Authentication

Authentication Authentication in computer systems uses application protocols to verify that the identity which is requesting access to a computing system is actually who they say they are. Common authentication protocols are OpenID, NTLM, Kerberos, PAP and CHAP. There is a long list of authentication protocols available, each one being applicable to different systems and ... Read more

DDOS

DDOS DDOS stands for distributed denial-of-service attack (DoS attack). It uses similar approach to Denial of Service (DOS) but in this case, the DOS cyber attack is distributed from numerous source networks.

MFA

MFA Multi-factor authentication (MFA) is the process of authenticating an identity into a computing system, application or service by providing at least two of the following authentication factors: The following list provides the most common MFA factor implemented today by security companies:

Strong Authentication

Strong Authentication (SA) Strong authentication assumes the usage of Multi-factor authentication (MFA) as a baseline, but goes beyond that with other authentication means. Strong authentication employs National Institute for Standards and Technology (NIST) assurance level-2 or assurance level-3. More details about strong authentication can be found at: https://www.yubico.com/resources/glossary/strong-authentication/.

Zero day exploit

Zero day exploit A zero day exploit (also called a zero-day threat) is an attack that takes advantage of a security vulnerability that does not have a fix in place. It is referred to as a "zero-day" threat because once the flaw is eventually discovered, the developer or organization has "zero days" to then come ... Read more