MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.


I'm not curious

IT & Technology keywords and their definitions. IT Tags have associated tech Blogs, IT Reviews, Technology Jobs & Careers, Technology Courses & Reviews and IT Challenges to enhance the real-world learning for tech enthusiasts and technophiles.

All Tags can be editable through Desktop/Tablet.
  • secure socket layer

    Secure Sockets Layer, a protocol developed by Netscape for transmitting private documents via the Internet. SSL uses a cryptographic system that uses two keys to encrypt data − a public key known to everyone and a private or secret key known only to the recipient of the message. Both Netscape Navigator and Internet Explorer support SSL, and many Web sites use the protocol to obtain confidential user information, such as credit card numbers. By convention, URLs that require an SSL connection start with https: instead of http

  • Secure Sockets Layer Virtual Private Network (SSL VPN)

    A form of VPN that can be used with a standard Web browser. In contrast to the traditional Internet Protocol Security (IPsec) VPN, an SSL VPN does not require the installation of specialized client software on the end user's computer.

  • Security

    In information technology, security is the protection of information assets through the use of technology, processes, and training.    

  • Security Accounts Manager (SAM)

    A database in the Windows OS that contains user names and passwords. SAM is part of the registry and can be found on the hard disk. Each user account can be assigned encrypted Local Area Network (LAN) password and Windows password. 

  • Security as a Service (SaaS)

    An outsourcing model for security management. Typically, it involves applications such as anti-virus software delivered over the Internet but the term can also refer to security management provided in-house by an external organization.

  • Security Assertion Markup Language (SAML)

    An Extensible Markup Language (XML) standard that allows a user to log on once for affiliated but separate Web sites. SAML is designed for business-to-business (B2B) and business-to-consumer (B2C) transactions.

  • Security audit

    A systematic evaluation of the security of a company's information system by measuring how well it conforms to a set of established criteria. 

  • Security Cameras

    A security camera is a camera which is used to monitor an area for security purposes. The footage from the camera may be reviewed continuously to look for potential security breaches, or examined after the fact in the hopes of getting a glimpse of a criminal or a situation. There are a number of different environments in which a security camera can be used, and security cameras have grown increasingly common in many parts of the world. Some privacy advocates have raised concerns about the proliferation of security cameras.

  • Security Descriptor Definition Language (SDDL)

    A formal way to specify Microsoft Windows security descriptors or text strings that describe who owns various objects such as files in the system. The security descriptor may also provide an access control list for an object or group of objects.

  • Security event

    A change in the everyday operations of a network or information technology service, indicating that a security policy may have been violated or a security safeguard may have failed.

  • Security identifier (SID)

    In Windows NT and 2000 operating systems, the security identifier (SID) is a unique alphanumeric character string that identifies each operating system and each user in a network of NT/2000 systems.  

  • Security Information and Event Management (SIEM)

    An approach to security management that seeks to provide a holistic view of an organization's IT security. SIEM combines SIM(security information management) and SEM (security event management) functions into one security management system.  

  • Security Information Management (SIM)

    A system that automates the practice of collecting, monitoring and analyzing security-related data from computer logs.

  • Security policy

    In business, a security policy is a document that states in writing how a company plans to protect the company's physical and IT assets. 

  • Security, Trust and Assurance Registry (STAR)

    An online registry of cloud provider security controls. Cloud customers can use STAR to research the security practices of participating cloud providers.

Awards & Accolades for MyTechLogy
Winner of
REDHERRING
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url

Back to Top

Tag
Related Tag(s)
Description
Total Chars : 0
Communities

Publish Yes No

Redirect to