phlashing definition
email spoofing definition
risk-based authentication (RBA) definition
computer forensics (cyber forensics) definition
POODLE (Padding Oracle On Downgraded Legacy Encryption) definition
polymorphic malware definition
JavaScript hijacking definition
single-factor token definition
cryptographic checksum definition
Common Weakness Enumeration (CWE) definition
TDL-4 (TDSS or Alureon) definition
spam cocktail (or anti-spam cocktail) definition
talking Trojan definition
whaling definition
smart card definition
snoop server definition
session replay definition
session key definition
RAT (remote access Trojan) definition
ultrasound definition
parameter tampering definition
PCI QSA definition
PCI policy definition
Google Project Zero definition
in the wild definition
tokenization definition
unique identifier (UID) definition
Google Authenticator definition
federated identity management (FIM) definition
authentication factor definition
Pretty Good Privacy (PGP) definition
FIDO (Fast Identity Online) definition
BYOI (bring your own identity) definition
vandal definition
P3P (Platform for Privacy Preferences) definition
MPPE (Microsoft Point-to-Point Encryption) definition
HSPD-7 (Homeland Security Presidential Directive No. 7) definition
spoof definition
nonce (number used once or number once) definition
CSO (Chief Security Officer) definition
Kaptoxa definition
Mytob definition
jolt definition
role-based access control (RBAC) definition
Rock Phish definition
Certified Information Systems Security Professional (CISSP) definition
executable definition
fingerscanning (fingerprint scanning) definition
memory-scraping malware definition
PCI Security Standards Council definition
digital certificate definition
USGCB (United States Government Configuration Baseline) definition
one-time password token (OTP token) definition
one-time password (OTP) definition
Public-Key Cryptography Standards (PKCS) definition
public key certificate definition
public key definition
pseudonymous profile definition
DOS (Disk Operating System) definition
domain generation algorithm (DGA) definition
cut-and-paste attack definition
inherence factor definition
national identity card definition
cardholder data (CD) definition
antispoofing definition
insider threat definition
ILOVEYOU virus definition
government Trojan definition
domain rotation definition
Microsoft FIM (Microsoft Forefront Identity Manager) definition
Microsoft Enhanced Mitigation Experience Toolkit (EMET) definition
user profile definition
challenge-response system definition
non-disclosure agreement (NDA) definition
Certified Information Systems Auditor (CISA) definition
certified information security manager (CISM) definition
BotHunter definition
bot worm definition
botnet (zombie army) definition
Blowfish definition
block cipher definition
blended threat definition
black hat definition
biometric payment definition
biometric verification definition
bifurcation definition
sandbox definition
cryptoperiod (key lifetime or a validity period) definition
Kermit definition
dictionary attack definition
directory harvest attack (DHA) definition
Defense Message System (DMS) definition
walled garden definition
Security as a Service (SaaS) definition
Same Origin Policy (SOP) definition
Cisco Certified Security Professional (CCSP) definition
Carnivore definition
cipher block chaining (CBC) definition
promiscuous mode definition
chaffing and winnowing definition

whatis Page
whatis Page 2
whatis Page 3
whatis Page 4
whatis Page 5
whatis Page 6
whatis Page 7
whatis Page 8
whatis Page 9