About 809 results
Open links in new tab
  1. Terminate (automatically) a user session after a defined condition.

  2. Gather Victim Host Information. Gather Victim Identity Information. Gather Victim Network Information. Gather Victim Org Information. Phishing for Information. Search Closed Sources. …

  3. A type of malware (malicious software) distinct from other malware; its defining characteristic is that it attempts to deny access to a user’s data, usually by encrypting the data with a key …

  4. [XLS]

    OWASP

    Verify that files obtained from untrusted sources are validated to be of expected type and scanned by antivirus scanners to prevent upload of known malicious content.

  5. It is a relatively trivial effort for a malicious individual to reconstruct original PAN data if they have access to both the truncated and hashed version of a PAN.

  6. R1: Test Procedures R2: Ports and Services R3: Security Patch Management R4: Malicious Software Prevention R5: Account Management R6: Security Status Monitoring R7: Disposal or …

  7. b. Provide the following investigative scanning capabilities: - RegEx, File, Hash, and value search across all endpoints. - Malicious activity review and validation including analysis, tagging, …

  8. SI-3 Malicious Code Protection SI-3 (1) Malicious Code Protection | Central Management SI-3 (2) Malicious Code Protection | Automatic Updates SI-3 (10)

  9. Policies, procedures, standards, or other documentation showing how the environment is protected against malicious code on mobile devices. Screenshots of platforms are acceptable.

  10. Check media containing diagnostic and test programs for malicious code before the media are used in the system. Protect (i.e., physically control and securely store) system media …