Category: Network Security

Non-Compliance

The state in which a device fails to meet the required security standards, policies, or regulations, indicating a ...

Non-Volatile Data

Data that persists even after a system is powered down or restarted, such as data on hard drives or storage media, ...

Notice of Privacy Practices

A document that explains an individual's rights regarding the use and disclosure of their PHI by a covered entity, ...

Open Ports

Network ports that are actively listening for incoming connections, potentially providing entry points for ...

Patch

A software update or fix released by software vendors to address known vulnerabilities and security weaknesses in ...

Payment Application Data Security Standard (PA-DSS)

A set of security requirements for software vendors who develop applications that process payment card data. ...

PCI DSS

Payment Card Industry Data Security Standard, a set of security standards developed by the Payment Card Industry ...

Penetration Testing

Penetration testing is a set of controlled simulated attacks on systems, networks, or applications to identify ...

PHI

Protected Health Information, any individually identifiable health information that is transmitted or maintained ...

Phishing

A fraudulent technique where attackers impersonate legitimate entities to trick users into providing sensitive ...

Physical Attack Surface

The points of entry and vulnerabilities in physical assets, such as servers, routers, and other hardware devices, ...

Privacy Rule

A HIPAA rule that establishes standards for the protection of individuals' PHI and outlines the rights of ...