For more information about the site, see the
Site Index
AAA server (authentication, authorization, and accounting)
phishing
digital signature (electronic signature)
snake oil
security policy
Sender Policy Framework (SPF)
plaintext
steganography
Public-Key Cryptography Standards (PKCS)
OCSP (Online Certificate Status Protocol)
network encryption (network layer or network level encryption)
integrated threat management
Honeynet Project
honeynet
intrusion prevention
IGP (Interior Gateway Protocol)
firewall
Escrowed Encryption Standard (EES)
honey pot (honeypot)
greynet (or graynet)
data splitting
Encrypting File System (EFS)
DMZ (demilitarized zone)
Digital Signature Standard (DSS)
cloaking
cipher
anonymous email
data key
5 terms you need to know before you employ VoIP
capture
Rijndael
directory traversal
Cisco Certified Security Professional (CCSP)
digest authentication
polymorphic malware
single-factor authentication (SFA)
Secure Sockets Layer (SSL)
drive-by pharming
security
trusted computing
network behavior anomaly detection (NBAD)
RavMonE virus (W32/Rjump)
trusted PC
bastion host
spyware
PKI (public key infrastructure)
social engineering
public key
LUHN formula (modulus 10)
hacker
Quiz: Authentication Methods
biometric payment
man in the browser
Total Information Awareness (TIA)
password synchronization
Wired Equivalent Privacy (WEP)
Data Encryption Standard (DES)
Transport Layer Security (TLS)
encryption
brute force cracking
Trojan horse
digital certificate
Crash Course: Spyware
virus
SnortSnarf
ping of death
RFID virus
brain fingerprinting
anonymous Web surfing (Web anonymizer, SafeWeb)
CAPTCHA (Completely Automated Public Turing Test to tell Computers and Humans Apart)
threat modeling
ILOVEYOU virus
registration authority (RA)
ethical worm
block cipher
policy server
physical security
Carnivore
browser hijacker (hijackware)
VLAN hopping (virtual local area network hopping)
Zotob
Firewall Builder (Fwbuilder)
Mytob
worm
dictionary attack
directory harvest attack (DHA)
key string
key chain
electro-optical fingerprint recognition
crimeware
cache poisoning (domain name system poisoning or DNS cache poisoning)
ridge
minutiae
hybrid virus (multi-part or multipartite virus)
Web filter
topsite
chaffing and winnowing
goat
PUP (potentially unwanted program)
Register of Known Spam Operations (ROKSO)
More