For more information about the site, see the
Site Index
hybrid virus/worm
HIDS/NIDS (host intrusion detection systems and network intrusion detection systems)
data encryption/decryption IC
biometrics
Class C2
principle of least privilege (POLP)
marketecture (or marchitecture)
nonce (number used once or number once)
nonrepudiation
honey monkey
evil twin
phlashing
asymmetric cryptography (public-key cryptography)
password hardening
keystroke dynamics
biometric verification
CSO (Chief Security Officer)
DNS rebinding attack
Kraken
Open Source Hardening Project
finger vein ID
extrusion prevention
role mining
screened subnet (triple-homed firewall)
talking Trojan
BotHunter
Patch Tuesday
Diffie-Hellman key exchange (exponential key exchange)
Rock Phish
authentication server
sheepdip (sheep dipping or a footbath)
JavaScript hijacking
defense in depth
Malware: Glossary
Malicious Computer Code: Glossary
buffer overflow
white hat
snoop server
war dialer
smurfing
snooping
phreak
pharming
packet monkey
Electrohippies Collective
hijacking
man in the middle attack (fire brigade attack)
hacktivism
gray hat (or grey hat)
Echelon
Google hacking (Google scanning or Engine hacking)
ethical hacker
cypherpunk
cyberstalking
cookie poisoning
black hat
back door
van Eck phreaking
spam trap
user profile
spoof
TACACS (Terminal Access Controller Access Control System)
public key certificate
promiscuous mode
salt
RADIUS (Remote Authentication Dial-In User Service)
shadow password file
private key (secret key)
spam cocktail (or anti-spam cocktail)
session replay
password
passphrase
NCSA
masquerade
logon (or login)
Kerberos
mail bomb
live capture
Joe job
munging
footprinting
identity chaos (password chaos)
federated identity management (FIM)
HDCP (High-bandwidth Digital Content Protection)
IP spoofing (IP address forgery or a host file hijack)
graphical password or graphical user authentication (GUA)
cut-and-paste attack
cipher block chaining (CBC)
certificate authority (CA)
challenge-response system
cache cramming
Cyber Storm
authentication
email spoofing
cracker
Certificate Revocation List (CRL)
Certified Information Systems Security Professional (CISSP)
Automated Fingerprint Identification System (AFIS)
bifurcation
BioAPI Consortium
More