A | B | C | D | E | I | K | L | M | N | O | P | R | S | T | U | V | W | Y | Z


An approach to authentication that allows end-users whose identity and credentials are managed by a third party to access corporate resources. For example, instead of requiring users to create a new username and password to access a particular resource, an organization can allow access by leveraging users' existing social identities such as Facebook, Twitter, LinkedIn, Google, or Amazon.
The practice of allowing the employees of an organization to use their personal computers, smartphones, or other devices for work purposes. Employee-Owned hardware can pose security risks to the organization if allowed to connect to the corporate network or access corporate data without preventative measures.
A brute force attack is a trial-and-error method used to obtain information that can lead to unauthorized access to protected data. In a brute force attack, an automated process is used to generate a large number of consecutive guesses as to the value of the desired data. For example, brute force attacks may be used to guess user credentials or crack encrypted data archive.