Press "Enter" to skip to content

Posts published in “Types of security”

Advertiser

Firewall

A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes…

IDS

An intrusion detection system (IDS) is a device or software application that monitors a network or systems for malicious activity or policy violations. Any malicious…

Penetration test

A penetration test, also known as a pen test, pentest or ethical hacking, is an authorized simulated cyberattack on a computer system, performed to evaluate…

Vulnerability assessment

A vulnerability assessment process that is intended to identify threats and the risks they pose typically involves the use of automated testing tools, such as…

Security engineering

Security engineering is a specialized field of engineering that focuses on the security aspects in the design of systems that need to be able to…

WebSockets

WebSockets is an advanced technology that allows real-time interactive communication between the client browser and a server. It uses a completely different protocol that allows…

OAuth 2.0

User Authentication with OAuth 2.0. The OAuth 2.0 specification defines a delegation protocol that is useful for conveying authorization decisions across a network of web-enabled…

SSL Certificates

An SSL certificate is a type of digital certificate that provides authentication for a website and enables an encrypted connection. These certificates communicate to the…

https

https- Hypertext Transfer Protocol Secure is an extension of the Hypertext Transfer Protocol. It is used for secure communication over a computer network, and is…

Antimalware

Antimalware (anti-malware) is a type of software program designed to prevent, detect and remove malicious software (malware) on IT systems, as well as individual computing…