For more information about the site, see the
Site Index
HIDS/NIDS (host intrusion detection systems and network intrusion detection systems)
data encryption/decryption IC
biometrics
Class C2
principle of least privilege (POLP)
marketecture (or marchitecture)
nonce (number used once or number once)
nonrepudiation
honey monkey
evil twin
phlashing
asymmetric cryptography (public-key cryptography)
password hardening
keystroke dynamics
biometric verification
CSO (Chief Security Officer)
DNS rebinding attack
Kraken
Open Source Hardening Project
finger vein ID
extrusion prevention
role mining
screened subnet (triple-homed firewall)
talking Trojan
BotHunter
Patch Tuesday
Diffie-Hellman key exchange (exponential key exchange)
Rock Phish
authentication server
sheepdip (sheep dipping or a footbath)
JavaScript hijacking
defense in depth
Malware: Glossary
Malicious Computer Code: Glossary
buffer overflow
white hat
snoop server
smurfing
war dialer
snooping
pharming
phreak
packet monkey
man in the middle attack (fire brigade attack)
Electrohippies Collective
hacktivism
gray hat (or grey hat)
ethical hacker
Echelon
hijacking
Google hacking (Google scanning or Engine hacking)
cyberstalking
cypherpunk
cookie poisoning
black hat
back door
van Eck phreaking
TACACS (Terminal Access Controller Access Control System)
user profile
spam trap
spoof
spam cocktail (or anti-spam cocktail)
public key certificate
shadow password file
session replay
private key (secret key)
promiscuous mode
salt
RADIUS (Remote Authentication Dial-In User Service)
password
NCSA
passphrase
masquerade
mail bomb
logon (or login)
Kerberos
Joe job
munging
live capture
HDCP (High-bandwidth Digital Content Protection)
federated identity management (FIM)
graphical password or graphical user authentication (GUA)
identity chaos (password chaos)
footprinting
IP spoofing (IP address forgery or a host file hijack)
Cyber Storm
cipher block chaining (CBC)
challenge-response system
cache cramming
cut-and-paste attack
certificate authority (CA)
authentication
email spoofing
Certified Information Systems Security Professional (CISSP)
cracker
Certificate Revocation List (CRL)
Automated Fingerprint Identification System (AFIS)
bifurcation
BioAPI Consortium
AAA server (authentication, authorization, and accounting)
More