A type of cyber-attack aimed at making a service unavailable by overwhelming it with excessive requests, preventing legitimate users from accessing it.
Denial of Service Attack
Web Server Operating Systems
The operating systems specifically designed to run web servers, such as Linux, Windows Server, or UNIX, providing the necessary environment for web hosting.
A telecommunications standard used to provide high-speed internet access over cable television systems.
Data Over Cable Service Interface Specification (DOCSIS)
File and Print Server
A server that handles sending, receiving, and storing email messages for users within a network or the internet.
Shared Network Resources Protection
The process of securing network resources (such as files, printers, or databases) from unauthorized access or misuse on a shared network.
The set of features and actions that a firewall performs, including filtering traffic, monitoring network activity, and blocking unauthorized access
Firewall Functionality
The specific needs and measures that must be taken to protect systems, data, and networks from unauthorized access or threats
Security Requirements
The use of software or strategies to detect, prevent, and remove malware (malicious software) like viruses, worms, and trojans.
Malware Protection
A cryptographic protocol used to secure communications over a computer network, often seen as the successor to SSL for encrypting data transfers.
Transport Layer Security (TLS)
A type of malware that infects files or systems by attaching itself to a legitimate program, spreading when the program is executed.
Virus
Web-Server Operating Systems
The systems that provide the platform for web servers to run on, often optimized for hosting websites and handling web traffic.
Firewall
A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules to protect systems from unauthorized ac
A server designed to host applications, allowing clients to interact with those applications via network protocols like HTTP.
Application Server
Desktop Computer Security
Measures taken to protect desktop computers from threats such as unauthorized access, malware, and data loss.
Web Server
A server that delivers web pages to users' browsers using the HTTP or HTTPS protocol, enabling access to websites.
Proxy or Cache Server
A server that acts as an intermediary between a client and other servers, caching data to improve performance and providing security by filtering requests.
Virus
A type of malware that infects files or systems by attaching itself to a legitimate program, spreading when the program is executed.
The practices and measures taken to ensure that servers are protected from unauthorized access, cyber-attacks, and other security threats.
Server Security
A set of rules and guidelines that define how an organization manages, protects, and handles sensitive information and resources.
Security Policy
Hypertext Transfer Protocol (HTTP)
The protocol used for transmitting web pages over the internet, allowing clients (browsers) to request and receive web content from servers.
A protocol for securing credit card transactions over the internet, ensuring confidentiality, integrity, and authentication.
Secure Electronic Transactions (SET)
IEEE 802.11 Protocol
A set of standards used for implementing wireless local area networks (WLANs), including security features for protecting wireless communications.
Malware
Software specifically designed to cause harm or gain unauthorized access to computer systems, including viruses, worms, and trojans
Servers
Specialized computers or systems that provide services (such as web hosting, email, file sharing) to other computers or devices in a network.
Secure Multipurpose Internet Mail Extensions (S/MIME)
A standard for encrypting and signing email messages to provide confidentiality, authentication, and integrity.
Measures taken to protect email communications from threats such as phishing, malware, and unauthorized access.
Email Security
A server that handles sending, receiving, and storing email messages for users within a network or the internet.
E-mail Server
Measures to ensure the security of data transmitted over the internet, including protecting Internet Protocol (IP) addresses and ensuring secure connections.
Internet Protocol Security
A protocol used to establish secure encrypted connections between web browsers and servers, ensuring the privacy and integrity of data transferred.
Secure Socket Layer
A server that provides firewall functions, controlling incoming and outgoing network traffic to protect systems from unauthorized access or attacks.
Firewall Server
Virus Protection
The use of tools and techniques to detect and eliminate viruses from a system, ensuring the integrity and security of data and applications.
Password Protection
Methods and technologies used to secure passwords from unauthorized access, including encryption and strong password policies
Ensuring that communication protocols (used to transfer data between systems) are secure and cannot be exploited by malicious users.
Protocol Security
User Account Permissions
The rights or privileges assigned to user accounts, determining what actions users can perform within a system or network, such as read, write, or execute.
Ensuring that passwords are not easily guessable or traceable, often through techniques like using complex combinations or encryption
Password Obscurity
Your experience on this site will be improved by allowing cookies.