• SYN flood (half open attack)

    SYN flooding is a method that the user of a hostile client program can use to conduct a denial-of-service (DoS) attack on a computer server.

  • digital certificate

    A digital certificate is an electronic "passport" that allows a person, computer or organization to exchange information securely over the Internet using the public key infrastructure (PKI). A digi...

  • COBIT

    COBIT  is a framework for developing, implementing, monitoring and improving information technology (IT) governance and management practices.

  • computer forensics (cyber forensics)

    Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a cou...

Security Resources

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • gray hat (or grey hat)

    Gray hat describes a cracker (or, if you prefer, hacker) who exploits a security weakness in a computer system or product in order to bring the weakness to the attention of the owners. 

  • Echelon

    Echelon is an officially unacknowledged U.S.-led global spy network that operates an automated system for the interception and relay of electronic communications. 

  • cookie poisoning

    On the Web, cookie poisoning is the modification of a cookie (personal information in a Web user's computer) by an attacker to gain unauthorized information about the user for purposes such as identity theft. 

  • cyberstalking

    Cyberstalking is a crime in which the attacker harasses a victim using electronic communication, such as e-mail or instant messaging (IM), or messages posted to a Web site or a discussion group. 

  • cypherpunk

    Cypherpunk, a term that appeared in Eric Hughes' "A Cypherpunk's Manifesto" in 1993, combines the ideas of cyberpunk, the spirit of individualism in cyberspace, with the use of strong encryption (ciphertext is encrypted text) to preserve privacy. 

  • black hat

    Black hat is used to describe a hacker (or, if you prefer, cracker) who breaks into a computer system or network with malicious intent. 

  • back door

    A back door is a means of access to a computer program that bypasses security mechanisms. 

  • van Eck phreaking

    Van Eck phreaking is a form of eavesdropping in which special equipment is used to pick up telecommunication signals or data within a computer device by monitoring and picking up the electromagnetic fields (EM fields) that are produced by the signals... 

  • spam trap

    A spam trap is the inclusion of an option in an online form that is preselected by default with the expectation that the user will fail to notice the option. 

  • spoof

    Spoof was a game involving trickery and nonsense that was invented by an English comedian, Arthur Roberts, prior to 1884, when it is recorded as having been "revived.