Tech Buzzwords

May 19, 2023

fuzzing

 

Non Repudiation

polyinstantiation

Polyinstantiation is a cybersecurity strategy where multiple instances of a shared resource are created to prevent a user without the correct privileges from seeing the more sensitive information.20 Feb 2020

polymorphysm

 

Event: An observable change in state, this is neither negative nor positive, it is just something has changed. A system powered on, traffic from one segment to another, an application started.

 

 

 

What is the IAAA model?
Well, security generally works on a principle called IAAA; Identification, Authentication, Authorisation, Accountability. Read on to find out what this principle looks like in the real world.