What is XML Encryption? Extensible Markup Language (XML) lets you define and store data in a shareable manner. XML supports information exchange between computer systems such as websites, databases, and third-party applications. Predefined rules make it easy to transmit data as XML files over any network because the recipient can use those rules to read […]
Category: Outsourced IT
Computer Forensics
What are Computer Forensics? Computer forensics, also known as digital forensics, computer forensic science, or cyber forensics, combines legal forensics and computer science to gather digital evidence in such a way that it is admissible in a court of law. Computer forensics is closely related to cybersecurity. Computer forensics findings can help cybersecurity teams speed […]
Quarantined Files
What are Quarantined Files? Quarantine is a special isolated folder on a machine’s hard disk where suspicious files detected by antivirus and antimalware software solutions are placed to prevent further spread of threats. Quarantine allows users to review suspicious and potentially dangerous files from all machines and decide whether they should be removed or restored. […]
What is Object Linking and Embedding Malware? Object Linking and Embedding (OLE) allows users to create and edit documents that contain objects created by different applications. OLE technology gives users the ability to create compound documents that support a host of software applications, such as Microsoft Windows applications, Corel WordPerfect, Adobe Acrobat, AutoCAD, and multimedia […]
What are Email Protocols? An email protocol is a group of rules and regulations that ensure that email messages are properly created, transmitted, and received between different servers, machines, and email clients. Email protocols create standards that messages should follow to reach the recipients in their original state. The following are the three standard email […]
Network Time Security
What is Network Time Security? Network Time Protocol (NTP) is an online protocol dating back to 1985 that synchronizes computer clock times in a network to within a few milliseconds of UTC, allowing devices connected to a TCP/IP network to work at the same adjusted time. NTP is the most common way to receive time […]
What is Temporal Key Integrity Protocol? Temporal Key Integrity Protocol (TKIP) is a security protocol for WLAN networks that was developed to provide an urgent, short-term alternative for Wired Equivalent Privacy (WEP) protocol, which is considered insecure. TKIP was developed and endorsed by the Wi-Fi Alliance and the IEEE 802.11i task group and was limited […]
Technical Security Controls
What are Technical Security Controls? Technical security controls, also known as logic controls, use hardware, software, and other technologies to improve an organization’s security posture by reducing vulnerabilities. Technical security controls can be used to achieve many different types of goals1: Examples of technical controls include: Access Control Lists (ACL). ACLs are network traffic filters […]
XML Digital Signature
What is XML Digital Signature? Digital signatures are like electronic “fingerprints” that securely associate a signer with a document in a recorded transaction, which takes the form of a coded message. Digital signatures use Public Key Infrastructure (PKI), to provide the highest levels of security and universal acceptance. PKI involves using a digital certificate for […]
What is a Stack Smashing Attack? Stack smashing is a form of vulnerability where the stack of a computer application or OS is forced to overflow. This may lead to subverting the program/system and crashing it. A stack, a first-in last-out (FILO) circuit, is a form of buffer holding intermediate results of operations within it. […]