IT Management  >   Systems Operations  >   Security  >  

Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Day-zero Threats, Zero Day Threats, Internet Threats, Security Breaches, Virus Threats, Day Zero Threats, Computer Security Threats, Network Security Threats, Threat Mitigation, Network-level Threats, Network Threats, Network Level Threats, Spyware Threats, Internet Security Threats, Application Security Threats, Threat Management, Software Security Threats, Information Security Threats, Threats, Web Threats
DEFINITION: Parameter tampering is a form of Web-based attack in which certainparameters in the Uniform Resource Locator (URL)or Web page form field data entered by a user are changed without that user's authorization. Thispoints the browserto a link, page or site other than the one the user intends (although it may look exactly the sameto the casual observer).Parameter tampering can be employed by criminals and  … 
Definition continues below.
Security Threats White Papers (View All Report Types)
26 - 50 of 1176 Matches Previous Page  |  Next Page
Critical Role of DNS Calls for Vulnerability Mitigation
sponsored by Neustar┬«
WHITE PAPER: This white paper explores the current state of DNS threats, vulnerabilities, and 3 most common attacks.
Posted: 29 May 2015 | Published: 13 May 2015

Neustar®

The 2015 Cyber Risk Report
sponsored by Hewlett-Packard Company
WHITE PAPER: The HP Cyber Risk Report 2015 provides a broad view of the 2014 threat landscape and gives you the insight you need to protect your business from both known vulnerabilities and unknown exploits.
Posted: 29 May 2015 | Published: 30 Apr 2015

Hewlett-Packard Company

Secure Mobile Access: Overcoming Today's BYOD Obstacles
sponsored by Dell Software
WHITE PAPER: This white paper examines the need for a holistic security strategy to address the end-to-end mobility and BYOD challenges.
Posted: 28 May 2015 | Published: 19 May 2015

Dell Software

Today's Top 8 Cybersecurity Threats
sponsored by Dell Software
WHITE PAPER: This informative white paper presents and details the top cybersecurity threats and attacks to help your organization re-evaluate your security strategy.
Posted: 28 May 2015 | Published: 01 Apr 2015

Dell Software

10 Essential Steps to Web Security
sponsored by Clearswift
WHITE PAPER: In this white paper, explore the 10 web security best practices to mitigate insider, outsider, and human error threats.
Posted: 28 May 2015 | Published: 13 May 2015

Clearswift

10 Essential Steps to Email Security
sponsored by Clearswift
WHITE PAPER: This white paper lays out 10 essential steps to email security to allow messages to move freely into, out of, and around the enterprise while stopping malicious threats such as viruses, phishing, and DDoS attacks.
Posted: 28 May 2015 | Published: 20 May 2015

Clearswift

Insider Security Threats: Three Kinds of Chaos
sponsored by Clearswift
WHITE PAPER: This white paper presents the current information threat landscape and illustrates today's three major internal security challenges. Continue reading to explore new processes to mitigate risk and secure sensitive data.
Posted: 28 May 2015 | Published: 19 Mar 2014

Clearswift

8 Elements Of Complete Vulnerability Management
sponsored by SilverSky
WHITE PAPER: Read this white paper to discover the eight elements of comprehensive vulnerability management, and to learn how you can make sure your vulnerabilities stay sealed against even the most sophisticated attacks.
Posted: 28 May 2015 | Published: 28 May 2015

SilverSky

The Quick Guide to Data Protection Managed Security Services
sponsored by NexGen Storage
WHITE PAPER: This white paper explores the 3 reasons cybercriminals target organizations with limited IT staffs and why data protection needs to be the number one priority.
Posted: 27 May 2015 | Published: 29 Apr 2015

NexGen Storage

The Current State of Server Security Affairs
sponsored by Trend Micro
WHITE PAPER: Access this white paper for an in-depth examination of the current state of server security.
Posted: 27 May 2015 | Published: 26 Dec 2014

Trend Micro

Next Generation Data Loss Prevention
sponsored by Clearswift
WHITE PAPER: In this white paper, discover a content-aware data loss prevention (DLP) solution that offers stronger security for your mission critical information. Click through for a simple 8-step implementation strategy.
Posted: 26 May 2015 | Published: 22 Apr 2015

Clearswift

Detect, Prevent, and Manage Cyber-Security Incidents
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper suggests how you can partner with security services for more advanced and effective threat detection and mitigation.
Posted: 26 May 2015 | Published: 30 Apr 2015

Hewlett-Packard Limited

Securing the Digital Enterprise: API Security for the CSO
sponsored by Apigee
WHITE PAPER: The explosive growth of APIs means that threat protection, identity services, infrastructure security, and compliance have to be at the forefront of the CSO's mind. Access this resource now to learn why built-in API security alone isn't enough, for the sake of your organization's sensitive data.
Posted: 26 May 2015 | Published: 26 May 2015

Apigee

Countdown to Compromise: The Timeline of a Spear-Phishing Attack on Your Organization
sponsored by Mimecast
WHITE PAPER: This white paper presents the timeline of a spear-phishing attack and the common security strategies used that ultimately fail to protect the organization.
Posted: 26 May 2015 | Published: 22 Apr 2015

Mimecast

Cybersecurity 101: What Coporate Boards Should be Doing
sponsored by Trend Micro
WHITE PAPER: Download and discover how executives can start making a significant impact on enterprise cybersecurity, ensuring that valuable enterprise data is safe from hackers.
Posted: 26 May 2015 | Published: 26 Sep 2014

Trend Micro

Detect and Protect against Advanced Threats
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper examines the architecture of a strong, layered security system and suggests ways to partner with security services in order to achieve it.
Posted: 22 May 2015 | Published: 30 Apr 2015

Hewlett-Packard Limited

Uncover Advanced Attacks and Detect Hidden Breaches
sponsored by Hewlett-Packard Limited
WHITE PAPER: In this white paper, discover how you can gain greater visibility into the state of both active and live threats hidden within your network.
Posted: 22 May 2015 | Published: 30 Apr 2015

Hewlett-Packard Limited

Today's Microsoft Office 365 Security Hurdles
sponsored by Clearswift
WHITE PAPER: This white paper outlines today's 11 Microsoft Office 365 security challenges and how to modify your email security strategy to secure content and data.
Posted: 22 May 2015 | Published: 06 May 2015

Clearswift

Securing Next-Generation Mobile Security
sponsored by EE
WHITE PAPER: This white paper explores enterprise mobility management (EMM) strategies and how to secure mobile users.
Posted: 21 May 2015 | Published: 08 Apr 2015

EE

Keep Yourself Secure from Growing Cyber-Threats
sponsored by Hewlett-Packard Limited
WHITE PAPER: In this infographic, discover what you can do to stay safe in an increasingly dangerous cyber landscape, including increasing proactivity in your security strategy and partnering with security services.
Posted: 21 May 2015 | Published: 21 May 2015

Hewlett-Packard Limited

Next-Gen DLP: Can It Protect Your Organization?
sponsored by Clearswift
WHITE PAPER: This white paper examines next-gen DLP that is adaptive and content/context aware and how it mitigates internal and external data theft and/or leaks. Continue reading to learn what is on the horizon for next-gen DLP and how it will evolve in the coming years.
Posted: 21 May 2015 | Published: 06 May 2015

Clearswift

The Rise in Cybercrime: A Report on the Current Threat Landscape
sponsored by IBM
WHITE PAPER: This white paper examines why and how cybercrime is increasing and suggests practices for maintaining security.
Posted: 21 May 2015 | Published: 30 Jun 2014

IBM

Dealing With the Problem of Targeted Email Attacks
sponsored by Trend Micro
WHITE PAPER: Access this white paper to learn everything you need to know about how targeted email attacks occur, and what you can do to prevent them.
Posted: 21 May 2015 | Published: 30 Jan 2015

Trend Micro

6 Major Trends Shaping the Future of Security
sponsored by Box
WHITE PAPER: This white paper outlines the 6 major trends that are changing IT security as we know it.
Posted: 20 May 2015 | Published: 20 Feb 2014

Box

How Adaptive DLP is Securing the Agile Enterprise
sponsored by Clearswift
WHITE PAPER: This white paper examines next-gen adaptive DLP and compares the two technologies, highlighting 5 vital areas in which adaptive DLP surpasses its aging predecessor.
Posted: 20 May 2015 | Published: 06 May 2015

Clearswift
26 - 50 of 1176 Matches Previous Page    1 2 3 4 5    Next Page
 
SECURITY THREATS DEFINITION (continued): …  identitythieves to surreptitiously obtain personal or business information about the user.Countermeasures specific to the prevention of parameter tampering involve the validation of allparameters to ensure that they conform to standards concerning minimum and maximum allowablelength, allowable numeric range, allowable character sequences and patterns, whether or not theparameter is actually required to conduct the transaction in question, and whether or not null isallowed.Whitelisting(accepting only allowable input) is more effective than blacklisting(refusing to accept forbidden input). A Web … 
Security Threats definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement