IT Management  >   Systems Operations  >   Security  >  

Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Day-zero Threats, Zero Day Threats, Internet Threats, Security Breaches, Virus Threats, Day Zero Threats, Computer Security Threats, Network Security Threats, Threat Mitigation, Network-level Threats, Network Threats, Network Level Threats, Spyware Threats, Internet Security Threats, Application Security Threats, Threat Management, Software Security Threats, Information Security Threats, Threats, Web Threats
DEFINITION: Parameter tampering is a form of Web-based attack in which certainparameters in the Uniform Resource Locator (URL)or Web page form field data entered by a user are changed without that user's authorization. Thispoints the browserto a link, page or site other than the one the user intends (although it may look exactly the sameto the casual observer).Parameter tampering can be employed by criminals and  … 
Definition continues below.
Security ThreatsWhite Papers (View All Report Types)
126 - 150 of 1143 Matches Previous Page  | Next Page
Enterprise Executives and Consumers Lack Confidence About Cybersecurity
sponsored by Threat Track Security
WHITE PAPER: This informative guide outlines the lack of confidence many executives and consumers have about their cybersecurity.
Posted: 13 Jun 2014 | Published: 13 Jun 2014

Threat Track Security

Microsoft Extends Windows® XP Malware Support-Compliance Issues Remain
sponsored by Lenovo and Windows 8 Pro
WHITE PAPER: This informative guide explores the risks associated with Windows® XP and why now is the time to upgrade your operating system – ensuring system security.
Posted: 13 Jun 2014 | Published: 13 Jun 2014

Lenovo and Windows 8 Pro

Security and Controlling Data in the Cloud
sponsored by Vormetric
WHITE PAPER: This white paper reveals the ability to extend existing security systems to cloud environments to provide consistent and all-around protection.
Posted: 13 Jun 2014 | Published: 31 Dec 2013

Vormetric

5 Ways Dropbox for Business Keeps Your Data Protected
sponsored by Dropbox for Business
WHITE PAPER: This white paper presents 5 ways that this cloud service will protect your data, with security as a native core function.
Posted: 12 Jun 2014 | Published: 31 May 2014

Dropbox for Business

Simplifying IT Operations and Improving Data Access Security
sponsored by Vormetric
WHITE PAPER: This resource explores the challenges in key management encryption and explains why current solutions fall short.
Posted: 12 Jun 2014 | Published: 31 Jul 2012

Vormetric

The One-Man SOC Webcast: Habits of Highly Effective Security Practitioners
sponsored by AlienVault
WHITE PAPER: This informative resource outlines top strategies for a highly effective SOC.
Posted: 12 Jun 2014 | Published: 12 Jun 2014

AlienVault

Compare Windows 8 and Windows® XP Security Problems
sponsored by Lenovo and Windows 8 Pro
WHITE PAPER: This white paper explains the most critical security-related differences between Windows® XP and Windows 8, including each operating system’s ability to provision security patches, integrate with MDM and more.
Posted: 11 Jun 2014 | Published: 11 Jun 2014

Lenovo and Windows 8 Pro

HP TippingPoint Intrusion Prevention System halts threats at the door - Solution increases visibility to potential threats, attacks and policy violations against HP systems
sponsored by Hewlett-Packard Limited
WHITE PAPER: Prevent future cyber attacks from occurring by modifying your company's security infrastructure.
Posted: 11 Jun 2014 | Published: 01 Nov 2013

Hewlett-Packard Limited

U.S. Defense Contractors Say They Remain Vulnerable to Cyber-Attacks
sponsored by Threat Track Security
WHITE PAPER: This informative whitepaper outlines the vulnerability of U.S. defense contractors and explores what that means for your business.
Posted: 11 Jun 2014 | Published: 11 Jun 2014

Threat Track Security

A Comprehensive Guide to Encryption Technology Approaches
sponsored by Vormetric
WHITE PAPER: This resource highlights 11 encryption technologies and offers key questions to help you choose the right solution for your business needs.
Posted: 11 Jun 2014 | Published: 31 Dec 2012

Vormetric

TELUS leverages HP ArcSight and TippingPoint - Managed security service provider builds intelligentanalysis on tightly integrated HP solution
sponsored by Hewlett-Packard Limited
WHITE PAPER: This resource explains the reasoning behind MSSPs and how they help prevent cybercrime.
Posted: 10 Jun 2014 | Published: 01 Sep 2013

Hewlett-Packard Limited

Taking control of file sharing services
sponsored by Mimecast
WHITE PAPER: This white paper offers key recommendations on choosing an enterprise-grade file sharing service for optimum collaboration security.
Posted: 10 Jun 2014 | Published: 30 Apr 2014

Mimecast

Security in the Cloud for SAP HANA
sponsored by Vormetric
WHITE PAPER: This white paper features a data security architecture that offers encryption and granular access controls to better protect SAP HANA cloud deployments.
Posted: 10 Jun 2014 | Published: 10 Jun 2014

Vormetric

Vormetric Encryption Architecture Overview
sponsored by Vormetric
WHITE PAPER: This white paper explains why an encryption strategy is a must in order to better protect data from security breaches.
Posted: 10 Jun 2014 | Published: 31 Dec 2012

Vormetric

The Legal Obligations for Encryption of Personal Data in United States, Europe, Asia and Australia
sponsored by Vormetric
WHITE PAPER: This white paper defines the global legal obligations and financial services laws that require data encryption.
Posted: 10 Jun 2014 | Published: 31 May 2014

Vormetric

Building a Better Network Security Strategy
sponsored by Hewlett-Packard Company
WHITE PAPER: This informative resource discusses what features a network security strategy should cover in order to ensure success in today's business world.
Posted: 06 Jun 2014 | Published: 31 Jan 2014

Hewlett-Packard Company

It's Time Businesses Wake up to Mobile Security Reality
sponsored by Threat Track Security
WHITE PAPER: This white paper addresses the need for top-notch mobile security. With the rise of personal devices used in the workplace, security is more important than ever before.
Posted: 06 Jun 2014 | Published: 06 Jun 2014

Threat Track Security

Balancing HADOOP Data Security with Performance
sponsored by Vormetric
WHITE PAPER: This white paper features a Hadoop data security system that offers encryption to boost protection without weighing down performance.
Posted: 05 Jun 2014 | Published: 05 Jun 2014

Vormetric

6 Ways to Enhance Security in AWS
sponsored by SafeNet, Inc.
WHITE PAPER: In this white paper, learn why Amazon Web Services (AWS) is a leading cloud service, with a strong partnership with a security provider that provides 6 additional security enhancements to better protect data.
Posted: 05 Jun 2014 | Published: 28 Feb 2014

SafeNet, Inc.

Secure Cloud Applications Without Disrupting Your Enterprise Identity Infrastructure
sponsored by Radiant Logic, Inc.
WHITE PAPER: This resource features an on-premise federated identity service that helps you extent your existing identity and access management (IAM) infrastructures to the cloud.
Posted: 05 Jun 2014 | Published: 31 Dec 2012

Radiant Logic, Inc.

A Survey of Zero-day Attacks in 2013 and What They Say About the Traditional Security Model
sponsored by FireEye
WHITE PAPER: This informative survey explores zero-day attacks in 2013 and what they say about the traditional security model.
Posted: 05 Jun 2014 | Published: 05 Jun 2014

FireEye

Smart enterprise mobility solutions are powered by Smart Containerization™
sponsored by CA Technologies.
WHITE PAPER: This informative white paper examines a technique called containerization, which allows you to keep enterprise data segregated in its own "container" so that you can apply security policies without affecting any data that isn't work related.
Posted: 04 Jun 2014 | Published: 04 Jun 2014

CA Technologies.

Evolve SiteMinder With RadiantOne
sponsored by Radiant Logic, Inc.
WHITE PAPER: This white paper features a federated identity service that unifies identity policies for simplified management, helping reduce costs for growing user environments.
Posted: 04 Jun 2014 | Published: 31 Dec 2013

Radiant Logic, Inc.

The Insider Threat of Bring Your Own Cloud (BYOC)
sponsored by SkyHigh
WHITE PAPER: This Ponemon study highlights the latest bring-your-own-cloud (BYOC) trend, and names the top risks associated with personal cloud services in the workplace.
Posted: 04 Jun 2014 | Published: 31 Jan 2014

SkyHigh

Securing the Mobile Cloud Connected Enterprise
sponsored by CA Technologies.
WHITE PAPER: This resource reveals the role of identity and access management in improving access and secure collaboration in today's mobile, cloud-connected IT environment.
Posted: 12 Jun 2014 | Published: 12 Jun 2014

CA Technologies.
126 - 150 of 1143 Matches Previous Page    4 5 6 7 8 9    Next Page
 
SECURITY THREATS DEFINITION (continued): …  identitythieves to surreptitiously obtain personal or business information about the user.Countermeasures specific to the prevention of parameter tampering involve the validation of allparameters to ensure that they conform to standards concerning minimum and maximum allowablelength, allowable numeric range, allowable character sequences and patterns, whether or not theparameter is actually required to conduct the transaction in question, and whether or not null isallowed.Whitelisting(accepting only allowable input) is more effective than blacklisting(refusing to accept forbidden input). A Web … 
Security Threats definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement