S-HTTP (Secure HTTP)
HTTP Protocol enhanced with security functions with symmetric key.
Action or omission, deliberate or accidental, contrary to the Security Policy or use regulations, resulting in a real or potential compromise of classified information for systems, services and resources that support it.
Characterization of the information or an information system based on an assessment of the potential impact of the loss of confidentiality, integrity or availability of the information or the system.
Security of the Information
Preservation of the confidentiality, integrity and availability of the information.
Networks of interpersonal ties that provide socialization, support and information, increasing a sense of membership and social identity.
Spam or Trash Mail
Unwanted mails randomly send in process by group. It is not a direct threat, but the amount of generated e-mails and the time it takes to companies and individual to relate them and eliminate them is an annoying element to Internet users.
SSL (Secure Sockets Layer)
Protocol designed to provide security at the level of the transport layer for TCP.