For more information about the site, see the
Site Index
COBIT
cold boot attack
privilege creep
evil maid attack
distributed denial-of-service attack (DDoS)
Federal Information Security Management Act (FISMA)
computer forensics (cyber forensics)
multifactor authentication (MFA)
security information and event management (SIEM)
attack vector
Zeus Trojan (Zbot)
memory-scraping malware
differential power analysis (DPA)
typeprint analysis
role-based access control (RBAC)
PCI DSS 12 requirements
PCI DSS 2.0
PCI DSS User Group
PCI Security Standards Council
PCI assessment
PCI QSA
PA-DSS (Payment Application Data Security Standard)
PCI policy
botnet (zombie army)
Tilded platform
Duqu (W32.Duqu)
homomorphic encryption
voluntary botnet
TDL-4 (TDSS or Alureon)
application blacklisting
application whitelisting
barnacle
malvertisement (malicious advertisement or malvertising)
tokenization
spear phishing
Common Weakness Enumeration (CWE)
Advanced Encryption Standard (AES)
Twofish
content filtering (information filtering)
Quiz: Malware
differential power analysis (DPA)2
parameter tampering
authentication, authorization, and accounting (AAA)
backscatter body scanning
wildcard certificate
privilege escalation attack
advanced persistent threat (APT)
domain rotation
user account provisioning
Certified Information Systems Auditor (CISA)
cybercrime
advanced evasion technique (AET)
metamorphic and polymorphic malware
Pwn2Own
alternate data stream (ADS)
endpoint fingerprinting
bot worm
insider threat
Security as a Service (SaaS)
identity access management (IAM) system
zero-day exploit
single sign-on (SSO)
HIPAA business associate
Qualified Security Assessor (QSA)
Report on Compliance (ROC)
cyberwarfare
cyberterrorism
cyberextortion
data breach
I-SPY Act -- Internet Spyware Prevention Act of 2005 (H.R. 744)
intelligence community
Fortezza
Defense Message System (DMS)
lifestyle polygraph
HSPD-7 (Homeland Security Presidential Directive No. 7)
CALEA (Communications Assistance for Law Enforcement Act)
National Security Agency (NSA)
national identity card
National Computer Security Center (NCSC)
Tempest
security clearance
government Trojan
EINSTEIN
fuzz testing (fuzzing)
Same Origin Policy (SOP)
meet-in-the-middle attack
onboarding and offboarding
Operation Phish Phry
pulsing zombie
micro-botnet (mini-botnet or baby botnet)
data masking
RAT (remote access Trojan)
security information management (SIM)
deperimeterization
FERPA (Family Educational Rights and Privacy Act of 1974)
identity theft
Internet Key Exchange (IKE)
knowledge-based authentication (KBA)
SSL VPN (Secure Sockets Layer virtual private network)
network behavior analysis (NBA)
More