Question 1 of 218
The idea that a cryptosystem's security should rely on the secrecy of the key, not the algorithm.
Confidentiality, Integrity, Availability
A flaw where an application allows attackers to redirect users to malicious sites using trusted URLs.
HIDS monitors a single host's activity and files; NIDS monitors traffic across an entire network segment.