ecsc.co.uk

Website:http://ecsc.co.uk
Upvotes received2
Downvotes received1
Karma:2 (upvotes-downvotes)



0 earned Badges

No badges were found



Definitions (63)

1

1 Thumbs up   0 Thumbs down

sql injection


SQL Injection is an exploit in which the attacker adds code to a web form entry field to gain access to resources or make changes to data.
Source: ecsc.co.uk

2

1 Thumbs up   1 Thumbs down

quick links


About
Source: ecsc.co.uk

3

0 Thumbs up   0 Thumbs down

cyber security glossary


For managers and executives who may not deal with cyber security on a daily basis, it can often seem like another world: one that is filled with complicated jargon and people who seem to talk in acron [..]
Source: ecsc.co.uk

4

0 Thumbs up   0 Thumbs down

authentication


Authentication is the process of confirming a user's claimed identity is correct.
Source: ecsc.co.uk

5

0 Thumbs up   0 Thumbs down

access control


Access Control refers to a set of processes and/or procedures which ensure that resources are only granted to authorised and required users.
Source: ecsc.co.uk

6

0 Thumbs up   0 Thumbs down

blacklist


A blacklist is a list of entities that are considered to be unacceptable/untrustworthy and are denied access or privileges.
Source: ecsc.co.uk

7

0 Thumbs up   0 Thumbs down

botnet


A botnet is a collection of internet-connected computers that are infected with malicious software that allows an attacker to control them without their owner's knowledge, often with the purp [..]
Source: ecsc.co.uk

8

0 Thumbs up   0 Thumbs down

business continuity management


Business Continuity Management is the area of planning for how business operations will be maintained following significant disruption.
Source: ecsc.co.uk

9

0 Thumbs up   0 Thumbs down

ciphertext


Ciphertext refers to data that has been encrypted; hence, plaintext that has been encrypted becomes ciphertext.
Source: ecsc.co.uk

10

0 Thumbs up   0 Thumbs down

clickjacking


Clickjacking is an attack where a malicious link is concealed behind legitimate content, thus tricking a user into performing an action they are unaware of.
Source: ecsc.co.uk


To view all 63 definitions, please sign in.