Account Takeover
Gaining unauthorized access to users accounts.
A glossary is a list of terms, abbreviations, or expressions in a particular field of knowledge with their respective definitions.
Gaining unauthorized access to users accounts.
Reasonable effort to satisfy a request but without guaranteeing success.
A circular diagram used to show the relationships between colors.
An umbrella term that covers all technical means used to handle information and facilitate communication.
The use of hardware and software to manage, retrieve, and deliver data.
Native or built-in feature or functionality of a product, included by default and that works immediately after first setup.
Security concept whereby a user or service is granted the minimum levels of access and authorization necessary to perform the requested task.
Reported at the same time something takes place.
Used to describe a computer system that guarantee to process events and perform tasks within a specific time constraints.
Targeted duration of time between the event of failure and the point where operations resume.
Agreed maximum time, based on risk analysis, between the failure event and the restoration of operations.
A comprehensive inventory of all the components used in a software.
The load balancer decrypts the incoming encrypted traffic (same as in SSL-Termination) and re-encrypts it when sending to the back-end server.
The load balancer passes the encrypted traffic to the backend servers without decrypting it.
Because the load balancer only sees encrypted traffic, it is not possible to perform layer 7 (OSI model) actions.
The load balancer decrypts the incoming encrypted traffic and sends it to the backend server unencrypted.