Trojan horse definition
firewall definition
smurfing definition
Wired Equivalent Privacy (WEP) definition
differential power analysis (DPA) definition
signature file definition
privilege creep definition
advanced evasion technique (AET) definition
cybercrime definition
pharming definition
VLAN hopping (virtual local area network?hopping) definition
virus hoax definition
adware definition
cache cramming definition
CHAP (Challenge-Handshake Authentication Protocol) definition
macro virus definition
machine authentication definition
lawful interception (LI) definition
proxy firewall definition
security policy definition
security information management (SIM) definition
security information and event management (SIEM) definition
security clearance definition
cookie poisoning definition
cold boot attack definition
barnacle definition
security token (authentication token) definition
authentication definition
micro VM (micro virtual machine) definition
minutiae definition
honey pot (honeypot) definition
Electronic Signatures in Global and National Commerce Act (e-signature bill) definition
network behavior anomaly detection (NBAD) definition
network behavior analysis (NBA) definition
possession factor definition
soft token definition
Content Scrambling System (CSS) definition
International Information Systems Security Certification Consortium (ISC)2 definition
Shellshock definition
Antigen definition
MD4 definition
MD2 definition
password hardening definition
next-generation firewall (NGFW) definition
Kerberos definition
wildcard certificate definition
spyware definition
server accelerator card (SSL card) definition
user account provisioning definition
phreak definition
live capture definition
meet-in-the-middle attack definition
MD5 definition
out-of-band authentication definition
data breach definition
link encryption (link level or link layer encryption) definition
lifestyle polygraph definition
ciphertext feedback (CFB) definition
Open Source Hardening Project definition
globbing definition
CAPTCHA (Completely Automated Public Turing Test to tell Computers and Humans Apart) definition
ethical worm definition
Chameleon Card definition
bogie (bogey) definition
Electrohippies Collective definition
electro-optical fingerprint recognition definition
single sign-on (SSO) definition
SSL VPN (Secure Sockets Layer virtual private network) definition
SSL checker (secure socket layer checker) definition
SSL certificate (Secure Sockets Layer certificate) definition
brute force cracking definition
alternate data stream (ADS) definition
PUP (potentially unwanted program) definition
identity management (ID management) definition
deniable encryption definition
defense in depth definition
decipher definition
distributed denial-of-service attack (DDoS) definition
data splitting definition
DSO exploit (data source object exploit) definition
data masking definition
data key definition
secret key algorithm (symmetric algorithm) definition
LEAP (Lightweight Extensible Authentication Protocol) definition
Firewall Builder (Fwbuilder) definition
Bring Your Own Authentication (BYOA) definition
biometrics definition
security definition
International Data Encryption Algorithm (IDEA) definition
war dialer definition
WAPI (WLAN Authentication and Privacy Infrastructure) definition
zero-day exploit definition
principle of least privilege (POLP) definition
RADIUS (Remote Authentication Dial-In User Service) definition
key chain definition
key definition
false rejection (type I error) definition
CALEA (Communications Assistance for Law Enforcement Act) definition
Regin malware definition
metamorphic and polymorphic malware definition
whatis Page
whatis Page 2
whatis Page 3
whatis Page 4
whatis Page 5
whatis Page 6
whatis Page 7
whatis Page 8
whatis Page 9