Category: System Protection

Memory Safety

Memory safety is a property of computer programs that ensures they only access areas of memory they are meant to, preventing accidental or malicious errors. Without memory safety, software can crash, behave unpredictably, or become vulnerable to attacks. Achieving memory safety often involves using programming languages or tools that automatically manage memory or check for…

Secure Enclave

A Secure Enclave is a dedicated area within a computer’s processor designed to store sensitive information like passwords, encryption keys, or biometric data. It operates separately from the main system, so even if the main operating system is compromised, the data inside the Secure Enclave remains protected. This technology helps to keep critical information safe…

Serverless Security

Serverless security refers to protecting applications that run on serverless computing platforms, where cloud providers automatically manage the servers. In this model, developers only write code and set up functions, while the infrastructure is handled by the provider. Security focuses on access control, safe coding practices, and monitoring, as traditional server security methods do not…

Container Security

Container security refers to the set of practices and tools designed to protect software containers, which are lightweight, portable units used to run applications. These measures ensure that the applications inside containers are safe from unauthorised access, vulnerabilities, and other threats. Container security covers the whole lifecycle, from building and deploying containers to running and…

Runtime Application Self-Protection (RASP)

Runtime Application Self-Protection (RASP) is a security technology built into an application to monitor and protect it as it runs. RASP works by detecting and blocking attacks in real time from within the application itself. It helps identify threats such as code injection or unauthorised access, often stopping them before they can cause any damage.

Application Whitelisting

Application whitelisting is a security approach where only approved or trusted software programmes are allowed to run on a computer or network. Any application not on the approved list is blocked from executing, which helps prevent unauthorised or malicious software from causing harm. This method is commonly used to strengthen security in environments where strict…

Secure Boot

Secure Boot is a security feature that ensures a device only runs software that is trusted by its manufacturer. When a computer starts up, Secure Boot checks each piece of software, such as the operating system and drivers, against a list of approved signatures. If the software has not been approved or has been tampered…

Byzantine Fault Tolerance

Byzantine Fault Tolerance is a property of computer systems that allows them to keep working correctly even if some parts fail or act unpredictably, including being malicious or sending incorrect information. It is particularly important in distributed systems, where multiple computers or nodes must agree on a decision even if some are unreliable. The term…