Category: Network Security

HIPAA

The Health Insurance Portability and Accountability Act, a U.S. legislation that sets standards for the protection ...

Host computer

The computer that is being accessed remotely. It is also referred to as the "server" or "remote machine."

Hybrid Cloud

A cloud computing model that combines both public and private clouds, allowing data and applications to move ...

Identity and Access Management (IAM)

The process of managing and controlling user identities, authentication, and authorization to ensure secure access ...

Identity Provider (IdP)

An Identity Provider (IdP) is tasked with verifying users’ identities and communicating with the service provider ...

Idle Timeout

A security feature that automatically disconnects a remote desktop session after a period of inactivity to protect ...

Incident Response

The organized approach taken by an organization to address and manage security incidents, including detection, ...

Incident Response Plan

A documented plan that outlines the steps to be taken in the event of a security breach or incident, including ...

Information Security

The practice of protecting information and information systems from unauthorized access, use, disclosure, ...

Infrastructure as Code (IaC)

Infrastructure as Code (IaC) is the process of managing and provisioning computer data centers through ...

Insider Threat

The risk posed by individuals within an organization who have authorized access to systems or data but use their ...

Internet of Things (IoT) Attack Surface

The aggregate of all potential entry points and vulnerabilities present in IoT devices and their network connections.