Native API hooking is a pro-active cybersecurity technique that essentially involves intercepting and altering the behavior of system-level API calls. This technique is often used in antivirus systems, intrusion detection... Read More
NotPetya is a type of ransomware that shook the world of cybersecurity in June 2017. Named after Petya, a similar ransomware that was released a year earlier, NotPetya is a type of malicious software (malware) that encrypts the... Read More
Network tampering is a malicious activity carried out with the intention of disrupting or intercepting network traffic. It's a serious concern as it can lead to unauthorized access, data theft or loss, and various other forms of... Read More
A network virus is a type of malicious software, also known as malware, that spreads across a network of computers, targeting individual machines to perform unauthorized and harmful actions. The actions include stealing sensitive... Read More
The "Nigerian Scam", also known as the "419 Fraud," refers to an internet-born fraudulent scheme believed to be originating from Nigeria as far back as the 1980s. It is named after the 419 section of the Nigerian criminal code... Read More
Network encryption is a highly crucial process implemented in the realm of cybersecurity to ensure the safe and efficient transmission of data across the globe. It refers to the method of encoding or disguising data sent over a... Read More
Network Segmentation signifies the process of partitioning a network into less complex components or smaller subnets to reinforce security. Many business networks typically operate as a single, unrestricted system, where devices... Read More
Network penetration testing, also known as ethical hacking, involves mimicking the tactics used by potential attackers to identify vulnerabilities in a system. It is designed to assess the security aspects of an ICT (Information... Read More
Non-intrusive scanning represents a crucial method used to identify, predict and mitigate potential threads of vulnerability in a system without disrupting or slowing down system operations. It is a complex and necessary part of... Read More
Network Access Control, commonly known as NAC, holds a crucial place within the realm of cybersecurity. Understandably, with the rising threats to an organization's IT systems, adopting a security phenotype like NAC further... Read More
A network firewall can be compared to a protective border around your digital assets, a barrier designed to keep destructive elements at adrift. As the name suggests, a network firewall is a system developed to safeguard... Read More
Network Forensics is a specialized category within the broader field of digital forensics, referring to the monitoring and analysis of computer network traffic, both local and WAN/metropolitan area networks, for the purposes of... Read More
NIST Data Destruction is a term used in Cybersecurity and Antivirus contexts to refer to a set of guidelines developed by the National Institute of Standards and Technology (NIST). These guidelines govern how data is securely... Read More
Network propagation, in the specific context of cybersecurity and antivirus, refers to the process employed by cyber threats such as worms or malware to multiply or distribute themselves across one system to another within a... Read More
Network mapping, in cybersecurity and antivirus context, refers to the practice of identifying, organizing, and visualizing the various nodes, connections, devices, and structures that compose a network. it is the process of... Read More
Network perimeter security refers to the safeguards put in place to protect the boundary between an organization's internal network and the outside world, typically the internet. This concept is at the forefront of cybersecurity... Read More
Network Address Translation (NAT) is essentially a method employed to enable private IP addresses to connect to the internet. It is a normal everyday occurrence that most computer users are completely oblivious of. NAT enables... Read More
Near-Field Communication (NFC) revolutionized information sharing and payment transactions, bolstering seamless transmission between two NFC-enabled devices at close range. While significantly simplifying life, it introduced new... Read More
Network security products strongly contribute to the safety of business or personal networks. Functioning as the first line of defense, these tools are vital in the rapidly evolving digital world, where threats are increasing in... Read More
In the context of cyber security, NOP Sled is an interesting and rather crucial concept that plays an important role in malware and exploitation activities. To understand NOP Sled, first, we must dig into its verbatim meaning.... Read More
| A | | | B | | | C | | | D | | | E | | | F | | | G | | | H | | | I | | | J | | | K | | | L | | | M | |
| N | | | O | | | P | | | Q | | | R | | | S | | | T | | | U | | | V | | | W | | | X | | | Y | | | Z | |
| 1 | | | 2 | | | 3 | | | 4 | | | 7 | | | 8 | |