4,385 Results for:SQL Server Security

  • Sort by: 

Office of Cyber Security and Information Assurance (OCSIA)

The Office of Cyber Security and Information Assurance (OCSIA) is part of the UK Cabinet Office, which sits at the centre of government. Read Full Definition

Associated Glossaries

California Security Breach Information Act (SB-1386)

In the United States, the California Security Breach Information Act (SB-1386) is a California state law requiring organizations that maintain personal information about individuals to inform those individuals if ... Read Full Definition

Associated Glossaries

S/MIME (Secure Multi-Purpose Internet Mail Extensions)

S/MIME (Secure Multi-Purpose Internet Mail Extensions) is a secure method of sending e-mail that uses the Rivest-Shamir-Adleman encryption system. Read Full Definition

Associated Glossaries

Cisco Information Security Specialist (CISS)

Cisco Information Security Specialist (CISS) is an entry-level certification attesting that the holder has demonstrated the foundational knowledge and skills required to install and support a Cisco Self-Defending... Read Full Definition

Active Server Page (ASP)

ASP is also an abbreviation for application service provider. Read Full Definition

Associated Glossaries

Computer Security Incident Response Team (CSIRT)

A Computer Security Incident Response Team (CSIRT) is a group of IT professionals that provides an organization with services and support surrounding the prevention, management and coordination of potential ... Read Full Definition

Associated Glossaries

OWASP (Open Web Application Security Project)

The Open Web Application Security Project (OWASP) is a not-for-profit group that helps organizations develop, purchase, and maintain software applications that can be trusted. Read Full Definition

Associated Glossaries

Managed security service provider (MSSP)

A managed security service provider (MSSP) is an IT service provider that provides an organization with some amount of cybersecurity monitoring and management, which may include virus and spam blocking, intrusion ... Read Full Definition

ISO/IEC 17799: Code of Practice for Information Security Management

ISO/IEC 17799: Code of Practice for Information Security Management is a generic set of best practices for the security of information systems. Considered the foremost security specification document in the world, ... Read Full Definition

unauthenticated security scan (logged-out secuity scan)

An unauthenticated security scan, sometimes called a logged-out scan, is the process of exploring a network or networked system for vulnerabilities that are accessible without logging in as an authorized user. Read Full Definition

Associated Glossaries