Articles

Client Side Encryption

Client Side Encryption
Client-Side Encryption (CSE) Description Client-side encryption (CSE) is the cryptographic technique of encrypting data on the sender's side before it is transmitted to a server such as a cloud storage service. The data owner retains the encryption key and does not share it with the cloud-based service. Data stored in the cloud is therefore more...

Read more ...

Deep Packet Inspection

Deep Packet Inspection
Definition Deep packet inspection (DPI) is a technology that allows packet-inspecting devices - such as firewalls and IPS - to deeply analyse packet contents. DPI functionality is invoked when a device utilises information beyond Layer 3 ( and up to all seven layers) of the OSI model. In other words, DPI examines the entire contents...

Read more ...

Form Grabbing Malware

Form Grabbing Malware
Form Grabbing Malware (Form-Grabbers) facilitate personal information theft and exploitation. They are a form of trojan that "grabs" user input from browser forms before it is encrypted and sent to its intended destination. When a user submits a Web form, such as those used to log onto a website, the Web browser generates an HTTP...

Read more ...

Glossary

Glossary
From botnet to malware: a guide to decoding cybersecurity buzzwords Nicholas Patterson, Deakin University Words like worm, trojan horse and zombie may seem like the stuff of science fiction, but they’re part of the reality of life online. Now that we communicate, work and entertain ourselves on the internet, these familiar terms start to take...

Read more ...

Human Hacking

Human Hacking
Human hacking is a type of social engineering, the psychological manipulation of people into performing actions or divulging confidential information. It is often one of many steps in a more complex fraud scheme. It has also been defined as "any act that influences a person to take an action that may or may not be in their best...

Read more ...

IPv6 Security

IPv6 Security
Internet Protocol version 6 (IPv6) is the most recent version of the Internet Protocol (IP), the communications protocol that provides an identification and location system for computers on networks and routes traffic across the Internet. IPv6 was developed by the Internet Engineering Task Force (IETF) to deal with the long-anticipated problem of IPv4 address exhaustion...

Read more ...

Phishing

Phishing
Definition In a phishing attack, an attacker uses human interaction / social skills (termed ‘pretexting’) to obtain or compromise information about an organisation, personnel, computer systems or all three. An attacker may seem unassuming and respectable, possibly claiming to be a new employee, repair person, contractor or researcher and may even offer credentials to support...

Read more ...