A computer security conference is a convention for individuals involved in computer security. They generally serve as meeting places for system and network...
40 KB (3,962 words) - 04:46, 29 May 2025
was founded in 1974. CSI used to conduct two conferences per year — the Annual Computer Security Conference and Exhibition and CSI SX. Internet entrepreneur...
5 KB (406 words) - 05:46, 10 June 2025
someone's webmail account, to cracking the security of a bank. The maximum penalty for unauthorized access to a computer is two years in prison and a fine. There...
18 KB (1,870 words) - 03:36, 6 June 2025
Computer security (also cybersecurity, digital security, or information technology (IT) security) is a subdiscipline within the field of information security...
220 KB (22,314 words) - 10:38, 16 June 2025
Hack.lu (category Computer security conferences)
is a yearly computer security conference held in Luxembourg that brings together a variety of people interested in information security. It's organized...
3 KB (273 words) - 08:08, 25 December 2023
Jeff Moss (hacker) (section Security conferences)
hacker, computer and internet security expert who founded the Black Hat and DEF CON computer security conferences. Moss received his first computer at the...
14 KB (1,350 words) - 11:42, 15 April 2025
Role-based access control (redirect from Role based security)
In computer systems security, role-based access control (RBAC) or role-based security is an approach to restricting system access to authorized users,...
19 KB (2,300 words) - 11:31, 13 May 2025
Black Hat Briefings (redirect from Black Hat Conference)
Briefings (commonly referred to as Black Hat) is a computer security conference that provides security consulting, training, and briefings to hackers, corporations...
28 KB (1,792 words) - 02:20, 28 May 2025
A security hacker or security researcher is someone who explores methods for breaching or bypassing defenses and exploiting weaknesses in a computer system...
55 KB (5,962 words) - 03:26, 11 June 2025
The RSA Conference is a series of IT security conferences. Approximately 45,000 people attend one of the conferences each year. It was founded in 1991...
16 KB (1,564 words) - 21:27, 23 April 2025
Kawaiicon (section Past conferences)
Zealand computer security conference held in Wellington from 2007. It brings together a variety of people interested in information security. Representatives...
12 KB (1,183 words) - 02:30, 18 January 2025
Security BSides (commonly referred to as BSides) is a series of loosely affiliated information security conferences. It was co-founded by Mike Dahn, Jack...
6 KB (419 words) - 12:51, 7 April 2025
The International Malware Conference, abbreviated as MalCon and stylized as MALCON is a computer security conference targeted on the development of malware...
3 KB (191 words) - 07:15, 25 November 2023
In computer security, shoulder surfing is a social engineering technique used to obtain information such as personal identification numbers (PINs), passwords...
16 KB (2,059 words) - 18:25, 9 June 2025
effectiveness of computer security controls built into a computer system. The TCSEC was used to evaluate, classify, and select computer systems being considered...
18 KB (2,124 words) - 19:40, 25 May 2025
Ekoparty (category Computer security conferences)
Ekoparty is an annual computer security conference that brings together a variety of people interested in information security. The Briefings take place...
2 KB (158 words) - 04:27, 29 February 2024
The Diana Initiative (category Computer security conferences)
The Diana Initiative is a computer security conference based in Las Vegas, Nevada aimed at supporting underrepresented minorities including women in cybersecurity/...
3 KB (185 words) - 09:08, 18 February 2023
Human–computer interaction (HCI) is the process through which people operate and engage with computer systems. Research in HCI covers the design and the...
50 KB (5,763 words) - 17:43, 13 June 2025
list of academic conferences in computer science. Only conferences with separate articles are included; within each field, the conferences are listed alphabetically...
14 KB (1,379 words) - 00:05, 12 June 2025
topical guide to computer security: Computer security (also cybersecurity, digital security, or information technology (IT) security) is a subdiscipline...
49 KB (5,235 words) - 08:16, 15 June 2025
model and some extensions. In: Proceedings of 16th Annual Computer Security Application Conference, New Orleans, U.S.A. (December 2000) A mechanism for identity...
4 KB (519 words) - 11:23, 20 December 2022
Barnaby Jack (category Computer security specialists)
hacker, programmer and computer security expert. He was known for his presentation at the Black Hat computer security conference in 2010, during which...
11 KB (1,034 words) - 01:06, 13 May 2025
Protection ring (redirect from Ring 0 (computer security))
improving fault tolerance) and malicious behavior (by providing computer security). Computer operating systems provide different levels of access to resources...
31 KB (3,861 words) - 01:34, 14 April 2025
Intrusion detection system (category Computer network security)
National Computer Security Conference, October, 1988 Smaha, Stephen E., "Haystack: An Intrusion Detection System," The Fourth Aerospace Computer Security Applications...
46 KB (5,513 words) - 03:39, 6 June 2025
DerbyCon (category Computer security conferences)
DerbyCon was a computer security conference based in Louisville, Kentucky. The first DerbyCon took place in 2011 and was founded by Martin Bos, Dave Kennedy...
4 KB (378 words) - 22:05, 7 April 2025
CodeCon (category Computer conference stubs)
conference for software hackers and technology enthusiasts, held every year between 2002 and 2009. CodeCon was not intended to be a computer security...
4 KB (318 words) - 03:22, 5 May 2025
Hacker (redirect from Computer hacking)
associated in popular culture with a security hacker – someone with knowledge of bugs or exploits to break into computer systems and access data which would...
41 KB (4,311 words) - 17:19, 14 June 2025
A computer virus is a type of malware that, when executed, replicates itself by modifying other computer programs and inserting its own code into those...
92 KB (9,552 words) - 17:59, 5 June 2025
Joint Computer Conferences were a series of computer conferences in the United States held under various names between 1951 and 1987. The conferences were...
13 KB (790 words) - 14:18, 11 June 2025
Positive Hack Days (category Computer security conferences)
interesting information security topics, The Standoff cyberexercises, practical competitions in which participants analyze the security of industrial control...
26 KB (2,677 words) - 02:08, 9 May 2025