• May 29, 2007 29 May'07

    snake oil

    In cryptographic and other computer products, snake oil is a negative term used to describe exaggerated claims made by vendors who are overly optimistic or purposely seeking to take advantage of consumers who do not have the expertise to judge a ...  Continue Reading

  • May 29, 2007 29 May'07


    Steganography (pronounced STEHG-uh-NAH-gruhf-ee, from Greek steganos, or "covered," and graphie, or "writing") is the hiding of a secret message within an ordinary message and the extraction of it at its destination.  Continue Reading

  • May 29, 2007 29 May'07

    Public-Key Cryptography Standards (PKCS)

    The Public-Key Cryptography Standards (PKCS) are a set of intervendor standard protocols for making possible secure information exchange on the Internet using a public key infrastructure (PKI).  Continue Reading

  • May 29, 2007 29 May'07

    Sender Policy Framework (SPF)

    Sender Policy Framework (SPF) is an anti-spam approach in which the Internet domain of an e-mail sender can be authenticated for that sender, thereby discouraging spam mailers, who routinely disguise the origin of their e-mail, a practice known as ...  Continue Reading

  • May 29, 2007 29 May'07

    security policy

    In business, a security policy is a document that states in writing how a company plans to protect the company's physical and information technology (IT) assets.  Continue Reading

  • May 29, 2007 29 May'07

    network encryption (network layer or network level encryption)

    Network encryption (sometimes called network layer, or network level encryption) is a network security process that applies crypto services at the network transfer layer - above the data link level, but below the application level.  Continue Reading

  • May 29, 2007 29 May'07

    OCSP (Online Certificate Status Protocol)

    OCSP (Online Certificate Status Protocol) is one of two common schemes for maintaining the security of a server and other network resources.  Continue Reading

  • May 29, 2007 29 May'07

    intrusion prevention

    Intrusion prevention is a preemptive approach to network security used to identify potential threats and respond to them swiftly.  Continue Reading

  • May 29, 2007 29 May'07

    greynet (or graynet)

    Greynet is a term for the use of unauthorized applications on a corporate network. A greynet application is a network-based program that corporate network users download and install without permission from their company's IT department.  Continue Reading

  • May 29, 2007 29 May'07

    Escrowed Encryption Standard (EES)

    The Escrowed Encryption Standard (EES) is a standard for encrypted communications that was approved by the U.S. Department of Commerce in 1994 and is better known by the name of an implementation called the Clipper chip.  Continue Reading

  • May 29, 2007 29 May'07

    IGP (Interior Gateway Protocol)

    An IGP (Interior Gateway Protocol) is a protocol for exchanging routing information between gateways (hosts with routers) within an autonomous network (for example, a system of corporate local area networks).  Continue Reading

  • May 29, 2007 29 May'07

    integrated threat management

    Integrated threat management is a comprehensive approach to network security that addresses multiple types of malware, as well as blended threats and spam, and protects from intrusion at both the gateway and the endpoint levels... (Continued)  Continue Reading

  • May 29, 2007 29 May'07

    Honeynet Project

    The Honeynet Project is a non-profit volunteer organization dedicated to computer security research and information sharing.  Continue Reading

  • May 29, 2007 29 May'07


    A honeynet is a network set up with intentional vulnerabilities; its purpose is to invite attack, so that an attacker's activities and methods can be studied and that information used to increase network security.  Continue Reading

  • May 29, 2007 29 May'07

    Digital Signature Standard (DSS)

    Digital Signature Standard (DSS) is the digital signature algorithm(DSA) developed by the U.S. National Security Agency (NSA) to generate a digital signature for the authenticationof electronic documents.  Continue Reading

  • May 29, 2007 29 May'07

    Encrypting File System (EFS)

    The Encrypting File System (EFS) is a feature of the Windows 2000 operating system that lets any file or folder be stored in encrypted form and decrypted only by an individual user and an authorized recovery agent.  Continue Reading

  • May 29, 2007 29 May'07

    data splitting

    Data splitting is an approach to protecting sensitive data from unauthorized access by encrypting the data and storing different portions of a file on different servers.  Continue Reading

  • May 29, 2007 29 May'07

    data key

    In cryptography, a data key is a key (a variable value that is applied to a string or block of text to encrypt or decrypt it) that is used to encrypt or decrypt data only and is not used to encrypt or decrypt other keys, as some encryption formulas ...  Continue Reading

  • May 29, 2007 29 May'07


    Cloaking is the masking of the sender's name and address in an e-mail note or distribution.  Continue Reading

  • May 29, 2007 29 May'07

    anonymous email

    Anonymous e-mail is e-mail that has been directed to a recipient through a third-party server that does not identify the originator of the message.  Continue Reading