A tag is a keyword or label that categorizes your question with other, similar questions. Using the right tags makes it easier for others to find and answer your question.
Type to find tags: |
encryption× 947
the process of transforming plaintext using a cipher to make it unreadable to anyone except those possessing the key.
|
web-application× 747
accessed over a network such as the Internet or an intranet using a browser.
|
passwords× 741
Specific to the security of passwords: hashing, entropy, cracking, resets, lockouts, etc.
|
ssl× 713
SSL (Secure Sockets Layer) and/or TLS (Transport Layer Security)
|
cryptography× 702
the practice and study of logical means used to achieve information confidentiality, integrity and authenticity. It covers, among other things, encryption (making some data unreadable …
|
authentication× 688
Authentication - establishing the authenticity of a person or other entity. Not to be confused with authorization - defining access rights to resources.
|
network× 658
Network Security - securing network infrastructure and connections
|
appsec× 450
Application security - Specific to securing an application rather than the connection, infrastructure, browser etc
|
windows× 420
A family of graphical operating systems produced by Microsoft. Windows includes both server and destop operating systems. Early versions relied on MS-DOS while current versions have evolved from Windo…
|
hash× 391
a function which takes a variable size input and produces a fixed size output. The algorithm tries to make it difficult to predict the output for a given input, find two inputs wit…
|
certificates× 343
A piece of data used in public key cryptography that contains identifying information (i.e. email address or web address), a hash of a public key, and a digital signature that authenticates the data i…
|
web-browser× 313
an application which uses http and related protocols to retrieve HTML and XML data from servers. As the web has become a critical source of information and communication, web browsers…
|
linux× 302
Securing Linux systems and applications; understanding Linux security features.
|
penetration-test× 282
An attempt to penetrate a system's security in an effort to evaluate the protections in place.
|
attacks× 281
An attempt by a threat to exploit a weakness in a system.
|
malware× 276
any software application which subverts the will of the legitimate owner of a computer, by means of force or subterfuge, with or without personal or monetary gain on the part of the creator…
|
php× 268
Security aspects concerning code written in the programming language PHP which is often used for web applications.
|
firewalls× 265
Concerned with software or hardware firewalls
|
email× 260
Related to email protocols, clients, servers, content, and message format.
|
privacy× 249
The attribute of a system that prevents the release of data to unauthorized individuals.
The ability or expectation of an individual or group to reveal information about themselves selectively or n…
|
public-key-infrastructure× 215
a set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates. In cryptography, a…
|
webserver× 215
to deliver web pages on request to clients.
|
mobile× 213
Security in mobile devices. Issues concerning regular cellphones, smartphones, tablet computers and other portable information devices all fit into this category.
|
password-management× 211
The functions performed by the person or processes responsible for security of passwords on a given system.
|
exploit× 195
The data, tools, and procedures which, when applied to a specific vulnerability, predictably violate the security design of a system.
|
wifi× 192
Security for 802.11 wireless networks.
|
javascript× 176
The common name for the language used primarily for scripting in web browsers. It is not related to the Java language. Standardized as ECMAScript, its dialects/implementations include JavaScript and J…
|
attack-prevention× 171
prevention of an attack vector (e.g. XSS, HPP, CSRF)
|
http× 166
Definition: HTTP - the Hypertext Transfer Protocol - provides a standard for Web browsers and servers to communicate. The definition of HTTP is a technical specification of a network protocol that sof…
|
virus× 159
a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes.
|
xss× 155
Cross-Site Scripting: An attack method that involves injection of code or markup into a webpage. There are three major types of XSS: Reflected XSS, Stored XSS (aka persistent XSS), DOM-based XSS (aka …
|
key-management× 151
Key management involves the entire key life-cycle: generation, exchange, storage, safeguarding, use, vetting, revocation, replacement and retirement.
|
ssh× 147
a protocol for secure communication between computers to execute remote commands, transfer data and tunnel TCP connections.
|
java× 145
security aspects specific to the Java programming language and libraries.
|
access-control× 145
A security mechanism which enforces policy describing which requesters may perform operations on specified objects. There are typically multiple types of operations. Common operations include: read, w…
|
certificate-authority× 142
Certificate authorities verify the owner information of certificates by signing them.
|