IT Management  >   Systems Operations  >   Security  >  

Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Day-zero Threats, Zero Day Threats, Internet Threats, Security Breaches, Virus Threats, Day Zero Threats, Computer Security Threats, Network Security Threats, Threat Mitigation, Network-level Threats, Network Threats, Network Level Threats, Spyware Threats, Internet Security Threats, Application Security Threats, Threat Management, Software Security Threats, Information Security Threats, Threats, Web Threats
DEFINITION: Parameter tampering is a form of Web-based attack in which certainparameters in the Uniform Resource Locator (URL)or Web page form field data entered by a user are changed without that user's authorization. Thispoints the browserto a link, page or site other than the one the user intends (although it may look exactly the sameto the casual observer).Parameter tampering can be employed by criminals and  … 
Definition continues below.
Security Threats White Papers (View All Report Types)
26 - 50 of 1173 Matches Previous Page  |  Next Page
Dynamic Access Control: Beyond Classic NTFS Permissions
sponsored by Global Knowledge
WHITE PAPER: Read this white paper to learn how you can design security groups and folder hierarchies that let you control file system access the way you want with Dynamic Access Control.
Posted: 16 Mar 2015 | Published: 16 Mar 2015

Global Knowledge

Mobile SSO & the Rise of Mobile Authentication
sponsored by OneLogin
WHITE PAPER: In this white paper, uncover the top four considerations when defining your mobile and cloud identity strategy. Discover why Identity and Access Management (IAM)-as-a-Service (IDaaS) appears to be the golden ticket for organizations to get a handle on who can and can't access important data. Read on to learn more.
Posted: 11 Mar 2015 | Published: 25 Feb 2015

OneLogin

Understanding the Data Security Risk – New Findings Revealed
sponsored by IBM
WHITE PAPER: In this webcast, discover how to defend the 4 types of data hackers want to steal using a simple framework as a foundation for your security strategy. View now to learn more.
Posted: 11 Mar 2015 | Published: 04 Feb 2015

IBM

ARUP BUILDS A MOBILE FIRST FUTURE WITH MOBILEIRON
sponsored by MobileIron
WHITE PAPER: Access this whitepaper and find out how one company successfully created and secured mobile applications for their organization.
Posted: 11 Mar 2015 | Published: 11 Mar 2015

MobileIron

St. Joseph Health Mobilizes Patient Care with MobileIron Solutions
sponsored by MobileIron
WHITE PAPER: This whitepaper provides valuable information on mobile device management and security.
Posted: 11 Mar 2015 | Published: 11 Mar 2015

MobileIron

Special Feature: Bank Card Courier Scams
sponsored by ESET
WHITE PAPER: This white paper describes the dangers of fraudulent phone calls and what to look out for when receiving one.
Posted: 11 Mar 2015 | Published: 31 Dec 2014

ESET

13 Questions You Must Ask When Integrating Office 365 with Active Directory
sponsored by OneLogin
WHITE PAPER: Access this resource to learn the 13 questions to you need to ask to choose the ideal path to pursue to integrate Office 365 with Active Directory.
Posted: 10 Mar 2015 | Published: 25 Feb 2015

OneLogin

5 Steps to HR-Driven Identity Management
sponsored by OneLogin
WHITE PAPER: In this white paper, learn the five steps to minimize vulnerability by shifting identity and access management into the hands of HR. Read on now to learn how to simplify the employee life-cycle management process and close the risk gap between HR and IT.
Posted: 10 Mar 2015 | Published: 18 Feb 2015

OneLogin

Security Report: Cybercrime Trends for 2015
sponsored by ESET
WHITE PAPER: This security report can help the security professional know what the greatest threats are in 2015 and how to combat them.
Posted: 10 Mar 2015 | Published: 10 Mar 2015

ESET

Closing the Web App Data Security Gap
sponsored by IBM
WHITE PAPER: In this white paper, you will learn about one security platform that monitors, tracks, and reports on user activities accesing critical applications.
Posted: 09 Mar 2015 | Published: 08 May 2013

IBM

The 5 Challenges of Data Security
sponsored by IBM
WHITE PAPER: In this white paper, learn the five challenges regarding data security today. Additionally, read on to uncover the five steps to strengthening your data security strategy.
Posted: 09 Mar 2015 | Published: 10 Sep 2014

IBM

5 Threats Google Apps Can't Defend
sponsored by Datto, Inc.
WHITE PAPER: In this white paper, learn the five threats that Google can't defend and how to protect your data on your own. Read on now to learn more.
Posted: 06 Mar 2015 | Published: 04 Feb 2015

Datto, Inc.

Top 13 Ways to Strengthen Google Apps Security and Compliance
sponsored by OneLogin
WHITE PAPER: In this white paper, you will learn the 13 steps to bolster Google Apps and cloud security and compliance.
Posted: 06 Mar 2015 | Published: 14 Jan 2015

OneLogin

Cyber Risk Report 2015 - Executive Summary
sponsored by Hewlett-Packard Company
WHITE PAPER: The HP Cyber Risk Report 2015 provides a broad overview of the threat landscape and how hackers operate.
Posted: 05 Mar 2015 | Published: 28 Feb 2015

Hewlett-Packard Company

2015 Cyber Risk Report
sponsored by Hewlett-Packard Company
WHITE PAPER: This 2015 cyber risk report provides a broad view of the 2014 threat landscape and gives you the information you need to protect your business.
Posted: 05 Mar 2015 | Published: 05 Mar 2015

Hewlett-Packard Company

Managed Cloud Environment Security FAQ
sponsored by Dimension Data
WHITE PAPER: Access this white paper to get answers to how security is maintained in multi-tenanted and dynamic environments.  Read on to explore how to evaluate the security of managed cloud environment providers.
Posted: 03 Mar 2015 | Published: 10 Sep 2014

Dimension Data

Uncover the Top Ten Database Threats That Could Affect Your Business
sponsored by Imperva
WHITE PAPER: This white paper highlights the top ten threats that affect traditional databases as well as Big Data technologies.
Posted: 03 Mar 2015 | Published: 31 Dec 2014

Imperva

Top 5 Aspects of Security to Look for in a Cloud Provider
sponsored by Oracle Corporation
WHITE PAPER: Get the 5 security areas you needs to be concerned with when selecting the cloud system that's right for your business.
Posted: 03 Mar 2015 | Published: 31 Dec 2013

Oracle Corporation

Tolly Test Report: Web Application and  Security Access Manager Appliance
sponsored by IBM
WHITE PAPER: Access this white paper that details a test report of a web security and access manger appliance. Read on to learn how this appliance scored, and find out about the benefits it can provide your company.
Posted: 02 Mar 2015 | Published: 30 Nov 2014

IBM

DDoS Response Playbook
sponsored by Imperva
WHITE PAPER: This white paper will help you create a response plan for one of the most widespread threats – DDoS attacks.
Posted: 02 Mar 2015 | Published: 02 Mar 2015

Imperva

The 3 Third Party Software Security Controls
sponsored by Veracode, Inc.
WHITE PAPER: In this informative white paper, you will uncover the three control types to improve information protection when using third party services and products. Read on to learn how these recommended approaches increase risk management practices effectiveness and enable remediation post-production avoidance.
Posted: 02 Mar 2015 | Published: 04 Dec 2014

Veracode, Inc.

Taking Control of the Digital and Mobile User Authentication Challenge
sponsored by RSA
WHITE PAPER: In this white paper, view the strategies and policies available to managing user authorization and access to reduce risk and protect yourself from cyber-attacks. Read on to see how others have taken advantage of these strategies in several case studies.
Posted: 27 Feb 2015 | Published: 07 Jan 2015

RSA

Secure Agile Development
sponsored by Veracode, Inc.
WHITE PAPER: Access this white paper to learn how to integrate security into the development process.
Posted: 26 Feb 2015 | Published: 03 Nov 2014

Veracode, Inc.

Why Application Security is a Business Imperative
sponsored by Veracode, Inc.
WHITE PAPER: View this white paper to learn how to close application vulnerability gaps and mitigate business risk.  Read on to learn more.
Posted: 26 Feb 2015 | Published: 15 Oct 2014

Veracode, Inc.

Back to Basics: Securing Business Information on the Cloud
sponsored by Box
WHITE PAPER: View this white paper to learn how the cloud can enable us to go back to security basics to manage distributed computing.
Posted: 25 Feb 2015 | Published: 04 Feb 2015

Box
26 - 50 of 1173 Matches Previous Page    1 2 3 4 5    Next Page
 
SECURITY THREATS DEFINITION (continued): …  identitythieves to surreptitiously obtain personal or business information about the user.Countermeasures specific to the prevention of parameter tampering involve the validation of allparameters to ensure that they conform to standards concerning minimum and maximum allowablelength, allowable numeric range, allowable character sequences and patterns, whether or not theparameter is actually required to conduct the transaction in question, and whether or not null isallowed.Whitelisting(accepting only allowable input) is more effective than blacklisting(refusing to accept forbidden input). A Web … 
Security Threats definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement