STIX (Structured Threat Information eXpression) definition
Google hacking (Google scanning or Engine hacking) definition
cryptology definition
PCI assessment definition
Palladium definition
set definition
anonymous email definition
brain fingerprinting definition
passphrase definition
integrated threat management definition
man in the browser definition
munging definition
Duqu (W32.Duqu) definition
integrated access management (IAM) definition
MICR (magnetic ink character recognition) definition
cable modem definition
trigraph definition
shoulder surfing definition
I-SPY Act — Internet Spyware Prevention Act of 2005 (H.R. 744) definition
snooping definition
van Eck phreaking definition
Total Information Awareness (TIA) definition
Tempest definition
Pwn2Own definition
shadow password file definition
inverse mapping definition
finger vein ID definition
Web application firewall (WAF) definition
network encryption (network layer or network level encryption) definition
mandatory access control (MAC) definition
stack smashing definition
policy server definition
Electronic Code Book (ECB) definition
bridge definition
CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol) definition
Extensible Authentication Protocol (EAP) definition
buffer overflow definition
Register of Known Spam Operations (ROKSO) definition
worm definition
PEAP (Protected Extensible Authentication Protocol) definition
ISSA (Information Systems Security Association) definition
Elk Cloner definition
cyberterrorism definition
crypto definition
stream cipher definition
Automated Clearing House (ACH) definition
Hash-based Message Authentication Code (HMAC) definition
Qualified Security Assessor (QSA) definition
packet monkey definition
key string definition
honey monkey definition
Android WebView definition
information security (infosec) definition
cryptanalysis definition
homomorphic encryption definition
goat definition
voice ID (voice authentication) definition
VeriChip definition
Report on Compliance (ROC) definition
sheepdip (sheep dipping or a footbath) definition
knowledge factor definition
two-step verification definition
logon (or login) definition
mail bomb definition
Patch Tuesday definition
OCSP (Online Certificate Status Protocol) definition
Certificate Revocation List (CRL) definition
information signature definition
cloaking definition
EINSTEIN definition
bastion host definition
knowledge-based authentication (KBA) definition
threat modeling definition
content filtering (information filtering) definition
marketecture (or marchitecture) definition
Zotob definition
NCSA definition
fingernail storage definition
three-factor authentication (3FA) definition
voluntary botnet definition
bring your own apps (BYOA) definition
injectable ID chip (biochip transponder) definition
IGP (Interior Gateway Protocol) definition
advanced persistent threat (APT) definition
zero-day vulnerability definition
identity theft definition
HIPAA business associate definition
trusted computing base (TCB) definition
salt definition
build your own app (BYOA) definition
registration authority (RA) definition
checksum definition
Robert Morris worm definition
one-time pad definition
probe definition
cipher definition
trusted computing definition
fuzz testing (fuzzing) definition
intelligence community definition
Nimda definition


whatis Page
whatis Page 2
whatis Page 3
whatis Page 4
whatis Page 5
whatis Page 6
whatis Page 7
whatis Page 8
whatis Page 9