• June 04, 2007 04 Jun'07


    A passphrase is a string of characters longer than the usual password (which is typically from four to 16 characters long) that is used in creating a digital signature (an encoded signature that proves to someone that it was really you who sent a ...  Continue Reading

  • June 04, 2007 04 Jun'07

    Joe job

    A Joe job is an e-mail spoofing exploit in which someone sends out huge volumes of spam that appear to be from someone other than the actual source.  Continue Reading

  • June 04, 2007 04 Jun'07

    mail bomb

    A mail bomb is the sending of a massive amount of e-mail to a specific person or system.  Continue Reading

  • June 04, 2007 04 Jun'07


    Munging is the deliberate alteration of an e-mail address on a Web page to hide the address from spambot programs that scour the Internet for e-mail addresses.  Continue Reading

  • June 04, 2007 04 Jun'07

    live capture

    Live capture is the act or method of gathering biometric data from an individual while the individual is physically present.  Continue Reading

  • June 04, 2007 04 Jun'07


    In general, a masquerade is a disguise.  Continue Reading

  • June 04, 2007 04 Jun'07

    logon (or login)

    In general computer usage, logon is the procedure used to get access to an operating system or application, usually in a remote computer.  Continue Reading

  • June 04, 2007 04 Jun'07


    In the study of DNA, footprinting is the method used to identify the nucleic acid sequence that binds with proteins.  Continue Reading

  • June 04, 2007 04 Jun'07

    HDCP (High-bandwidth Digital Content Protection)

    HDCP (High-bandwidth Digital Content Protection) is a specified method from Intel for protecting copyrighted digital entertainment content that uses the Digital Video Interface (DVI) by encrypting its transmission between the video source and the ...  Continue Reading

  • June 04, 2007 04 Jun'07

    IP spoofing (IP address forgery or a host file hijack)

    IP spoofing, also known as IP address forgery, is a hijacking technique in which the attacker masquerades as a trusted host to conceal his identity, hijack browsers, or gain access to a network. The hijacker obtains the IP address of a legitimate ...  Continue Reading

  • June 04, 2007 04 Jun'07

    graphical password or graphical user authentication (GUA)

    A graphical password is an authentication system that works by having the user select from images, in a specific order, presented in a graphical user interface (GUI).  Continue Reading

  • June 04, 2007 04 Jun'07

    identity chaos (password chaos)

    Identity chaos (sometimes called password chaos) is a situation in which users have multiple identities and passwords across a variety of networks, applications, computers and/or computing devices.  Continue Reading

  • June 04, 2007 04 Jun'07

    cache cramming

    Cache cramming is a method of tricking a computer into running Java code it would not ordinarily run.  Continue Reading

  • June 04, 2007 04 Jun'07

    cut-and-paste attack

    A cut-and-paste attack is an assault on the integrity of a security system in which the attacker substitutes a section of ciphertext (encrypted text) with a different section that looks like (but is not the same as) the one removed.  Continue Reading

  • June 04, 2007 04 Jun'07

    cipher block chaining (CBC)

    Cipher block chaining (CBC) is a mode of operation for a block cipher (one in which a sequence of bits are encrypted as a single unit or block with a cipher key applied to the entire block).  Continue Reading

  • June 04, 2007 04 Jun'07

    challenge-response system

    A challenge-response system is a program that replies to an e-mail message from an unknown sender by subjecting the sender to a test (called a CAPTCHA) designed to differentiate humans from automated senders.  Continue Reading

  • June 04, 2007 04 Jun'07

    Cyber Storm

    Cyber Storm is the name of a simulated attack exercise conducted by the U.S. Department of Homeland Security (DHS) February 6-10, 2006 to evaluate whether or not the country could withstand a real attack of similar magnitude...  Continue Reading

  • June 04, 2007 04 Jun'07


    A cracker is someone who breaks into someone else's computer system, often on a network; bypasses passwords or licenses in computer programs; or in other ways intentionally breaches computer security.  Continue Reading

  • June 04, 2007 04 Jun'07

    BioAPI Consortium

    The BioAPI Consortium is a group of over 90 organizations whose goal is to encourage and promote the growth of biometric technology by developing an industry-wide application programming interface (API.) The consortium's API defines how a software ...  Continue Reading

  • June 04, 2007 04 Jun'07

    Automated Fingerprint Identification System (AFIS)

    The Automated Fingerprint Identification System (AFIS) is a biometric identification (ID) methodology that uses digital imaging technology to obtain, store, and analyze fingerprint data.  Continue Reading