IT Management  >   Systems Operations  >   Security  >  

Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Day-zero Threats, Zero Day Threats, Internet Threats, Security Breaches, Virus Threats, Day Zero Threats, Computer Security Threats, Network Security Threats, Threat Mitigation, Network-level Threats, Network Threats, Network Level Threats, Spyware Threats, Internet Security Threats, Application Security Threats, Threat Management, Software Security Threats, Information Security Threats, Threats, Web Threats
DEFINITION: Parameter tampering is a form of Web-based attack in which certainparameters in the Uniform Resource Locator (URL)or Web page form field data entered by a user are changed without that user's authorization. Thispoints the browserto a link, page or site other than the one the user intends (although it may look exactly the sameto the casual observer).Parameter tampering can be employed by criminals and  … 
Definition continues below.
Security ThreatsWhite Papers (View All Report Types)
126 - 150 of 1045 Matches Previous Page  | Next Page
Reduce e-Commerce Fraud without Increasing Customer Friction for e-Commerce
sponsored by ThreatMetrix
WHITE PAPER: This guide discusses how to reduce e-commerce fraud without affecting your end-user experience.
Posted: 25 Mar 2014 | Published: 31 Dec 2013

ThreatMetrix

The New Windows Security: Achieving PC Lockdown without User Backlash in Five Easy Steps
sponsored by Dell and Microsoft
WHITE PAPER: Read this informative white paper and discover 5 easy steps for achieving PC security without affecting your end user experience.
Posted: 25 Mar 2014 | Published: 16 Sep 2013

Dell and Microsoft

Nine Simple (but Critical) Tips for Effective Patch Management
sponsored by Dell and Microsoft
WHITE PAPER: This guide explores 9 simple tips for effective patch management and how these steps can greatly enhance security.
Posted: 25 Mar 2014 | Published: 28 Oct 2013

Dell and Microsoft

How to Leverage Log Data for Effective Threat Detection
sponsored by AlienVault
WHITE PAPER: Watch this webcast now to learn practical strategies for defining what you actually need to collect (and why) to help you improve threat detection and incident response, and satisfy compliance requirements.
Posted: 25 Mar 2014 | Published: 25 Mar 2014

AlienVault

Avoiding Stealth Cyber Attacks
sponsored by Peak 10
WHITE PAPER: In this article, learn how stealth attacks are becoming more common, and what measures should be taken in order to keep data protected.
Posted: 24 Mar 2014 | Published: 11 Feb 2014

Peak 10

Five Trends to Track in E-Commerce Fraud
sponsored by ThreatMetrix
WHITE PAPER: This paper outlines five troubling trends in e-commerce fraud, and offers some guidance on how you can mitigate the risk they present to your business.
Posted: 24 Mar 2014 | Published: 31 Dec 2013

ThreatMetrix

ThreatMetrix Gives eMerchantPay a Substantial Competitive Advantage
sponsored by ThreatMetrix
WHITE PAPER: This case study explores eMerchantPay, an online payment service provider, and how it was able to utilize advanced analytics to block fraudulent devices.
Posted: 24 Mar 2014 | Published: 31 Dec 2013

ThreatMetrix

Assessing the Value of Next-Generation Firewalls (Gov)
sponsored by Dell Software
WHITE PAPER: This white paper describes the different types of network-based attacks and how they can affect your bottom line. Click through for recommendations on which security tools can help you prevent these threats.
Posted: 24 Mar 2014 | Published: 24 Mar 2014

Dell Software

7 Measures of Scalability for your Next-Generation Firewall (Gov)
sponsored by Dell Software
WHITE PAPER: Learn how to build a massively scalable next-generation firewall (NGFW) in this comprehensive white paper. It also outlines the kind of technical innovations needed to produce a massively scalable NGFW, and results from a benchmark test comparing the four leading next-generation firewalls.
Posted: 24 Mar 2014 | Published: 23 Aug 2013

Dell Software

What to Look for When Evaluating Next-Generation Firewalls (Edu)
sponsored by Dell Software
WHITE PAPER: This paper summarizes the results of three independent tests conducted by Network World, ICSA Labs and NSS Labs comparing next-generation firewall performance, cost and functionality.
Posted: 24 Mar 2014 | Published: 10 Dec 2012

Dell Software

Safe and Sound: The Importance of PC Security and Manageability
sponsored by Dell, Inc.
WHITE PAPER: This white paper discusses the biggest PC security and manageability pain points for IT pros.
Posted: 21 Mar 2014 | Published: 30 Nov 2013

Dell, Inc.

International Mobile Security: Research Highlights and Considerations for Enterprise IT
sponsored by Cisco
WHITE PAPER: This study reveals how today's organizations are approaching mobility and the consumerization of IT, and what this means for the development of security measures fit for a more diverse and flexible business environment.
Posted: 21 Mar 2014 | Published: 31 Jul 2013

Cisco

Secunia Vulnerability Review 2014
sponsored by Secunia
WHITE PAPER: This guide reviews vulnerabilities for 2014 and discusses key figures and facts from a global IT security perspective.
Posted: 21 Mar 2014 | Published: 26 Feb 2014

Secunia

Cisco BYOD Smart Solution: Take a Comprehensive Approach to Secure Mobility
sponsored by Cisco
WHITE PAPER: This white paper features a flexible, modular approach to mobile strategies that ensures optimum user access and experience, while offering robust security.
Posted: 21 Mar 2014 | Published: 31 Jul 2013

Cisco

Universities Have Much to Teach Cyber Thieves, Regrettably
sponsored by Peak 10
WHITE PAPER: Read this resource to gain insight on what steps institutions of higher education should take in leveraging IT tools to boost data protection strategies.
Posted: 21 Mar 2014 | Published: 04 Mar 2014

Peak 10

End Point Security in Medium and Large Organizations
sponsored by Dell, Inc.
WHITE PAPER: This white paper provides informative steps that IT organizations can take to ensure that data on endpoint devices is more consistently protected from theft, leakage and loss.
Posted: 20 Mar 2014 | Published: 20 Mar 2014

Dell, Inc.

Advanced DDoS Protection Service for Ecommerce Businesses
sponsored by Neustar®
WHITE PAPER: This informative paper discusses a security solution that provides DDoS protection for Web, email, and APIs 24/7 with unlimited mitigation capacity from upstream users.
Posted: 20 Mar 2014 | Published: 20 Mar 2014

Neustar®

Protection for Banking and Financial Services
sponsored by Neustar®
WHITE PAPER: This informative paper discusses a security solution that provides DDoS protection for Web, email, and APIs 24/7 with unlimited mitigation capacity from upstream users.
Posted: 20 Mar 2014 | Published: 20 Mar 2014

Neustar®

Four Ways DNS Can Accelerate Business Growth
sponsored by Neustar®
WHITE PAPER: This exclusive paper discusses the plethora of benefits that a robust and secure DNS can provide your organization. Read on to find out how you can significantly enhance your web experience for users, driving new streams of revenue.
Posted: 20 Mar 2014 | Published: 20 Mar 2014

Neustar®

SiteProtect and UltraDNS Solution: Double Your Protection
sponsored by Neustar®
WHITE PAPER: This exclusive paper examines a DNS solution that boasts fast DDoS mitigation responses, protecting both the DNS and HTTP layers so your site can withstand the most aggressive attacks.
Posted: 20 Mar 2014 | Published: 20 Mar 2014

Neustar®

How to Protect Health Data from Hackers
sponsored by Peak 10
WHITE PAPER: View this resource to reveal key recommendations to help prevent the growing number of cyber threats in the healthcare industry.
Posted: 20 Mar 2014 | Published: 06 Mar 2014

Peak 10

Secunia PSI Country Report - Q4 2013 United Kingdom
sponsored by Secunia
WHITE PAPER: This informative report explores  the state of security on private PCs in the United Kingdom and  what programs are making them insecure.
Posted: 20 Mar 2014 | Published: 20 Mar 2014

Secunia

Secunia PSI Country Report - Q4 2013 Germany
sponsored by Secunia
WHITE PAPER: This informative report explores the current state of cybercrime targeting German PCs and what can be done to stop them.
Posted: 20 Mar 2014 | Published: 20 Mar 2014

Secunia

Boosting Enterprise Security with Integrated Log Management
sponsored by IBM
WHITE PAPER: Explore how replacing your legacy, siloed log management systems with an integrated approach is crucial to reducing security risks and improving compliance across your diverse IT environments.
Posted: 20 Mar 2014 | Published: 31 May 2013

IBM

Security Management 2.5: Replacing Your SIEM Yet?
sponsored by IBM
WHITE PAPER: This white paper offers insight on the needs and requirements that security information and event management (SIEM) solutions should address. Read on to learn if your current SIEM vendor is enough, or if you should consider a replacement that better fits today's IT environment.
Posted: 20 Mar 2014 | Published: 01 Feb 2014

IBM
126 - 150 of 1045 Matches Previous Page    4 5 6 7 8 9    Next Page
 
SECURITY THREATS DEFINITION (continued): …  identitythieves to surreptitiously obtain personal or business information about the user.Countermeasures specific to the prevention of parameter tampering involve the validation of allparameters to ensure that they conform to standards concerning minimum and maximum allowablelength, allowable numeric range, allowable character sequences and patterns, whether or not theparameter is actually required to conduct the transaction in question, and whether or not null isallowed.Whitelisting(accepting only allowable input) is more effective than blacklisting(refusing to accept forbidden input). A Web … 
Security Threats definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement