1) Advanced Persistent Threat / APT - English Video - Telugu Video
2) Adware - English Video - Telugu Video
3) Angler Exploit Kit - English Video - Telugu Video
4) Anomaly-based detection - English Video - Telugu Video
5) Anonymizing proxy - English Video - Telugu Video
6) Anti malware - English Video - Telugu Video
7) Anti spam - English Video - Telugu Video
8) Anti spyware software - English Video - Telugu Video
9) Anti-spoofing - English Video - Telugu Video
10) Antivirus software - English Video - Telugu Video
11) Atmos - English Video - Telugu Video
12) Attack (online) - English Video - Telugu Video
13) Attack signature - English Video - Telugu Video
14) Authentication - English Video - Telugu Video
15) Autorun worm - English Video - Telugu Video
16) Backdoor Trojan - English Video - Telugu Video
17) Backup - English Video - Telugu Video
18) Baseline security - English Video - Telugu Video
19) Blackhat hacker - English Video - Telugu Video
20) Blacklisting - English Video - Telugu Video
21) Blended Threat - English Video - Telugu Video
22) Boot sector malware - English Video - Telugu Video
23) Bot - English Video - Telugu Video
24) Botnet - English Video - Telugu Video
25) Browser hijacking - English Video - Telugu Video
26) Brute force attack - English Video - Telugu Video
27) Buffer overflow - English Video - Telugu Video
28) Bug - English Video - Telugu Video
29) Bulk Encryption - English Video - Telugu Video
30) Business Impact Analysis (BIA) - English Video - Telugu Video
31) BYOD - English Video - Telugu Video
32) Cache - English Video - Telugu Video
33) Cache Cramming - English Video - Telugu Video
34) Catfishing - English Video - Telugu Video
35) Chargeware - English Video - Telugu Video
36) Chief Information Officer (CIO) - English Video - Telugu Video
37) CISO - English Video - Telugu Video
38) Citadel - English Video - Telugu Video
39) Code injection - English Video - Telugu Video
40) Command and control center - English Video - Telugu Video
41) Computer Abuse - English Video - Telugu Video
42) Computer Forensics - English Video - Telugu Video
43) Computer Incident Response Team (CIRT) - English Video - Telugu Video
44) Confidentiality - English Video - Telugu Video
45) Cookie - English Video - Telugu Video
46) CoreBOT - English Video - Telugu Video
47) Crimeware - English Video - Telugu Video
48) Cross Site Scripting (XSS) - English Video - Telugu Video
49) CryptoLocker - English Video - Telugu Video
50) CryptoWall - English Video - Telugu Video
51) CSO - English Video - Telugu Video
52) CTB Locker - English Video - Telugu Video
53) Cyber Attack - English Video - Telugu Video
54) Cyber incident - English Video - Telugu Video
55) Cyber security - English Video - Telugu Video
56) Cyber weapon - English Video - Telugu Video
57) Dark Web - English Video - Telugu Video
58) Data Asset - English Video - Telugu Video
59) Data Integrity - English Video - Telugu Video
60) Data leakage - English Video - Telugu Video
61) Data loss - English Video - Telugu Video
62) Data theft - English Video - Telugu Video
63) Deep Web - English Video - Telugu Video
64) Denial of service attack (DDoS) - English Video - Telugu Video
65) Dialer - English Video - Telugu Video
66) Digital Signature - English Video - Telugu Video
67) Disaster Recovery Plan (DRP) - English Video - Telugu Video
68) DNS Cache Poisoning - English Video - Telugu Video
69) DNS hijacking - English Video - Telugu Video
70) Document malware - English Video - Telugu Video
71) Domain generation algorithm (DGA) - English Video - Telugu Video
72) Domain shadowing - English Video - Telugu Video
73) Dormant code - English Video - Telugu Video
74) Dridex - English Video - Telugu Video
75) Drive-by attack - English Video - Telugu Video
76) Due diligence - English Video - Telugu Video
77) Dumpster diving - English Video - Telugu Video
78) Dyreza / Dyre - English Video - Telugu Video
79) Eavesdropping Attack - English Video - Telugu Video
80) Email malware distribution - English Video - Telugu Video
81) Encrypted Network - English Video - Telugu Video
82) Encryption - English Video - Telugu Video
83) End-to-End Encryption - English Video - Telugu Video
84) End-to-End Security - English Video - Telugu Video
85) Enterprise Risk Management - English Video - Telugu Video
86) Exploit - English Video - Telugu Video
87) Exploit kit - English Video - Telugu Video
88) Exploit kits-as-a-service - English Video - Telugu Video
89) External Security Testing - English Video - Telugu Video
90) Fail Safe - English Video - Telugu Video
91) Fake antivirus malware - English Video - Telugu Video
92) False positive - English Video - Telugu Video
93) File binder - English Video - Telugu Video
94) Fileless malware - English Video - Telugu Video
95) Financial malware - English Video - Telugu Video
96) Firewall - English Video - Telugu Video
97) Flip button - English Video - Telugu Video
98) Flooding - English Video - Telugu Video
99) Forensic Specialist - English Video - Telugu Video
100) Form-grabbing malware - English Video - Telugu Video
101) Greyhat hacker - English Video - Telugu Video
102) Hacker - English Video - Telugu Video
103) Hacktivism - English Video - Telugu Video
104) Heartbleed vulnerability - English Video - Telugu Video
105) Hoax - English Video - Telugu Video
106) Honeymonkey - English Video - Telugu Video
107) Honeypot - English Video - Telugu Video
108) HTTPS scanning - English Video - Telugu Video
109) Hybrid attack - English Video - Telugu Video
110) Identity Theft - English Video - Telugu Video
111) Inadvertent Disclosure - English Video - Telugu Video
112) Incremental Backups - English Video - Telugu Video
113) Information Assurance (IA) - English Video - Telugu Video
114) Information Flow Control - English Video - Telugu Video
115) Information Security - English Video - Telugu Video
116) Information Security Policy - English Video - Telugu Video
117) Information Security Risk - English Video - Telugu Video
118) Information System Resilience - English Video - Telugu Video
119) Information Systems Security (INFOSEC) - English Video - Telugu Video
120) Inside Threat - English Video - Telugu Video
121) Integrity - English Video - Telugu Video
122) Intellectual Property - English Video - Telugu Video
123) Internal Security Testing - English Video - Telugu Video
124) Internet worm - English Video - Telugu Video
125) Intrusion - English Video - Telugu Video
126) Intrusion Detection Systems (IDS) - English Video - Telugu Video
127) IP Flood - English Video - Telugu Video
128) IP Spoofing - English Video - Telugu Video
129) Keylogging - English Video - Telugu Video
130) Kovter - English Video - Telugu Video
131) Level of Concern - English Video - Telugu Video
132) Likelihood of Occurrence - English Video - Telugu Video
133) Locky - English Video - Telugu Video
134) Logic Bomb - English Video - Telugu Video
135) Low Impact - English Video - Telugu Video
136) Macro Virus - English Video - Telugu Video
137) Malicious Applet - English Video - Telugu Video
138) Malicious Code - English Video - Telugu Video
139) Malvertisement - English Video - Telugu Video
140) Malvertising - English Video - Telugu Video
141) Malware - English Video - Telugu Video
142) Malware - English Video - Telugu Video
143) Malware-as-a-service - English Video - Telugu Video
144) Man-in-the-middle Attack (MitM) - English Video - Telugu Video
145) Maximum Tolerable Downtime - English Video - Telugu Video
146) Mazar BOT - English Video - Telugu Video
147) Mobile code - English Video - Telugu Video
148) Mobile phone malware - English Video - Telugu Video
149) Moderate Impact - English Video - Telugu Video
150) Multifactor Authentication - English Video - Telugu Video
151) Netiquette - English Video - Telugu Video
152) Network Sniffing
153) Neutrino
154) Non-Repudiation
159) Nuclear Exploit Kit
160) Obfuscation
161) Offline Attack
162) Operation Tovar
163) Outside Threat
164) Packet Sniffer
165) Parasitic viruses
166) Passive attack
167) Password sniffing
168) Patch
169) Patch Management
170) Patching
171) Payload
172) Penetration
173) Penetration Testing
174) Personal Firewall
175) Pharming
176) Phishing
177) Plaintext
178) Polymorphic code
179) Polymorphic engine
180) Polymorphic malware
181) Polymorphic packer
182) Pop-up ad
183) Potential Impact
184) Potentially unwanted application (PUA)
185) Poweliks
186) Power virus
187) Proprietary Information (PROPIN)
188) Proxy server
189) Ransomware
190) Real-time reaction
191) Remote access
192) Remote access Trojan / RAT
193) Remote diagnostics / maintenance
194) Replay attacks
195) Residual risk
196) Resilience
197) Reverse engineering
198) Risk assessment
199) Risk management
200) Risk mitigation
201) Rogue security software
202) Rogueware
203) Root cause analysis
204) Rootkit
205) Safeguards
206) Scareware
207) Scavenging
208) Security controls
209) Security impact analysis
210) Security requirements
211) Sensitive information
212) Shylock
213) Signature
214) Skimming
215) Sniffer
216) Social engineering
217) Spam
218) Spam filtering software
219) Spear phishing
220) Spillage
221) Spoofing (Email)
222) Spy-phishing
223) Spyware
224) SQL injection
225) SSL / Secure Sockets Layer
226) Stealware
227) Strong authentication
228) Supply chain attack
229) Suppression measure
230) Suspicious files and behavior
231) System administrator / Sysadmin
232) System integrity
233) Tampering
234) Targeted threat
235) TeslaCrypt
236) Threat
237) Threat analysis
238) Threat assessment
239) Threat event
240) Threat monitoring
241) Threat scenario
242) Threat shifting
243) Threat source
244) Time bomb
245) Time-dependent password
246) Token
247) Tracking cookie
248) Traffic analysis
249) Traffic Encryption Key (TEK)
250) Trojan (Trojan horse)
251) Typhoid adware
252) Unauthorized access
253) Unauthorized disclosure
254) URL injection
255) Vaccine
256) Vawtrak / Neverquest
257) Virtual Private Network / VPN
258) Virus
259) Virus hoax
260) Vishing
261) Vulnerability
262) Wabbits
263) Watering Hole
264) Web bug
265) Web content filtering software
266) Webattacker
267) Whaling
268) Whitehat hacker
269) Whitelist
270) Worm
271) Zero Day
272) Zero Day virus / malware
273) Zero-Day attack
274) ZeuS / Zbot
275) Zeus GameOver / Zeus P2P
276) Zip bomb
277) Zombie
No comments:
Post a Comment
Note: only a member of this blog may post a comment.