• May 29, 2007 29 May'07

    security policy

    In business, a security policy is a document that states in writing how a company plans to protect the company's physical and information technology (IT) assets.  Continue Reading

  • May 29, 2007 29 May'07

    snake oil

    In cryptographic and other computer products, snake oil is a negative term used to describe exaggerated claims made by vendors who are overly optimistic or purposely seeking to take advantage of consumers who do not have the expertise to judge a ...  Continue Reading

  • May 29, 2007 29 May'07

    Sender Policy Framework (SPF)

    Sender Policy Framework (SPF) is an anti-spam approach in which the Internet domain of an e-mail sender can be authenticated for that sender, thereby discouraging spam mailers, who routinely disguise the origin of their e-mail, a practice known as ...  Continue Reading

  • May 29, 2007 29 May'07

    network encryption (network layer or network level encryption)

    Network encryption (sometimes called network layer, or network level encryption) is a network security process that applies crypto services at the network transfer layer - above the data link level, but below the application level.  Continue Reading

  • May 29, 2007 29 May'07

    OCSP (Online Certificate Status Protocol)

    OCSP (Online Certificate Status Protocol) is one of two common schemes for maintaining the security of a server and other network resources.  Continue Reading

  • May 29, 2007 29 May'07


    In cryptography, plaintext is ordinary readable text before being encrypted into ciphertext or after being decrypted.  Continue Reading

  • May 29, 2007 29 May'07

    integrated threat management

    Integrated threat management is a comprehensive approach to network security that addresses multiple types of malware, as well as blended threats and spam, and protects from intrusion at both the gateway and the endpoint levels... (Continued)  Continue Reading

  • May 29, 2007 29 May'07

    Escrowed Encryption Standard (EES)

    The Escrowed Encryption Standard (EES) is a standard for encrypted communications that was approved by the U.S. Department of Commerce in 1994 and is better known by the name of an implementation called the Clipper chip.  Continue Reading

  • May 29, 2007 29 May'07

    greynet (or graynet)

    Greynet is a term for the use of unauthorized applications on a corporate network. A greynet application is a network-based program that corporate network users download and install without permission from their company's IT department.  Continue Reading

  • May 29, 2007 29 May'07

    Honeynet Project

    The Honeynet Project is a non-profit volunteer organization dedicated to computer security research and information sharing.  Continue Reading