multifactor authentication (MFA) definition
Quiz: Cryptography definition
privileged identity management (PIM) definition
biometric authentication definition
micro-botnet (mini-botnet or baby botnet) definition
evil maid attack definition
privilege escalation attack definition
honeynet definition
Echelon definition
extrusion prevention definition
Shared Key Authentication (SKA) definition
anonymous Web surfing (Web anonymizer, SafeWeb) definition
virus definition
FERPA (Family Educational Rights and Privacy Act of 1974) definition
identity chaos (password chaos) definition
message authentication code (MAC) definition
elliptical curve cryptography (ECC) definition
madware definition
Internet Key Exchange (IKE) definition
journaling file system definition
authentication server definition
RSA algorithm (Rivest-Shamir-Adleman) definition
cyberextortion definition
Cyber Storm definition
X.509 certificate definition
Federal Information Security Management Act (FISMA) definition
password definition
Microsoft Schannel (Microsoft Secure Channel) definition
BioAPI Consortium definition
man-in-the-middle attack (MitM) definition
access log definition
snake oil definition
TACACS (Terminal Access Controller Access Control System) definition
Malware: Glossary definition
claims-based identity definition
P versus NP (polynomial versus nondeterministic polynomial) definition
National Security Agency (NSA) definition
topsite definition
Data Encryption Standard (DES) definition
network forensics definition
TAN (transaction authentication number) definition
cypherpunk definition
cyberstalking definition
whack-a-mole definition
PCI DSS User Group definition
PCI DSS 3.0 definition
United States Secret Service (USSS) definition
two-factor authentication (2FA) definition
PCI DSS 2.0 definition
evil twin definition
AAA server (authentication, authorization, and accounting) definition
conditional access (CA) definition
COBIT definition
CRAM (challenge-response authentication mechanism) definition
LUHN formula (modulus 10) definition
Malicious Computer Code: Glossary definition
malvertisement (malicious advertisement or malvertising) definition
Sender Policy Framework (SPF) definition
SYN flood (half open attack) definition
antivirus software definition
HDCP (High-bandwidth Digital Content Protection) definition
ethical hacker definition
cache poisoning (domain name system poisoning or DNS cache poisoning) definition
Heartbleed definition
Operation Phish Phry definition
ping of death definition
Duo Security definition
Diffie-Hellman key exchange (exponential key exchange) definition
physical security definition
CISO (chief information security officer) definition
PKI (public key infrastructure) definition
Chernobyl virus definition
trusted PC definition
Verizon VERIS (Vocabulary for Event Recording and Incident Sharing) Framework definition
ridge definition
Secure Sockets Layer (SSL) definition
address space layout randomization (ASLR) definition
DMZ (demilitarized zone) definition
deperimeterization definition
Crash Course: Spyware definition
access control definition
spam trap definition
phishing definition
Secure Shell (SSH) definition
signature analysis definition
encryption definition
voiceprint definition
PA-DSS (Payment Application Data Security Standard) definition
hacker definition
CSR (Certificate Signing Request) definition
Zeus Trojan (Zbot) definition
key fob definition
onboarding and offboarding definition
Kraken definition
typeprint analysis definition
Twofish definition
mutual authentication definition
IT-ISAC (Information Technology Information Sharing and Analysis Center) definition
intrusion prevention definition
IP spoofing (IP address forgery or a host file hijack) definition


whatis Page
whatis Page 2
whatis Page 3
whatis Page 4
whatis Page 5
whatis Page 6
whatis Page 7
whatis Page 8
whatis Page 9