For more information about the site, see the
Site Index
phishing
digital signature (electronic signature)
steganography
Public-Key Cryptography Standards (PKCS)
plaintext
snake oil
security policy
Sender Policy Framework (SPF)
OCSP (Online Certificate Status Protocol)
network encryption (network layer or network level encryption)
greynet (or graynet)
Escrowed Encryption Standard (EES)
firewall
IGP (Interior Gateway Protocol)
intrusion prevention
honey pot (honeypot)
Honeynet Project
honeynet
integrated threat management
Digital Signature Standard (DSS)
Encrypting File System (EFS)
DMZ (demilitarized zone)
data splitting
cloaking
anonymous email
cipher
data key
5 terms you need to know before you employ VoIP
capture
Rijndael
directory traversal
Cisco Certified Security Professional (CCSP)
digest authentication
polymorphic malware
single-factor authentication (SFA)
Secure Sockets Layer (SSL)
drive-by pharming
security
trusted computing
network behavior anomaly detection (NBAD)
RavMonE virus (W32/Rjump)
trusted PC
bastion host
spyware
PKI (public key infrastructure)
social engineering
public key
LUHN formula (modulus 10)
hacker
Quiz: Authentication Methods
biometric payment
COBIT (Control Objectives for Information and Related Technology)
man in the browser
Total Information Awareness (TIA)
password synchronization
Wired Equivalent Privacy (WEP)
Data Encryption Standard (DES)
Transport Layer Security (TLS)
encryption
brute force cracking
Trojan horse
digital certificate
Crash Course: Spyware
virus
SnortSnarf
ping of death
RFID virus
brain fingerprinting
anonymous Web surfing (Web anonymizer, SafeWeb)
CAPTCHA (Completely Automated Public Turing Test to tell Computers and Humans Apart)
threat modeling
ILOVEYOU virus
registration authority (RA)
ethical worm
block cipher
policy server
physical security
Carnivore
browser hijacker (hijackware)
VLAN hopping (virtual local area network hopping)
Zotob
Firewall Builder (Fwbuilder)
Mytob
worm
dictionary attack
directory harvest attack (DHA)
key string
key chain
electro-optical fingerprint recognition
crimeware
cache poisoning (domain name system poisoning or DNS cache poisoning)
ridge
minutiae
hybrid virus (multi-part or multipartite virus)
Web filter
topsite
chaffing and winnowing
goat
PUP (potentially unwanted program)
Register of Known Spam Operations (ROKSO)
More