Find link

language:

jump to random article

Find link is a tool written by Edward Betts.

searching for Information leakage 57 found (130 total)

alternate case: information leakage

Data loss prevention software (1,432 words) [view diff] no match in snippet view article find links to article

Data loss prevention (DLP) software detects potential data breaches/data exfiltration transmissions and prevents them by monitoring, detecting and blocking
Cryptovirology (1,453 words) [view diff] exact match in snippet view article find links to article
cause loss of access to information, loss of confidentiality, and information leakage, tasks which cryptography typically prevents. The field was born
MAC address (3,746 words) [view diff] no match in snippet view article find links to article
A MAC address (short for medium access control address) is a unique identifier assigned to a network interface controller (NIC) for use as a network address
Timing attack (1,524 words) [view diff] exact match in snippet view article find links to article
information is combined with cryptanalysis to increase the rate of information leakage. Information can leak from a system through measurement of the time
Shanghai police database leak (485 words) [view diff] exact match in snippet view article find links to article
members in 2016, the Weibo account information leak in 2020, and the information leakage from Xinjiang re-education camps in 2022. Cybersecurity researcher
Fialka (1,494 words) [view diff] no match in snippet view article find links to article
In cryptography, Fialka (M-125) is the name of a Cold War-era Soviet cipher machine. A rotor machine, the device uses 10 rotors, each with 30 contacts
Optimal asymmetric encryption padding (1,237 words) [view diff] exact match in snippet view article find links to article
probabilistic scheme. Prevent partial decryption of ciphertexts (or other information leakage) by ensuring that an adversary cannot recover any portion of the
XXTEA (1,123 words) [view diff] exact match in snippet view article find links to article
is employed, only identical messages give the same result and the information leakage is minimal. The message number should always be checked as this redundancy
Chinese Software Developer Network (442 words) [view diff] no match in snippet view article find links to article
The "Chinese Software Developer Network" or "China Software Developer Network", (CSDN), operated by Bailian Midami Digital Technology Co., Ltd., is one
ALcot (266 words) [view diff] exact match in snippet view article find links to article
also produces visual novels. In June 2008, there was a personal information leakage problem for their eroge Clover Hearts. ALcot has a radio program
Information flow (information theory) (2,376 words) [view diff] exact match in snippet view article
where an information leakage might happen, without looking at the context, it may halt a program that, despite having potential information leakage, never
Standard of Good Practice for Information Security (559 words) [view diff] exact match in snippet view article find links to article
coverage of ISO/IEC 27002 control topics, as well as cloud computing, information leakage, consumer devices and security governance. In addition to providing
Electronic health record confidentiality (599 words) [view diff] no match in snippet view article find links to article
Electronic health record medical healthcare systems are developing widely. Things are being moved from the manual ways to automation and the patient records
PURB (cryptography) (1,492 words) [view diff] exact match in snippet view article
discipline for encrypted data formats designed to minimize unintended information leakage either from its encryption format metadata or from its total length
Adam D. Smith (75 words) [view diff] case mismatch in snippet view article find links to article
science Institutions Boston University Thesis Maintaining Secrecy when Information Leakage is Unavoidable  (2004) Doctoral advisor Madhu Sudan Website cs-people
CITIC Securities (775 words) [view diff] exact match in snippet view article find links to article
authorities to assist investigation on potential insider trading and information leakage. In November 2016, CITIC CLSA acted as the sole bookrunner for CEFC
LG Uplus (1,075 words) [view diff] exact match in snippet view article find links to article
attacks that interrupted data services and resulted in personal information leakage. On February 16, 2023, LG U+ CEO Hwang Hyeon-sik apologized for the
Stack buffer overflow (2,647 words) [view diff] exact match in snippet view article find links to article
disclosure and information leakage attacks. The attacker can launch the ROP by revealing a single function address using information leakage attack. The
Confession (1,610 words) [view diff] exact match in snippet view article find links to article
them is high, the cost to the victim is low, and the probability of information leakage is high). People may undertake social confessions in order to relieve
Encryption (3,575 words) [view diff] exact match in snippet view article find links to article
BREACH attacks against HTTPS were side-channel attacks that relied on information leakage via the length of encrypted content. Traffic analysis is a broad
Email encryption (1,671 words) [view diff] exact match in snippet view article find links to article
to avoid encryption being used to hide malware introduction and information leakage. Transport layer encryption using STARTTLS must be set up by the
Non-interference (security) (859 words) [view diff] exact match in snippet view article
guessing entropy, and min-entropy are prevalent notions of quantitative information leakage that generalize noninterference. Smith, Geoffrey (2007). "Principles
Sistema de Seleção Unificada (2,148 words) [view diff] exact match in snippet view article find links to article
accesses, which peaked at 350,000 simultaneous visits. In 2011, information leakage occurred. Upon entering the system using their own access code, candidates
Beast (Trojan horse) (354 words) [view diff] case mismatch in snippet view article
"Trojan Horse Attacks, Decoy State Method, and Side Channels of Information Leakage in Quantum Cryptography". Journal of Experimental and Theoretical
Remote viewing (4,277 words) [view diff] exact match in snippet view article find links to article
several problems with one of the early experiments at SAIC, including information leakage. However, he indicated the importance of its process-oriented approach
Acoustic metric (844 words) [view diff] exact match in snippet view article find links to article
Bibcode:1981PhRvL..46.1351U. doi:10.1103/PhysRevLett.46.1351. Considers information leakage through a transsonic horizon as an "analogue" of Hawking radiation
Cross-site request forgery (3,741 words) [view diff] exact match in snippet view article find links to article
attacks using malicious image URLs or link addresses and cross-site information leakage through <script> elements (JavaScript hijacking); it also prevents
Public-key cryptography (4,031 words) [view diff] exact match in snippet view article find links to article
implementations may be vulnerable to side-channel attacks that exploit information leakage to simplify the search for a secret key. These are often independent
Health Codes (Chinese mobile app group) (4,614 words) [view diff] exact match in snippet view article
Healthbao" (Beijing's Health Code, 北京健康宝) was exposed to a personal information leakage incident. Its photos, ID card numbers and related nucleic acid test
Session hijacking (1,560 words) [view diff] exact match in snippet view article find links to article
automates sidejacking and replay of HTTP requests, to help identify information leakage from applications that use unencrypted GET requests. It is a cross-platform
Republic of China Military Police (1,932 words) [view diff] exact match in snippet view article find links to article
public prosecutors of all levels in the ROC, because of minimal information leakage or less interference from domestic politicians. In cases of fugitive
List of After War Gundam X characters (2,905 words) [view diff] exact match in snippet view article find links to article
Newtype's power. But finally he was killed by First brother to avoid information leakage. Miles Goodman Voiced by: Dai Matsumoto He is the son of the Saint's
NTT Communications (2,456 words) [view diff] exact match in snippet view article find links to article
consecutive year. On 28 May 2020, the firm announced the possibility of information leakage because of unauthorized access, however, no information related to
Fred Federspiel (434 words) [view diff] case mismatch in snippet view article find links to article
High Speed Traders". 2011. "New Block Trading System to Prevent Information Leakage". 2004. "Confidential block trading system and method". 2006. "Administrative
INCA Internet (1,095 words) [view diff] exact match in snippet view article find links to article
managers and electronic managers within the organization. Prevention of information leakage of sensitive and confidential information through information asset
Tempest (codename) (4,229 words) [view diff] case mismatch in snippet view article
information using the non-invasive method. J. Loughry and D. A. Umphress. Information Leakage from Optical Emanations (.pdf file), ACM Transactions on Information
Malaysia Office of the Chief Government Security Officer (287 words) [view diff] exact match in snippet view article find links to article
This helps to protect against espionage, sabotage, and unauthorized information leakage. The CGSO's office was moved to the Ministry of Home Affairs in the
Best execution (1,156 words) [view diff] case mismatch in snippet view article find links to article
charges fees (or rebates) for participating in the venue activities. Information Leakage - will the trade information be leaked to the market, as to adversely
Device fingerprint (3,692 words) [view diff] exact match in snippet view article find links to article
clientCaps "isComponentInstalled" and "getComponentVersion" registry information leakage". Archive.cert.uni-stuttgart.de. Archived from the original on 2011-06-12
White-box cryptography (2,456 words) [view diff] exact match in snippet view article find links to article
in-between, the so-called gray-box model, which corresponds to additional information leakage from the implementation, more commonly referred to as side-channel
Tsai De-sheng (369 words) [view diff] exact match in snippet view article find links to article
that the government should be more alert for the possibility of information leakage to Mainland China via Huawei products. "中華民國國家安全局". Nsb.gov.tw. Retrieved
Tamer Şahin (1,352 words) [view diff] case mismatch in snippet view article find links to article
Retrieved November 12, 2011. "Netcharts Server Chunked Encoding Information Leakage Vulnerability". Securityfocus.com. February 18, 2003. Retrieved November
High-frequency trading (8,348 words) [view diff] exact match in snippet view article find links to article
exchanges through the use of intentional delays. This largely prevents information leakage in the propagation of orders that high-speed traders can take advantage
Information technology audit (3,982 words) [view diff] exact match in snippet view article find links to article
minimize damage to reputation maintain regulatory compliance prevent information leakage mitigate third-party risk minimize governance risk The use of departmental
Permissive action link (3,844 words) [view diff] exact match in snippet view article find links to article
construction attempt to create a black box system so as to limit information leakage. PALs are also linked directly or indirectly with a number of other
Privacy concerns with social networking services (19,548 words) [view diff] exact match in snippet view article find links to article
study highlighted these issues by measuring the amount of unintended information leakage over a large number of users with the varying number of social networks
Cyberterrorism (11,144 words) [view diff] exact match in snippet view article find links to article
attack harassed private companies and users, who experienced personal information leakage. Additionally, there were North Korea's cyber attacks which risked
Maureen O'Hara (financial economist) (1,148 words) [view diff] case mismatch in snippet view article
Krellenstein, M. O'Hara and O. Slama (2017). “Footprints on a Blockchain:  Information Leakage in Distributed Ledgers,” Journal of Trading, 12(2) (Winner of the
Strategic alliance (5,057 words) [view diff] exact match in snippet view article find links to article
Inefficient management Activities outside scope of original agreement Information leakage Loss of competencies Loss of operational control Partner lock-in
Cold boot attack (4,247 words) [view diff] exact match in snippet view article find links to article
efficient secure architecture with memory encryption, integrity and information leakage protection", Dec. 2006 X. Chen, R. P. Dick, and A. Choudhary "Operating
K1 88-Tank (8,697 words) [view diff] exact match in snippet view article find links to article
found out about this, they built a wall in the office to prevent information leakage. However, Koreans managed to obtain significant data during their
Medical privacy (8,102 words) [view diff] no match in snippet view article find links to article
potential implications of unwanted disclosure of patient information? Information 'leakage' is seen as having the potential to discourage both patient and clinician
Contextual integrity (1,799 words) [view diff] exact match in snippet view article find links to article
blocking all flows of information, minimizing data flow, or by stopping information leakage. The fourth essential claim comprising contextual integrity gives
Kimberly Zenz (1,590 words) [view diff] exact match in snippet view article find links to article
original on January 23, 2018. Retrieved June 30, 2020. Scheme of information leakage from Mikhailov's group to American intelligence agencies (version
Board of Audit and Inspection (4,865 words) [view diff] case mismatch in snippet view article find links to article
hack in July 2011. Major incidents related to the leak of personal information Leakage data was used for voice phishing, loan fraud, identity theft, and
Silvio Santos 1989 presidential campaign (2,505 words) [view diff] exact match in snippet view article find links to article
costs, since many were against Silvio's candidacy, and also to avoid information leakage, as it happened with the PFL candidacy attempt. Eliane Cantanhêde [pt]
2014 Se og Hør media scandal (9,224 words) [view diff] exact match in snippet view article find links to article
Nets, and IBM all investigated not just the apparent credit card information leakage to Se og Hør but also whether any further leaks had occurred, especially