New pages

From Encyclopedia of Cybersecurity
New pages
Hide registered users | Hide bots | Show redirects
(newest | oldest) View ( | ) (20 | 50 | 100 | 250 | 500)
  • 22:55, 5 May 2024Deepfake (hist | edit) ‎[8,327 bytes]Ccocrick (talk | contribs) (Created page with "== Deepfake == '''Deepfake''' is a portmanteau of "deep learning" and "fake," referring to synthetic media generated by artificial intelligence (AI) algorithms, particularly deep learning techniques, to create hyper-realistic but fraudulent images, videos, or audio recordings that depict individuals saying or doing things they never said or did. Deepfake technology leverages deep neural networks, generative adversarial networks (GANs), or other machine learning models t...")
  • 22:53, 5 May 2024Deep Packet Inspection (hist | edit) ‎[7,445 bytes]Ccocrick (talk | contribs) (Created page with "== Deep Packet Inspection == '''Deep Packet Inspection''' (DPI) is a network monitoring and packet filtering technology used to inspect the content of data packets traversing a network, including the payload, headers, and protocols, to perform advanced analysis, classification, and filtering based on packet contents, application behavior, or security policies. DPI enables granular visibility, control, and management of network traffic, allowing network administrators or...")
  • 22:52, 5 May 2024Decryption (hist | edit) ‎[7,434 bytes]Ccocrick (talk | contribs) (Created page with "== Decryption == '''Decryption''' is the process of transforming encrypted data or ciphertext back into its original form or plaintext using an encryption key or decryption algorithm. It involves reversing the encryption process, applying mathematical operations or cryptographic techniques to recover the original data from its scrambled or unintelligible state, allowing authorized users or systems to access and interpret the decrypted information. === Overview === Dec...")
  • 22:49, 5 May 2024Data Tokenization (hist | edit) ‎[8,072 bytes]Ccocrick (talk | contribs) (Created page with "== Data Tokenization == '''Data Tokenization''' is a data security technique used to protect sensitive information by substituting it with unique tokens or placeholders while preserving its format and length. Tokenization involves the process of generating and assigning token values to sensitive data elements, such as credit card numbers, social security numbers, or personal identification information (PII), to prevent unauthorized access, theft, or misuse of sensitive...")
  • 22:46, 5 May 2024Data Sovereignty (hist | edit) ‎[6,558 bytes]Ccocrick (talk | contribs) (Created page with "== Data Sovereignty == '''Data Sovereignty''' refers to the concept that data is subject to the laws and regulations of the country or jurisdiction in which it is located or where it is processed, stored, or transferred. It encompasses the rights and responsibilities of individuals, organizations, or governments over data governance, privacy, and control within their respective legal jurisdictions, ensuring compliance with data protection laws, privacy regulations, and...")
  • 22:45, 5 May 2024Data Sanitization (hist | edit) ‎[7,907 bytes]Ccocrick (talk | contribs) (Created page with "== Data Sanitization == '''Data Sanitization''' refers to the process of cleansing, scrubbing, or purging sensitive or confidential information from storage devices, digital media, or electronic systems to prevent unauthorized access, disclosure, or recovery of data remnants after the end of its useful life or intended use. Also known as data wiping, data erasure, or data destruction, data sanitization aims to render data irrecoverable by overwriting, degaussing, or phy...")
  • 22:42, 5 May 2024Data Masking (hist | edit) ‎[7,646 bytes]Ccocrick (talk | contribs) (Created page with "== Data Masking == '''Data Masking''' is a data protection technique used to conceal or obfuscate sensitive information within a dataset while preserving its usability and integrity for legitimate purposes. Also known as data obfuscation or anonymization, data masking replaces sensitive data elements, such as personally identifiable information (PII), financial records, or classified information, with fictitious, modified, or scrambled values to prevent unauthorized acc...")
  • 22:40, 5 May 2024Data Loss Prevention (hist | edit) ‎[7,293 bytes]Ccocrick (talk | contribs) (Created page with "== Data Loss Prevention == '''Data Loss Prevention''' (DLP) refers to a set of technologies, processes, and strategies designed to identify, monitor, control, and prevent the unauthorized or accidental exposure, leakage, or misuse of sensitive data across networks, endpoints, and cloud environments to safeguard against data breaches, compliance violations, and insider threats. === Overview === Data Loss Prevention aims to protect sensitive information, such as persona...")
  • 22:38, 5 May 2024Data Exfiltration (hist | edit) ‎[6,413 bytes]Ccocrick (talk | contribs) (Created page with "== Data Exfiltration == '''Data Exfiltration''' refers to the unauthorized or illicit transfer, extraction, or theft of sensitive or proprietary data from a computer network, system, or device by an attacker or insider with the intent to access, misuse, or disclose the stolen information for malicious purposes. === Overview === Data exfiltration is a common tactic employed by cybercriminals, hackers, insiders, or advanced persistent threat (APT) groups to steal valuab...")
  • 22:35, 5 May 2024Data Encryption Standard (hist | edit) ‎[4,869 bytes]Ccocrick (talk | contribs) (Created page with "== Data Encryption Standard == The '''Data Encryption Standard''' (DES) is a symmetric-key block cipher algorithm used for encrypting and decrypting electronic data. Developed by IBM in the early 1970s, DES was adopted as a federal standard for encryption in the United States and became widely used in various applications, including financial transactions, communications, and data security. === Overview === DES operates on fixed-size blocks of plaintext data, typicall...")
  • 21:57, 5 May 2024Data Dump (hist | edit) ‎[7,418 bytes]Ccocrick (talk | contribs) (Created page with "== Data Dump == A '''Data Dump''' refers to the unauthorized or unintentional release, disclosure, or exposure of a large volume of data, information, or files, typically stored in electronic format, onto the internet, dark web, or other public forums, often resulting in privacy breaches, security vulnerabilities, and potential harm to individuals or organizations. === Overview === A Data Dump occurs when a significant amount of data is leaked, stolen, or made publicl...")
  • 21:52, 5 May 2024Data Classification (hist | edit) ‎[7,495 bytes]Ccocrick (talk | contribs) (Created page with "== Data Classification == '''Data Classification''' is the process of categorizing and organizing data assets based on their sensitivity, value, importance, and regulatory requirements to facilitate effective data management, protection, and security controls. === Overview === Data Classification is a fundamental component of information security and data governance practices, enabling organizations to identify, label, and manage data according to its level of confide...")
  • 21:50, 5 May 2024Wireshark Certified Network Analyst (hist | edit) ‎[6,564 bytes]Ccocrick (talk | contribs) (Created page with "== Data Breach == A '''Data Breach''' occurs when sensitive, confidential, or protected information is accessed, disclosed, or compromised without authorization, potentially exposing individuals, organizations, or systems to security risks, identity theft, financial fraud, or reputational damage. === Overview === A Data Breach occurs when cybercriminals, hackers, or malicious actors gain unauthorized access to sensitive data, such as personal identifiable information...")
  • 21:44, 5 May 2024Dark Web (hist | edit) ‎[5,293 bytes]Ccocrick (talk | contribs) (Created page with "== Dark Web == The '''Dark Web''' is a part of the internet that is not indexed by traditional search engines and is accessible only through specialized software, configurations, or authorization, allowing users to operate anonymously and conduct illicit activities, trade illegal goods, and exchange sensitive information without detection. === Overview === The Dark Web is a subset of the Deep Web, which refers to all web pages that are not indexed by standard search e...")
  • 21:43, 5 May 2024Cybersecurity Maturity Model Certification (hist | edit) ‎[4,751 bytes]Ccocrick (talk | contribs) (Created page with "== Cybersecurity Maturity Model Certification == The '''Cybersecurity Maturity Model Certification''' (CMMC) is a unified standard and certification framework developed by the United States Department of Defense (DoD) to assess and enhance the cybersecurity posture of defense contractors and subcontractors in the Defense Industrial Base (DIB) supply chain. === Overview === The CMMC framework aims to strengthen the cybersecurity defenses and resilience of organizations...")
  • 18:40, 5 May 2024Cybersecurity Framework (hist | edit) ‎[5,678 bytes]Ccocrick (talk | contribs) (Created page with "== Cybersecurity Framework == A '''Cybersecurity Framework''' is a set of guidelines, best practices, standards, and methodologies designed to help organizations manage cybersecurity risks, protect critical assets, and enhance cybersecurity posture through effective governance, risk management, and compliance strategies. === Overview === Cybersecurity frameworks provide a structured approach to cybersecurity governance, risk assessment, and mitigation, enabling organi...")
  • 18:35, 5 May 2024Cyberespionage (hist | edit) ‎[6,448 bytes]Ccocrick (talk | contribs) (Created page with "== Cyberespionage == '''Cyberespionage''' refers to the use of computer networks and digital technologies to conduct espionage activities, gather intelligence, and steal sensitive information from government agencies, businesses, organizations, or individuals, typically for strategic, political, economic, or military purposes. === Overview === Cyberespionage involves the covert acquisition of confidential data, intellectual property, trade secrets, or classified infor...")
  • 18:30, 5 May 2024Cyberattack (hist | edit) ‎[5,610 bytes]Ccocrick (talk | contribs) (Created page with "== Cyberattack == A '''Cyberattack''' is a deliberate, malicious attempt to disrupt, damage, or gain unauthorized access to computer systems, networks, or digital devices, often with the intent to steal sensitive information, cause financial harm, or disrupt normal operations. === Overview === Cyberattacks exploit vulnerabilities in software, hardware, or human behavior to compromise the confidentiality, integrity, or availability of digital assets, data, and services...")
  • 18:29, 5 May 2024Cyber Range (hist | edit) ‎[5,862 bytes]Ccocrick (talk | contribs) (Created page with "== Cyber Range == A '''Cyber Range''' is a controlled and secure environment designed to simulate real-world cybersecurity scenarios, providing a platform for training, testing, and evaluating the skills, capabilities, and responses of cybersecurity professionals, incident responders, and IT personnel. === Overview === A Cyber Range is an essential tool for cybersecurity training, education, and preparedness. It allows organizations to simulate cyber threats, attack s...")
  • 16:07, 5 May 2024Cyber Insurance (hist | edit) ‎[5,748 bytes]Ccocrick (talk | contribs) (Created page with "== Cyber Insurance == '''Cyber Insurance''' is a type of insurance coverage designed to protect individuals and organizations against financial losses and liabilities resulting from cyber-related incidents, data breaches, and security breaches. === Overview === Cyber insurance provides financial protection and risk transfer mechanisms to policyholders in the event of cybersecurity incidents, such as data breaches, ransomware attacks, business interruption, network int...")
  • 16:05, 5 May 2024Cyber Hygiene (hist | edit) ‎[5,935 bytes]Ccocrick (talk | contribs) (Created page with "== Cyber Forensics == '''Cyber Forensics''', also known as digital forensics or computer forensics, is the practice of collecting, analyzing, and preserving digital evidence from computers, networks, and electronic devices to investigate cybercrimes and security incidents. === Overview === Cyber forensics involves the application of forensic techniques, tools, and methodologies to identify, collect, and analyze digital evidence related to cybercrimes, data breaches, h...")
  • 16:04, 5 May 2024Cyber Forensics (hist | edit) ‎[5,935 bytes]Ccocrick (talk | contribs) (Created page with "== Cyber Forensics == '''Cyber Forensics''', also known as digital forensics or computer forensics, is the practice of collecting, analyzing, and preserving digital evidence from computers, networks, and electronic devices to investigate cybercrimes and security incidents. === Overview === Cyber forensics involves the application of forensic techniques, tools, and methodologies to identify, collect, and analyze digital evidence related to cybercrimes, data breaches, h...")
  • 15:59, 5 May 2024Cryptography (hist | edit) ‎[5,506 bytes]Ccocrick (talk | contribs) (Created page with "== Cryptography == '''Cryptography''' is the science and practice of securing communication and data by encoding it into an unintelligible form, making it unreadable to unauthorized users. === Overview === Cryptography encompasses techniques and methods for ensuring the confidentiality, integrity, and authenticity of information through the use of mathematical algorithms and cryptographic protocols. It involves the transformation of plaintext (readable data) into ciph...")
  • 15:51, 5 May 2024Cryptographic Vulnerabilities (hist | edit) ‎[4,294 bytes]Ccocrick (talk | contribs) (Created page with "== Cryptographic Vulnerabilities == '''Cryptographic vulnerabilities''' refer to weaknesses or flaws in cryptographic systems that can be exploited to compromise the security and integrity of encrypted data and communications. === Overview === Cryptographic vulnerabilities arise due to design flaws, implementation errors, or weaknesses in cryptographic algorithms, protocols, or key management practices. These vulnerabilities can be exploited by attackers to bypass enc...")
  • 15:50, 5 May 2024Cryptanalysis (hist | edit) ‎[4,188 bytes]Ccocrick (talk | contribs) (Created page with "== Cryptanalysis == '''Cryptanalysis''' is the study of cryptographic systems with the goal of analyzing and breaking them to gain access to encrypted data without knowledge of the decryption key. === Overview === Cryptanalysis is an interdisciplinary field that combines elements of mathematics, computer science, and cryptography to analyze the security of cryptographic algorithms and protocols. The primary objective of cryptanalysis is to identify weaknesses, vulnera...")
  • 15:48, 5 May 2024Cross-Site Scripting (hist | edit) ‎[3,926 bytes]Ccocrick (talk | contribs) (Created page with "== Cross-Site Scripting == '''Cross-Site Scripting''' (XSS) is a type of security vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users. === Overview === Cross-Site Scripting (XSS) is a prevalent web security vulnerability that arises when a web application accepts user input without proper validation or sanitization and then includes that input in its output HTML content. Attackers exploit XSS vulnerabilities to inject m...")
  • 15:45, 5 May 2024Cross-Site Request Forgery (hist | edit) ‎[4,650 bytes]Ccocrick (talk | contribs) (Created page with "== Cross-Site Request Forgery == '''Cross-Site Request Forgery''' (CSRF) is a type of security vulnerability that occurs when a malicious actor tricks a user into performing unauthorized actions on a web application in which the user is authenticated. === Overview === Cross-Site Request Forgery (CSRF) is a common web security threat that exploits the trust relationship between a user's browser and a web application. In a CSRF attack, the attacker crafts a malicious re...")
  • 15:41, 5 May 2024Cross-Origin Resource Sharing (hist | edit) ‎[5,441 bytes]Ccocrick (talk | contribs) (Created page with "== Cross-Origin Resource Sharing == '''Cross-Origin Resource Sharing''' (CORS) is a security mechanism implemented by web browsers to allow web servers to specify which origins are permitted to access resources on a web page from a different domain. === Overview === Cross-Origin Resource Sharing (CORS) is a fundamental security feature of modern web browsers that enables web servers to control access to resources, such as APIs, fonts, images, and scripts, from differe...")
  • 15:32, 5 May 2024Content Security Policy (hist | edit) ‎[5,492 bytes]Ccocrick (talk | contribs) (Created page with "== Content Disarm & Reconstruction == '''Content Disarm & Reconstruction''' (CDR) is a cybersecurity technique used to mitigate the risk of malicious content by sanitizing and rebuilding files to remove potential threats while preserving their functionality and usability. === Overview === Content Disarm & Reconstruction (CDR) is an advanced security approach that aims to protect organizations from malware, exploits, and other cyber threats hidden within files, documen...")
  • 15:31, 5 May 2024Content Disarm and Reconstruction (hist | edit) ‎[5,632 bytes]Ccocrick (talk | contribs) (Created page with "== Content Disarm & Reconstruction == '''Content Disarm & Reconstruction''' (CDR) is a cybersecurity technique used to mitigate the risk of malicious content by sanitizing and rebuilding files to remove potential threats while preserving their functionality and usability. === Overview === Content Disarm & Reconstruction (CDR) is an advanced security approach that aims to protect organizations from malware, exploits, and other cyber threats hidden within files, documen...")
  • 15:28, 5 May 2024Container Security (hist | edit) ‎[5,105 bytes]Ccocrick (talk | contribs) (Created page with "== Container Security == '''Container Security''' refers to the practices, tools, and processes used to secure containerized applications and environments against cyber threats, vulnerabilities, and attacks. === Overview === Containerization technology, popularized by platforms like Docker and Kubernetes, allows developers to package applications and their dependencies into lightweight, portable containers that can run consistently across different computing environme...")
  • 15:24, 5 May 2024Construction Industry Institute Cybersecurity Guidelines (hist | edit) ‎[5,158 bytes]Ccocrick (talk | contribs) (Created page with "== Construction Industry Institute (CII) Cybersecurity Guidelines == The '''Construction Industry Institute (CII) Cybersecurity Guidelines''' are a set of best practices, recommendations, and standards developed by the Construction Industry Institute (CII) to address cybersecurity challenges and risks in the construction industry. === Overview === The CII Cybersecurity Guidelines provide guidance and resources for construction companies, contractors, project owners, a...")
  • 15:22, 5 May 2024Concealment Cipher (hist | edit) ‎[4,279 bytes]Ccocrick (talk | contribs) (Created page with "== Concealment Cipher == A '''Concealment Cipher''' is a type of cryptographic algorithm or technique used to hide or disguise the presence of encrypted data within innocuous or inconspicuous cover objects, such as images, audio files, text documents, or other digital media. === Overview === Concealment ciphers are designed to conceal the existence of encrypted information by embedding it within the content of seemingly ordinary or benign carrier files, making it diff...")
  • 15:20, 5 May 2024Compliance Auditing (hist | edit) ‎[6,176 bytes]Ccocrick (talk | contribs) (Created page with "== Compliance Auditing == '''Compliance Auditing''' is the process of assessing and evaluating an organization's adherence to regulatory requirements, industry standards, internal policies, and best practices to ensure legal and ethical compliance, risk mitigation, and operational effectiveness. === Overview === Compliance auditing involves reviewing and analyzing various aspects of an organization's operations, processes, systems, and controls to determine whether th...")
  • 15:19, 5 May 2024Command and Control (hist | edit) ‎[5,070 bytes]Ccocrick (talk | contribs) (Created page with "== Command and Control == '''Command and Control''' (C2), also known as C&C or C2C, refers to the centralized infrastructure and communication channels used by attackers to manage and control compromised computer systems, networks, or devices remotely. === Overview === In cyberattacks, Command and Control servers serve as the centralized hubs through which attackers can remotely communicate with and control compromised devices, execute malicious commands, exfiltrate d...")
  • 15:17, 5 May 2024Cold Storage Backup (hist | edit) ‎[5,186 bytes]Ccocrick (talk | contribs) (Created page with "== Cold Storage Backup == '''Cold Storage Backup''' is a data backup strategy that involves storing backup copies of data in offline or disconnected storage media, such as tape drives, optical discs, or external hard drives, to protect against data loss, corruption, or unauthorized access. === Overview === Cold Storage Backup is designed to provide a secure and reliable means of preserving data for long-term retention and disaster recovery purposes. Unlike online or c...")
  • 15:16, 5 May 2024Code Signing Certificate (hist | edit) ‎[4,834 bytes]Ccocrick (talk | contribs) (Created page with "== Code Signing Certificate == A '''Code Signing Certificate''' is a digital certificate used by software developers to digitally sign their code, scripts, and executables to verify their authenticity and integrity. This cryptographic signature allows users and systems to confirm that the code has not been tampered with or altered since it was signed by the developer. === Overview === Code Signing Certificates provide a way for software developers to assure users that...")
  • 15:15, 5 May 2024Code Injection (hist | edit) ‎[3,494 bytes]Ccocrick (talk | contribs) (Created page with "== Code Injection == '''Code Injection''' is a security vulnerability that occurs when an attacker is able to insert and execute malicious code within a computer program or application. This technique is commonly used to exploit weaknesses in web applications, allowing attackers to perform unauthorized actions, steal data, or compromise the integrity of the system. === Overview === Code Injection attacks typically involve inserting malicious code into input fields, pa...")
  • 15:14, 5 May 2024Cloud Security Alliance (hist | edit) ‎[6,531 bytes]Ccocrick (talk | contribs) (Created page with "== Cloud Security Alliance == The '''Cloud Security Alliance''' (CSA) is a nonprofit organization dedicated to promoting the adoption of best practices and standards for securing cloud computing environments and advancing cloud security research, education, and certification. === Overview === The Cloud Security Alliance was established in 2009 by a group of industry leaders, security experts, and researchers to address the security challenges and concerns associated w...")
  • 15:13, 5 May 2024Cloud Security (hist | edit) ‎[5,137 bytes]Ccocrick (talk | contribs) (Created page with "== Cloud Security == '''Cloud Security''' refers to the set of policies, controls, technologies, and best practices designed to protect data, applications, and infrastructure in cloud computing environments from security threats, vulnerabilities, and risks. === Overview === Cloud Security encompasses various aspects of security, including data protection, identity and access management, network security, and compliance, tailored to the unique characteristics and chall...")
  • 15:11, 5 May 2024Cloud Encryption (hist | edit) ‎[5,245 bytes]Ccocrick (talk | contribs) (Created page with "== Cloud Controls Matrix == The '''Cloud Controls Matrix''' (CCM) is a cybersecurity framework developed by the Cloud Security Alliance (CSA) to provide organizations with a standardized set of security controls and best practices for assessing, implementing, and managing security in cloud environments. === Overview === The Cloud Controls Matrix offers a comprehensive catalog of security controls mapped to leading standards, frameworks, and regulations, such as ISO/IE...")
  • 15:10, 5 May 2024Cloud Controls Matrix (hist | edit) ‎[5,220 bytes]Ccocrick (talk | contribs) (Created page with "== Cloud Controls Matrix == The '''Cloud Controls Matrix''' (CCM) is a cybersecurity framework developed by the Cloud Security Alliance (CSA) to provide organizations with a standardized set of security controls and best practices for assessing, implementing, and managing security in cloud environments. === Overview === The Cloud Controls Matrix offers a comprehensive catalog of security controls mapped to leading standards, frameworks, and regulations, such as ISO/IE...")
  • 15:09, 5 May 2024Cloud Access Security Broker (hist | edit) ‎[5,339 bytes]Ccocrick (talk | contribs) (Created page with "== Cloud Access Security Broker == A '''Cloud Access Security Broker''' (CASB) is a security solution or service that acts as an intermediary between cloud service users and cloud service providers to enforce security policies, monitor activity, and protect data in cloud environments. === Overview === Cloud Access Security Brokers provide organizations with visibility, control, and security capabilities to manage the use of cloud services and applications, including S...")
  • 15:08, 5 May 2024Clickjacking (hist | edit) ‎[3,524 bytes]Ccocrick (talk | contribs) (Created page with "== Clickjacking == '''Clickjacking''' is a malicious technique used by attackers to trick users into clicking on elements of a webpage without their knowledge or consent, often resulting in unintended actions or disclosure of sensitive information. === Overview === Clickjacking involves overlaying or embedding transparent or opaque elements, such as buttons, links, or forms, on top of legitimate web content, making them invisible or partially visible to users. Attacke...")
  • 15:05, 5 May 2024Children's Internet Protection Act (hist | edit) ‎[4,048 bytes]Ccocrick (talk | contribs) (Created page with "== Children's Internet Protection Act == The '''Children's Internet Protection Act''' (CIPA) is a United States federal law enacted to address concerns about children's access to harmful or inappropriate online content and to promote internet safety in schools and libraries that receive federal funding for internet access. === Overview === The Children's Internet Protection Act requires schools and libraries that receive federal funding for internet access to implemen...")
  • 14:56, 5 May 2024Childrens Online Privacy Protection Act (hist | edit) ‎[3,881 bytes]Ccocrick (talk | contribs) (Created page with "== Children's Online Privacy Protection Act == The '''Children's Online Privacy Protection Act''' (COPPA) is a United States federal law enacted to protect the online privacy and personal information of children under the age of 13. === Overview === The Children's Online Privacy Protection Act aims to regulate the collection, use, and disclosure of personal information from children by commercial websites, online services, and mobile apps. COPPA imposes requirements o...")
  • 14:55, 5 May 2024Certificate Revocation List (hist | edit) ‎[3,720 bytes]Ccocrick (talk | contribs) (Created page with "== Certificate Revocation List == A '''Certificate Revocation List''' (CRL) is a digital document maintained by a Certificate Authority (CA) that contains a list of digital certificates that have been revoked or invalidated before their scheduled expiration date. === Overview === Certificate Revocation Lists serve as a mechanism for informing users, applications, and network devices about the status of digital certificates that are no longer trusted or valid due to va...")
  • 14:51, 5 May 2024Certificate Pinning (hist | edit) ‎[3,723 bytes]Ccocrick (talk | contribs) (Created page with "== Certificate Pinning == '''Certificate Pinning''' is a security mechanism used to enhance the trust and integrity of SSL/TLS connections by associating a specific digital certificate or public key with a particular domain or service, thereby preventing potential man-in-the-middle (MITM) attacks and unauthorized certificate substitutions. === Overview === Certificate Pinning helps to mitigate the risk of attacks where an attacker presents a fraudulent or compromised...")
  • 14:51, 5 May 2024Certificate Authority (hist | edit) ‎[4,397 bytes]Ccocrick (talk | contribs) (Created page with "== Certificate Authority == A '''Certificate Authority''' (CA) is a trusted entity that issues digital certificates, which are used to authenticate the identity of individuals, organizations, or devices in online communications and transactions. === Overview === Certificate Authorities play a crucial role in establishing trust and security on the Internet by issuing digital certificates that bind cryptographic keys to the identities of entities, such as websites, serv...")
  • 14:49, 5 May 2024California Consumer Privacy Act (hist | edit) ‎[4,390 bytes]Ccocrick (talk | contribs) (Created page with "== California Consumer Privacy Act == The '''California Consumer Privacy Act''' (CCPA) is a state-level data privacy law enacted in California, United States, designed to enhance privacy rights and consumer protections for residents of California. === Overview === The California Consumer Privacy Act establishes new privacy rights, disclosure obligations, and compliance requirements for businesses that collect, process, or share personal information of California resid...")
(newest | oldest) View ( | ) (20 | 50 | 100 | 250 | 500)