Authentication protocolAn authentication protocol is a type of computer communications protocol or cryptographic protocol specifically designed for transfer of authentication data between two entities. It allows the receiving entity to authenticate the connecting entity (e.g. Client connecting to a Server) as well as authenticate itself to the connecting entity (Server to a client) by declaring the type of information needed for authentication as well as syntax. It is the most important layer of protection needed for secure communication within computer networks.
Mobile securityMobile security, or mobile device security, is the protection of smartphones, tablets, and laptops from threats associated with wireless computing. It has become increasingly important in mobile computing. The security of personal and business information now stored on smartphones is of particular concern. Increasingly, users and businesses use smartphones not only to communicate, but also to plan and organize their work and private life.
Terrorism financingTerrorism financing is the provision of funds or providing financial support to individual terrorists or non-state actors. Most countries have implemented measures to counter terrorism financing (CTF) often as part of their money laundering laws. Some countries and multinational organisations have created a list of organisations that they regard as terrorist organisations, though there is no consistency as to which organisations are designated as being terrorist by each country.
Downgrade attackA downgrade attack, also called a bidding-down attack or version rollback attack, is a form of cryptographic attack on a computer system or communications protocol that makes it abandon a high-quality mode of operation (e.g. an encrypted connection) in favor of an older, lower-quality mode of operation (e.g. cleartext) that is typically provided for backward compatibility with older systems. An example of such a flaw was found in OpenSSL that allowed the attacker to negotiate the use of a lower version of TLS between the client and server.
PaymentA payment is the voluntary tender of money or its equivalent or of things of value by one party (such as a person or company) to another in exchange for goods or services provided by them, or to fulfill a legal obligation/philanthropy desire. The party making the payment is commonly called the payer, while the payee is the party receiving the payment. Payments can be effected in a number of ways, for example: the use of money, cheque, or debit, credit, or bank transfers, whether through mobile payment or otherwise the transfer of anything of value, such as stock, or using barter, or personal data, the exchange of one good or service for another.
UpcyclingUpcycling, also known as creative reuse, is the process of transforming by-products, waste materials, useless, or unwanted products into new materials or products perceived to be of greater quality, such as artistic value or environmental value. Upcycling is the opposite of downcycling, which is the other part of the recycling process. Downcycling involves converting materials and products into new materials, sometimes of lesser quality. Most recycling involves converting or extracting useful materials from a product and creating a different product or material.