talk contribs created page Browser Isolation (Created page with "== Browser Isolation == '''Browser Isolation''' is a cybersecurity approach that separates web browsing activities from the endpoint device by executing web content in a remote, isolated environment, commonly referred to as a sandbox or virtual machine. === Overview === Browser Isolation aims to mitigate the risk of web-based threats, such as malware infections, drive-by downloads, phishing attacks, and zero-day exploits, by isolating potentially malicious web content...")
(newest | oldest) View ( | ) (20 | 50 | 100 | 250 | 500)