230

2025

Secure

Secure by design

Secure by design (SbD) is a principle of cybersecurity and systems engineering that requires systems to be built with security as a foundational property rather than as an afterthought. It is concerned with embedding protections at the earliest design stages of hardware, software, and services, so that security requirements shape …

more ...

129

2025

Secure

Transport Layer Security

Transport Layer Security (TLS) is a cryptographic protocol designed to provide communications security over a computer network, such as the Internet. The protocol is widely used in applications such as email, instant messaging, and voice over IP, but its use in securing HTTPS remains the most publicly visible. The TLS …

more ...

106

2025

Secure

Secure copy protocol

Secure copy protocol (SCP) is a means of securely transferring computer files between a local host and a remote host or between two remote hosts. It is based on the Secure Shell (SSH) protocol. “SCP” commonly refers to both the Secure Copy Protocol and the program itself. According to OpenSSH …

more ...

072

2025

Secure

Communications security

Communications security is the discipline of preventing unauthorized interceptors from accessing telecommunications in an intelligible form, while still delivering content to the intended recipients. In the North Atlantic Treaty Organization culture, including United States Department of Defense culture, it is often referred to by the abbreviation COMSEC. The field includes …

more ...

033

2025

Secure

Secure Hash Algorithms

The Secure Hash Algorithms are a family of cryptographic hash functions published by the National Institute of Standards and Technology (NIST) as a U.S. Federal Information Processing Standard (FIPS), including:

SHA-0: A retronym applied to the original version of the 160-bit hash function published in 1993 under the name …

more ...

330

2024

Secure

HTTP

HTTP (Hypertext Transfer Protocol) is an application layer protocol in the Internet protocol suite model for distributed, collaborative, hypermedia information systems. HTTP is the foundation of data communication for the World Wide Web, where hypertext documents include hyperlinks to other resources that the user can easily access, for example by …

more ...

316

2024

Secure

Secure tenancy

A secure tenancy is a type of tenancy in the United Kingdom created by the Housing Act 1980. Most tenancies started before 15 January 1989 are likely to be secure. The secure tenancy was replaced on 15 January 1989 for new tenancies by an assured tenancy, with weaker protection, by …

more ...

298

2024

Secure

Secure attention key

A secure attention key (SAK), special attention key, or secure attention sequence (SAS) is a special key, key combination or sequence to be pressed on a computer keyboard before a login screen which must, to the user, be completely trustworthy. The operating system kernel, which interacts directly with the hardware …

more ...

278

2024

Secure

Secure Shell

The Secure Shell Protocol (SSH Protocol) is a cryptographic network protocol for operating network services securely over an unsecured network. Its most notable applications are remote login and command-line execution. SSH was designed for Unix-like operating systems as a replacement for Telnet and unsecured remote Unix shell protocols, such as …

more ...

Page 1 / 1