#TechTermOfTheDay A #CloudAccessSecurityBroker acts as a proxy server that sits between an end user and a cloud application and can be thought of as a “firewall for the cloud.”
#techtermoftheday
Backend as a service (#BaaS) is a strategy for developing software applications that outsource backend computing services to a cloud service provider.
#TechTermOfTheDay
Field : Ethical Hacking
DENIAL OF SERVICE ATTACK (DoS) − DoS attack is a malicious attempt to make a server or a network resource unavailable to users, usually by temporarily interrupting or suspending the services of a host connected to the Internet.
#TechTermOfTheDay
Field : Ethical Hacking
CRACKER − A cracker is one who modifies the software to access the features which are considered undesirable by the person cracking the software, especially copy protection features.
#girlscript
#TechTermOfTheDay
Field : Ethical Hacking
CLONE PHISHING − Clone phishing is the modification of an existing, legitimate email with a false link to trick the recipient into providing personal information.
#girlscript
#TechTermOfTheDay
Field : Ethical Hacking
BRUTE FORCE ATTACK − A brute force attack is an automated and the simplest kind of method to gain access to a system or website. It tries different combination of usernames and passwords, over and over again, until it gets in.