Security baseline

Security baseline: A set of minimum security standards and requirements that must be met by an organization or system. It is used as a benchmark to assess the current level of security and identify areas for improvement. Examples of a security baseline include required password strength and expiration, minimum encryption standards, and regular security audits.

Security perimeter

Security perimeter: A boundary that defines the physical or logical limits within which an organization’s security controls are enforced. The security perimeter helps protect against external threats by incorporating mechanisms such as firewalls, intrusion detection and prevention systems (IDS/IPS), and access control lists to prevent unauthorized access.

Server hardening guidelines

Server hardening guidelines: The guidelines and best practices for securing a server and protecting it against potential vulnerabilities and attacks. They are used in the configuration and maintenance of servers in a network. Examples of server hardening guidelines include disabling unnecessary services, implementing firewalls and intrusion detection systems, and regularly updating software and patches.

Screen scraping

Screen scraping: A technique used to extract data from the display output of a program or system. It involves capturing data from a screen interface and converting it into structured datasets. While screen scraping can be used for legitimate purposes like data aggregation and legacy system integration, it can also pose privacy risks if used […]

Secure Socket Layer (SSL)

Secure Socket Layer (SSL): A cryptographic protocol designed to provide secure communications over a computer network. SSL uses a combination of public key and symmetric key encryption to secure a connection between two machines, typically a web server and a client, over the internet. It was widely used for securing data transfer, ensuring the privacy […]

Screened host

Screened host: A host protected from external threats by a screening router to prevent unauthorized access and safeguard sensitive information. Examples include a server, database, or web application situated behind a screening router.