Authorization Authorization works right after authentication, in order to grant access and permissions to an identity requesting access to IT resources. The most common authorization protocol is OAuth, now in OAuth 2.0 version. At least one and a resource owner are involved in the authorization process. Authorization works by having an authorization server assign access ... Read more


DDOS DDOS stands for distributed denial-of-service attack (DoS attack). It uses similar approach to Denial of Service (DOS) but in this case, the DOS cyber attack is distributed from numerous source networks.


DRaaS (Disaster Recovery As A Service) is a managed service in which disaster recovery is offered as a cloud service. Disaster recovery includes business continuity (BCDR) and backup as a service (BaaS). DRaaS management server can be either an on-premise or a cloud server. There are various DRaaS providers, most of which are already providing ... Read more


Jasypt is a java library which allows developers to add basic encryption to applications.


MFA Multi-factor authentication (MFA) is the process of authenticating an identity into a computing system, application or service by providing at least two of the following authentication factors: The following list provides the most common MFA factor implemented today by security companies:

QR code

QR code QR code (Quick Response code) is a type of two-dimensional (2D) matrix barcode.


SaaS stands for Software As A Service or Security As A Service.

Strong Authentication

Strong Authentication (SA) Strong authentication assumes the usage of Multi-factor authentication (MFA) as a baseline, but goes beyond that with other authentication means. Strong authentication employs National Institute for Standards and Technology (NIST) assurance level-2 or assurance level-3. More details about strong authentication can be found at:

Zero day exploit

Zero day exploit A zero day exploit (also called a zero-day threat) is an attack that takes advantage of a security vulnerability that does not have a fix in place. It is referred to as a "zero-day" threat because once the flaw is eventually discovered, the developer or organization has "zero days" to then come ... Read more