security information management
network behavior anomaly detection
OWASP
application security
personally identifiable information
deperimeterization
FERPA
lawful interception
CAPTCHA
honey pot
malware
Honeynet Project
goat
hacker
hacktivism
HDCP
greynet
Federated Identity Management
footprinting
firewall
false acceptance
false rejection
BIOS attack
Faraday cage
gray hat
graphical password
shoulder surfing
Interior Gateway Protocol
Elk Cloner
elliptical curve cryptography
cyberterrorism
digital signature
Electronic Signatures in Global and National Commerce Act
in the wild
Electrohippies Collective
Unified Threat Management
identity theft
Payment Card Industry Data Security Standard
Data Encryption Standard
DSO exploit
role mining
email spoofing
Electronic Code Book
Echelon
Escrowed Encryption Standard
directory traversal
encryption
PUP
deniable encryption
Internet Key Exchange
P3P
conditional access
data splitting
content filtering
cloaking
cocooning
cipher
Class C2
challenge-response system
Chameleon Card
knowledge-based authentication
cookie poisoning
copyright
checksum
capture
Carnivore
cable modem
cache cramming
Transport Layer Security
SSL VPN
certificate authority
Certificate Revocation List
Certified Information Systems Security Professional
chaffing and winnowing
CRAM
cipher block chaining
back door
Anna Kournikova virus
antivirus software
Antigen
Automated Clearing House
authentication, authorization and accounting
access log
AAA server
barnacle
backscatter body scanning
Automated Fingerprint Identification System
bridge
bogie
disaster recovery plan
brain fingerprinting
black hat
blended threat
block cipher
Blowfish
Back Orifice
bifurcation
BioAPI Consortium
biometric verification
biometrics
whatis Page
whatis Page 2
whatis Page 3
whatis Page 4
whatis Page 5
whatis Page 6
whatis Page 7
whatis Page 8
whatis Page 9