• SYN flood (half open attack)

    SYN flooding is a method that the user of a hostile client program can use to conduct a denial-of-service (DoS) attack on a computer server.

  • digital certificate

    A digital certificate is an electronic "passport" that allows a person, computer or organization to exchange information securely over the Internet using the public key infrastructure (PKI). A digi...

  • COBIT

    COBIT  is a framework for developing, implementing, monitoring and improving information technology (IT) governance and management practices.

  • computer forensics (cyber forensics)

    Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a cou...

Security Resources

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • decipher

    All three terms - decipher, decrypt, and decode - mean to convert ciphertext into the original, unencrypted plaintext. 

  • server accelerator card (SSL card)

    A server accelerator card (also known as an SSL card) is a Peripheral Component Interconnect (PCI) card used to generate encryption keys for secure transactions on e-commerce Web sites. 

  • Electronic Code Book (ECB)

    Electronic Code Book (ECB) is a mode of operation for a block cipher, with the characteristic that each possible block of plaintext has a defined corresponding ciphertext value and vice versa. 

  • bogie (bogey)

    The term bogie, also spelled bogey, refers to a false blip on a radar display. 

  • secret key algorithm (symmetric algorithm)

    A secret key algorithm (sometimes called a symmetric algorithm) is a cryptographic algorithm that uses the same key to encrypt and decrypt data. 

  • crypto

    Depending on its usage, crypto can be a short form for cryptography or for encryption. 

  • conditional access (CA)

    Conditional access (CA) is a technology used to control access to digital television (DTV) services to authorized users by encrypting the transmitted programming. 

  • stream cipher

    A stream cipher is a method of encrypting text (to produce ciphertext) in which a cryptographic key and algorithm are applied to each binary digit in a data stream, one bit at a time. 

  • antivirus software

    Antivirus (or "anti-virus") software is a class of program that searches your hard drive and floppy disks for any known or potential viruses. 

  • DOS (Disk Operating System)

    DOS (Disk Operating System) was the first widely-installed operating system for personal computers.