Subtopic: Security Mechanisms & Technologies

Articles about the security mechanisms & technologies subtopic.

What Is A Software Token

What Is A Software Token?

Difficulty: Medium

A software token, also known as a soft token, is a security token in the form of an application running on a device.

What Is A Hardware Token

What Is A Hardware Token?

Difficulty: Medium

A hardware token, also known as a hard token, is a portable security device used to authenticate a user in a multi-factor authentication system.

What Is Cryptography

What Is Cryptography?

Difficulty: Medium

Cryptography is the practice of securing information by transforming it into a secure format. This ensures that only the person who is meant to see the information can view it and no unintended recipients can understand it.

What Is A User Account

What Is A User Account?

Difficulty: Easy

A user account is an identity created by a person which allows them to use a computer system, network, or service.

What Is A Login

What Is A Login?

Difficulty: Easy

A login is a set of credentials that enables access to an electronic account or system. The user credentials are usually a username or password, but may also consist of a PIN.

What Is A Passkey

What Is A Passkey?

Difficulty: Medium

A passkey is an authentication technology that allows users to authenticate without a password. Passkeys are tied to a specific account.

What Are File Permissions

What Are File Permissions?

Difficulty: Medium

File permissions define who can view, write, and edit files and directories. They most commonly apply to files stored on a web server, but can also apply to files stored on a hard drive.

Top 12 Password Myths

Top 12 Password Myths

Difficulty: Easy

Over time, there have been common myths about passwords which come from common "guides" about password security. These can actually make your passwords weaker and give you a false sense of security.

What Is Biometric Access Control

What Is Biometric Access Control?

Difficulty: Medium

Biometric access control uses biological features to authenticate users and control physical access to a room or electronic device.

What Is A Passcode

What Is A Passcode?

Difficulty: Easy

A passcode is a string of numbers used to authenticate a user before signing into an electronic account or electronic device. It is similar to...

What Is A Username

What Is A Username?

Difficulty: Easy

A username, also known as an account name, is an alphanumeric name given to a user account so that it can be uniquely identified.

What Is A Password Manager

What Is A Password Manager?

Difficulty: Medium

A password manager is a software program that allows users to create, save, and manage passwords across different websites, services, and apps.

What Is A Bug Bounty

What Is A Bug Bounty?

Difficulty: Medium

A bug bounty is a reward offered by the owners of a system, computer program, or website, for discovering and reporting a security vulnerability, bug, or weakness.

What Is An Access Level

What Is An Access Level?

Difficulty: Medium

An access level is a way of restricting access to specific users. Access levels are related to file permission, but go beyond just files.

Should I Regularly Change My Password

Should I Regularly Change My Password?

Difficulty: Easy

You have probably heard from multiple sources that you should regularly change your password every six months, every three months, or even every month. This is a common myth.

What Is Cybersecurity Incident Management

What Is Cybersecurity Incident Management?

Difficulty: Medium

Cybersecurity incident management is the process of identifying, analysing, and managing threats, cyberattacks, and incidents in real time. A cybersecurity incident could be an active threat.

What Is A Blacklist

What Is A Blacklist?

Difficulty: Medium

A blacklist, also known as a blocklist, or a denylist, is a list of email addresses, IP addresses, domain names, usernames, passwords, and applications that are...

What Is An Operating System

What Is A Whitelist?

Difficulty: Medium

A whitelist, also known as an allowlist, or a passlist, is a list of email addresses, IP addresses, domain names, usernames, passwords, and applications...

What Is The 3D Secure Protocol

What Is The 3D Secure Protocol?

Difficulty: Medium

The 3D Secure protocol, also known as the 3DS protocol, is designed to add an extra layer of security for credit card and debit card transactions online.

What Is The SET Protocol

What Is The SET Protocol?

Difficulty: Medium

Stands for the Secure Electronic Transmission protocol. The SET protocol is a communications protocol used to secure electronic payments made using a debit or credit card.

What Is A Passphrase

What Is A Passphrase?

Difficulty: Easy

A passphrase is a sequence of words and letters, separated by spaces that is used to authenticate a user before signing in. They are used in combination with usernames.

What Is An Intrusion Prevention System

What Is An Intrusion Prevention System?

Difficulty: Medium

An intrusion prevention system (IPS), also known as an intrusion detection prevention system is a security system that protects an organisation's network from malicious activity.

What Is Cybersecurity

What Is Cybersecurity?

Difficulty: Easy

Cybersecurity is the practice of using measures to protect systems and networks against the unauthorised or criminal use of data and malicious attacks.

What Is Ciphertext

What Is Ciphertext?

Difficulty: Medium

Ciphertext is text that has been scrambled into random numbers, letters, and symbols by a cipher in order to make it unreadable if intercepted by anyone.

What Is A CAPTCHA

What Is A CAPTCHA?

Difficulty: Medium

Stands for Completely Automated Public Turing Test To Tell Computers And Humans Apart. A CAPTCHA is a security feature designed to prevent spam or abuse from automated bots.

What Is Decryption

What Is Decryption?

Difficulty: Medium

Decryption is the process of converting encrypted information back into its original plaintext form. It is the opposite of encryption.

What Is Two-Factor Authentication

What Is Two-Factor Authentication?

Difficulty: Medium

Two-factor authentication (2FA), also known as two-step verification, or dual-factor authentication, is an electronic authentication method that requires two forms of verification before signing in.

Why Should I Look For The Padlock When Entering Personal Information On Sites?

Why Should I Look For The Padlock When Entering Personal Information On Sites?

Difficulty: Medium

It is likely that you have noticed the padlock in the address bar on your web browser, especially when visiting a non-secure site as browsers draw attention to sites that do not use the padlock.

What Is An Antivirus

What Is An Antivirus?

Difficulty: Easy

An antivirus, also spelt as anti-virus, is a software program designed to detect and remove computer viruses and other unwanted programs that harm a computer...

What Is A Password

What Is A Password?

Difficulty: Easy

A password is a secret string of characters that is used to authenticate a user before signing in. Passwords are used in combination with usernames...

What Is TLS

What Is TLS?

Difficulty: Medium

Stands for Transport Layer Security. TLS is a security protocol used to enable secure transmission of data over a network. It accomplishes this by...

What Is An SSL Certificate

What Is An SSL Certificate?

Difficulty: Medium

Stands for a Secure Sockets Layer certificate. An SSL certificate is a data file or digital certificate that proves the identity and authenticity...

What Is SSL

What Is SSL?

Difficulty: Medium

Stands for Secure Sockets Layer. SSL is a protocol used to encrypt communications between two computers communicating over the internet...

What Is Encryption

What Is Encryption?

Difficulty: Medium

Encryption is the use of complex algorithms to scramble sent information into random characters and symbols so that it cannot be read by any unauthorised users...

How To Stay Safe Online

How To Stay Safe Online?

Difficulty: Easy

The internet has become so popular. As of now, it is possible to use the internet for almost anything, such as online shopping....