Similar to ハードウェア・セキュリティ・モジュール

Endpoint Detection and Response
Endpoint detection and response
Endpoint Protection Platform

Enhanced Mitigation Experience Toolkit
Enhanced Mitigation Experience Toolkit
Google Authenticator
Google Authenticator
I-PIN
I-PIN
ISO/IEC JTC 1/SC 27
ISO/IEC JTC 1/SC 27
Jamf
Jamf
Kon-Boot
Kon-Boot
Metasploit
Metasploit
Microsoft Update
Windows Update
Microsoft Update カタログ
Microsoft Update Catalog
MISP
MISP Threat Sharing
NXビット
NX bit
Pika Zip

Quad9
Quad9
SecBoK

Secure computing mode
Seccomp
SecuRec

Setuid
Setuid
Spectre
Spectre (security vulnerability)
Structured threat information expression

Traffic Light Protocol
Traffic Light Protocol
USB Killer
USB killer
User and Entity Behavior Analytics
User behavior analytics悪意あるメイド攻撃
Evil maid attack
アクティブディフェンス
Active defense
ASEAN-CBP

アドレス空間配置のランダム化
Address space layout randomization