For more information about the site, see the
Site Index
shoulder surfing
injectable ID chip (biochip transponder)
dumpster diving
logic bomb (slag code)
DSO exploit (data source object exploit)
Elk Cloner
stealth virus
cocooning
P versus NP (polynomial versus nondeterministic polynomial)
Quiz: Who Done IT? A Murder Mystery
blended threat
Chameleon Card
false acceptance (type II error)
two-factor authentication
false rejection (type I error)
fingerscanning (fingerprint scanning)
Antigen
elliptical curve cryptography (ECC)
key fob
security token (authentication token)
pseudonymous profile
trusted computing base (TCB)
Klez
VeriChip
deniable encryption
Nimda
CRAM (challenge-response authentication mechanism)
network forensics
Palladium
Information Awareness Office (IAO)
cryptographic checksum
information signature
lawful interception (LI)
whack-a-mole
MICR (magnetic ink character recognition)
P3P (Platform for Privacy Preferences)
counterfeit detector pen
exploit
voiceprint
inverse mapping
MPPE (Microsoft Point-to-Point Encryption)
DomainKeys
ultrasound
stealth
trigraph
Faraday cage
link encryption (link level or link layer encryption)
IT-ISAC (Information Technology Information Sharing and Analysis Center)
bypass
voice ID (voice authentication)
SYN flooding
walled garden
in the wild
Chernobyl virus
vulnerability disclosure
cryptoperiod (key lifetime or a validity period)
ciphertext feedback (CFB)
output feedback (OFB)
MD2
MD4
MD5
decipher
server accelerator card (SSL card)
Electronic Code Book (ECB)
bogie (bogey)
crypto
secret key algorithm (symmetric algorithm)
conditional access (CA)
stream cipher
antivirus software
DOS (Disk Operating System)
Pretty Good Privacy (PGP)
Automated Clearing House (ACH)
set
Electronic Signatures in Global and National Commerce Act (e-signature bill)
quantum cryptography
journaling file system
key
security identifier (SID)
copyright
RSA algorithm (Rivest-Shamir-Adleman)
sandbox
bridge
smart card
cryptology
access log
session key
cryptanalysis
incident response
globbing
stack smashing
Bugbear
Secure Shell (SSH)
fingernail storage
Blowfish
signature file
Quiz: Cryptography
Content Scrambling System (CSS)
macro virus
non-disclosure agreement (NDA)
More