Topics
Products
Follow Us:
Sebastiano
Answered: Mar 30, 2020
Lock the screen based on short inactivity periods.
Encrypt the data.

You should ensure that you are locking the screen and encrypting data on the mobile device to protect it from...Read More

1 Answer

202 views
Sebastiano
Answered: Mar 30, 2020
Cross-site scripting

Cross-site scripting involves the hacker inputting data into a web site that contains script code that will execute when the page is viewed by another visitor. ActiveX...Read More

1 Answer

202 views
Sebastiano
Answered: Mar 30, 2020
Port security

Port security controls which systems can connect to a port on a switch by configuring the port for a specific MAC address.

1 Answer

202 views
Sebastiano
Answered: Mar 30, 2020
Hosts

The hosts file on a system is used to resolve domain names to IP addresses and can be used by the hacker to lead you to the wrong web site if the hacker gains access to this file.

1 Answer

202 views
Sebastiano
Answered: Mar 30, 2020
Tailgating

Tailgating or piggybacking is the term we use in the security field for someone who enters a locked door behind you after it is opened by an authorized person. Be sure to educate...Read More

1 Answer

202 views
Sebastiano
Answered: Mar 30, 2020
Driver’s license
Social Security number

Personal Identifiable Information (PII) is unique information about a person that should be protected at all times and kept confidential.

1 Answer

202 views
Wyatt Williams
Answered: Mar 30, 2020
It is an example of a Discretionary Access Control (DAC) model

1 Answer

202 views
Wyatt Williams
Answered: Mar 30, 2020
Trojan Horse attacks

Trojan Horse attacks - This attack involves a rogue, Trojan horse application that has been planted on an unsuspecting users workstation. The Trojan horse waits until...Read More

1 Answer

202 views
Wyatt Williams
Answered: Mar 30, 2020
You should make use of the Kerberos authentication method.

1 Answer

202 views
Shellbreiner
Answered: Mar 30, 2020
Continuous ping of an IP address until it s canceled

1 Answer

202 views
Shellbreiner
Answered: Mar 30, 2020
Passcode lock
Remote wipe

1 Answer

202 views
Sebastiano
Answered: Mar 30, 2020
Folder traversal

This is an example of folder traversal. Folder traversal is when the hacker places &46;&46;/.. in the URL to try to navigate out of the web site folder and to access...Read More

1 Answer

202 views
Mastermind
Answered: Mar 30, 2020
The TCP/IP (Transmission Control Protocol/Internet Protocol) session state is altered in a way that intercepts legitimate packets and allows a third party host to insert acceptable packets....Read More

1 Answer

202 views
Sebastiano
Answered: Mar 30, 2020
Disabling unnecessary services

System hardening involves disabling unnecessary services and uninstalling unnecessary software from the system. System hardening also involves disabling...Read More

1 Answer

202 views
Loading, please wait...

Email Sent
We have sent an email to your address "" with instructions to reset your password.