IT Management  >   Systems Operations  >   Security  >  

Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Day-zero Threats, Zero Day Threats, Internet Threats, Security Breaches, Virus Threats, Day Zero Threats, Computer Security Threats, Network Security Threats, Threat Mitigation, Network-level Threats, Network Threats, Network Level Threats, Spyware Threats, Internet Security Threats, Application Security Threats, Threat Management, Software Security Threats, Information Security Threats, Threats, Web Threats
DEFINITION: Parameter tampering is a form of Web-based attack in which certainparameters in the Uniform Resource Locator (URL)or Web page form field data entered by a user are changed without that user's authorization. Thispoints the browserto a link, page or site other than the one the user intends (although it may look exactly the sameto the casual observer).Parameter tampering can be employed by criminals and  … 
Definition continues below.
Security Threats White Papers (View All Report Types)
26 - 50 of 1194 Matches Previous Page  |  Next Page
Top Marketing Data Collaboration Challenges
sponsored by IntraLinks, Inc
WHITE PAPER: In this whtie paper, discover the 6 data security and control challenges that marketing departments face and how to reduce risk and loss.
Posted: 15 May 2015 | Published: 06 May 2015

IntraLinks, Inc

Protection from the Inside: Application Security Methodologies Compared
sponsored by Hewlett-Packard Company
WHITE PAPER: In this paper, the SANS Institute captures the relative capabilities and efficiencies of RASP and WAF technologies using a representative product in each category. Learn how your defense-in-depth strategy could benefit from the additional visibility of runtime protection.
Posted: 15 May 2015 | Published: 16 Apr 2015

Hewlett-Packard Company

Android for Work: Top 8 Security Considerations Every CISO Should Know
sponsored by MobileIron
WHITE PAPER: Access this white paper to learn how Android for Work and the Lollipop, the latest version of the Android OS, are cleaning up your most feared security concerns.
Posted: 14 May 2015 | Published: 14 May 2015

MobileIron

New Defence Strategy Needed To Combat Cybersecurity Adversaries
sponsored by Hewlett-Packard Company
WHITE PAPER: View this informative white paper to learn why companies need to implement a new defense strategy to keep cybercriminals at bay.
Posted: 13 May 2015 | Published: 13 May 2015

Hewlett-Packard Company

Fighting Today's Advanced Attacks and Defending Your Network
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper demystifies APTs and reveals a three phase strategy to defending your network against determined cybercriminals.
Posted: 13 May 2015 | Published: 22 Apr 2015

Fortinet, Inc.

The Collaborative Data Privacy Handbook
sponsored by IntraLinks, Inc
WHITE PAPER: As more organizations share sensitive data, the risk of leak or theft increases.  This white paper outlines six steps to improving data privacy and sharing principles and preventing regulatory and market sanctions.
Posted: 13 May 2015 | Published: 10 Dec 2014

IntraLinks, Inc

Securing Your Data Center from Endpoints to the Core
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper highlights the features and benefits of a security approach that defends the network core and edge to better protect data centers from today's latest risk factors.
Posted: 12 May 2015 | Published: 29 Apr 2015

Fortinet, Inc.

Network Security 3 Phase Framework
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper outlines a simple three phase framework for detecting and blocking concealed threats and protecting data on your network and beyond.
Posted: 12 May 2015 | Published: 29 Apr 2015

Fortinet, Inc.

2015 Cyberthreat Defense Report
sponsored by Citrix
WHITE PAPER: In this report, discover what security professionals had to say about mobile security, endpoint security, and other important trends in the cybersecurity landscape.
Posted: 12 May 2015 | Published: 12 May 2015

Citrix

How to Prevent Security Breaches in Your Retail Network
sponsored by Dell, Inc.
WHITE PAPER: Explore the multi-vector nature common to most high-profile retail security breaches in this white paper and learn about the several common characteristics of recent breaches and how to protect your data against hackers.
Posted: 12 May 2015 | Published: 06 May 2015

Dell, Inc.

Preventing Attackers from Getting What They Want
sponsored by SecureAuth
WHITE PAPER: This white paper explores the anatomy of an attack and why preventative measures inevitably fail. Read on to learn how a two-factor authentication strategy limits the usefulness of any credentials that a hacker may have acquired or created.
Posted: 11 May 2015 | Published: 25 Mar 2015

SecureAuth

Shellshock and Future Vulnerabilities — Buying Precious Time
sponsored by Dell, Inc.
WHITE PAPER: Access this white paper to explore how Shellsock works, how attackers are exploiting network vulnerabilities, and what to do about future vulnerabilities.  View now to learn more.
Posted: 11 May 2015 | Published: 01 Apr 2015

Dell, Inc.

Defending Against New Ransomware Threats
sponsored by Trend Micro
WHITE PAPER: In this white paper, discover five ways to make sure you're prepared for a ransomware attack.
Posted: 11 May 2015 | Published: 11 May 2015

Trend Micro

Custom Defense Against Targeted Attacks
sponsored by Trend Micro
WHITE PAPER: Read this white paper to discover how you can build custom-designed security that can withstand even the most advanced targeted attack.
Posted: 08 May 2015 | Published: 31 Dec 2014

Trend Micro

Network Security: Making the Jump to 100GbE
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper explores the need for moving network security closer to the core and the need to make the jump from the once-standard 10GbE to 100GbE. View now to learn how to increase East-West visibility to catch masked malware as the data center becomes more virtualized.
Posted: 08 May 2015 | Published: 01 Apr 2015

Fortinet, Inc.

Food for the Hungry Stops Malware in its Tracks
sponsored by Malwarebytes Corporation
WHITE PAPER: In this case study, learn how a major non-profit eradicated malware in its network.
Posted: 08 May 2015 | Published: 08 May 2015


Florida Gulf Coast University Teaches Malware a Lesson
sponsored by Malwarebytes Corporation
WHITE PAPER: In this exclusive case study, discover how a major university kept thousands of users safe from malware.
Posted: 08 May 2015 | Published: 08 May 2015


Data Center Network Security - 7 Best Practices
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper uncovers why traditional network architectures are failing to keep hackers out and offers seven best practices for securing your data center. View now to learn how to secure your network where it matters most.
Posted: 07 May 2015 | Published: 08 Apr 2015

Fortinet, Inc.

Network Security: Making the Jump to 100GbE
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper explores the need for moving network security closer to the core and the need to make the jump from the once-standard 10GbE to 100GbE. View now to learn how to increase East-West visibility to catch masked malware as the data center becomes more virtualized.
Posted: 07 May 2015 | Published: 01 Apr 2015

Fortinet, Inc.

Endpoint Security for Today's Cyber Risks
sponsored by Malwarebytes Corporation
WHITE PAPER: In this white paper, discover how you can create layered endpoint security with the combination of anti-malware and anti-exploit software.
Posted: 07 May 2015 | Published: 07 May 2015


Securing Your End of Life Servers While Enabling a Safe Transition
sponsored by Trend Micro
WHITE PAPER: Access this white paper to learn how to continue running your end of life platform while avoiding common security risks and preparing to upgrade your system.
Posted: 07 May 2015 | Published: 30 Apr 2015

Trend Micro

Network Security 3 Phase Framework
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper outlines a simple three phase framework for protecting data and defending against concealed threats. View now to learn how this strategy keeps you ahead of the curve to prevent new attacks.
Posted: 06 May 2015 | Published: 29 Apr 2015

Fortinet, Inc.

Securing Your Data Center from Endpoints to the Core
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper highlights the features and benefits of a security approach that defends the network core and edge to better protect data centers from today's latest risk factors.
Posted: 06 May 2015 | Published: 29 Apr 2015

Fortinet, Inc.

Web-App Firewall: Protecting against DoS/DDoS Attacks
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper examines why traditional firewalls are insufficient to defend against malicious botnet attacks and how to rethink your security strategy.
Posted: 06 May 2015 | Published: 28 Dec 2012

Fortinet, Inc.

Think Like a Bad Guy: Understanding Advanced Threats and How to Mitigate Them
sponsored by Hewlett-Packard Company
WHITE PAPER: Increasingly, today's advanced threats circumvent traditional defenses—even sandboxing. This SlashGuide white paper helps you understand advanced threats and how to defend against them.
Posted: 06 May 2015 | Published: 31 Jan 2015

Hewlett-Packard Company
26 - 50 of 1194 Matches Previous Page    1 2 3 4 5    Next Page
 
SECURITY THREATS DEFINITION (continued): …  identitythieves to surreptitiously obtain personal or business information about the user.Countermeasures specific to the prevention of parameter tampering involve the validation of allparameters to ensure that they conform to standards concerning minimum and maximum allowablelength, allowable numeric range, allowable character sequences and patterns, whether or not theparameter is actually required to conduct the transaction in question, and whether or not null isallowed.Whitelisting(accepting only allowable input) is more effective than blacklisting(refusing to accept forbidden input). A Web … 
Security Threats definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement