((HASP)) Hardware against software piracy
A hardware item intended to protect software from unauthorized copying or installation.
A hardware item intended to protect software from unauthorized copying or installation.
A US Government standard (commonly known as “AES”) for electronic data encryption. AES describes a symmetric-key algorithm: the same key is used to both encrypt and decrypt data.
Combination of several distinct evasion tactics to create a new evasion method delivered simultaneously over multiple network layers. Advanced evasion techniques can enable an attacker to gain undetected access to...
The ability of computers to execute tasks usually associated with natural, human intelligence: especially natural language processing, problem-solving, and pattern recognition.
A cyberattack characterized by stealth and long duration, and also a threat actor that carries out such attacks. Advanced persistent threats (usually refered to by the acronym “APT”) typically interact...
A specific interface standard for connecting storages devices in computers. Sometimes known as Integrated Drive Electronics (IDE).
A form of social engineering in which an attacker spoofs an email from a corporate officer and directs a member of the statf, usually in finance or accounts payable, to...
An enterprise practice or policy that allows employees to use their own mobile devices on the enterprise’s networks. Commonly referred to by the acronym BYOD.
A cloud security model in which cloud service customers use their own encryption software and manage their own encryption keys. Commonly referred to by the acronym BYOE.
An entity that issues digital certificates. Commonly abbreviated CA.