Two Factor Authentication (2FA)

An access management strategy, the tool involves requiring a secondary form of identification to allow access to sensitive information.

1238 February 14, 2023

Inspired by the Trojan Horse story, trojan in cyber security is a malware disguised as a legitimate software. The fake malware is...

1237 February 14, 2023
Threat Analysis

The process of assessing an organisations already existing cyber security measures to identify potential threats and vulnerabilities.

1236 February 14, 2023
Trap Door

A method of gaining access into a system that bypasses the usual authentication steps. Programmers sometimes use these when designing a system...

859 January 19, 2023