For more information about the site, see the
Site Index
injectable ID chip (biochip transponder)
shoulder surfing
dumpster diving
logic bomb (slag code)
DSO exploit (data source object exploit)
stealth virus
Elk Cloner
cocooning
P versus NP (polynomial versus nondeterministic polynomial)
Quiz: Who Done IT? A Murder Mystery
blended threat
Chameleon Card
false acceptance (type II error)
fingerscanning (fingerprint scanning)
two-factor authentication
false rejection (type I error)
Antigen
key fob
elliptical curve cryptography (ECC)
security token (authentication token)
pseudonymous profile
trusted computing base (TCB)
Klez
VeriChip
deniable encryption
Nimda
CRAM (challenge-response authentication mechanism)
network forensics
Palladium
Information Awareness Office (IAO)
cryptographic checksum
information signature
lawful interception (LI)
whack-a-mole
MICR (magnetic ink character recognition)
P3P (Platform for Privacy Preferences)
counterfeit detector pen
exploit
voiceprint
inverse mapping
MPPE (Microsoft Point-to-Point Encryption)
DomainKeys
ultrasound
stealth
trigraph
Faraday cage
link encryption (link level or link layer encryption)
IT-ISAC (Information Technology Information Sharing and Analysis Center)
bypass
voice ID (voice authentication)
SYN flooding
walled garden
in the wild
Chernobyl virus
vulnerability disclosure
cryptoperiod (key lifetime or a validity period)
ciphertext feedback (CFB)
output feedback (OFB)
MD4
MD5
MD2
decipher
server accelerator card (SSL card)
Electronic Code Book (ECB)
bogie (bogey)
secret key algorithm (symmetric algorithm)
crypto
conditional access (CA)
stream cipher
antivirus software
DOS (Disk Operating System)
Pretty Good Privacy (PGP)
Automated Clearing House (ACH)
set
Electronic Signatures in Global and National Commerce Act (e-signature bill)
quantum cryptography
journaling file system
key
security identifier (SID)
copyright
RSA algorithm (Rivest-Shamir-Adleman)
sandbox
bridge
smart card
cryptology
access log
session key
cryptanalysis
incident response
globbing
stack smashing
Bugbear
Secure Shell (SSH)
fingernail storage
Blowfish
signature file
Quiz: Cryptography
Content Scrambling System (CSS)
non-disclosure agreement (NDA)
macro virus
More