Home » security » Page 15

Tagsecurity

bumping

bumping  n.— «This security consultant is about to demonstrate how easy it is to pop open a P.O. Box with nothing more than a tapping device and a blank key.…It’s a method called “bumping” and he says anyone can do it. He...

flexicurity

flexicurity  n.— «Numerous experts have praised Nordic countries’ systems, particularly that of Denmark, for their ability to create jobs while maintaining a high standard of social security for the unemployed. Industry associations also...

class break

class break  n.— «What is a “class break?” In network security jargon, that’s what happens when one breach leads to a whole new “class” of attacks on various systems, using similar methods.» —“Citibank security...

puffer machine

puffer machine  n.— «In airports with puffer machines, passengers are asked to step into a portal as they approach security. Once inside, jets of air blow in rapid sequence to dislodge trace particles from the passenger’s clothes and skin...

ineptware

ineptware  n.— «Sophos, another security company, is similarly scathing of Sony and is calling the software “ineptware.”…The DRM software uses what is known as a “rootkit.”» —“Sony’s antipiracy may end up...

oil-spot theory

oil-spot theory  n.— «The actual strategy which the government adopted in its attempts to prevent a communist takeover was only articulated to any appreciable degree in the military domain. It might be summarized as an urban-based strategy...