-
-
- Terminal Access Controller Access Control System
- TGT
- An authentication ticket, also known as a ticket-granting ticket (TGT),...
- The Computer Fraud and Abuse Act
- The Computer ...
- the Indian Computer Emergency Response Team
- threat modeling
- Threat modeling is a procedure for optimizing n...
- throttled data transfer
- Throttled data transfer, also k...
- TIA
- Total Information Awareness (TIA) is the name of a massive U.S. data mi...
- ticket-granting ticket
- An authentication ticket, also kn...
- tiger team
- In the computer industry, a tiger team is a group of prog...
- TLS
- Transport Layer Security (TLS) is a protocol that ensures privacy betwe...
- token
- In general, a token is an object that represents something else, su...
- tokenization
- Tokenization is the process of replacing sensitive da...
- topsite
- A topsite is a stringently protected underground FTP server at ...
- Total Information Awareness
- Total Information Aware...
- Total Information Awareness (TIA)
- Total Infor...
- Transport Layer Security
- Transport Layer Security (TLS...
- Transport Layer Security (TLS)
- Transport Layer S...
- trap door
- A back door is a means of access to a computer program that...
- trapdoor
- A back door is a means of access to a computer program that b...
- trigraph
- A trigraph is a three-character replacement for a special or ...
- triple homed firewall
- A screened subnet (also known as a ...
- triple-homed firewall
- A screened subnet (also known as a ...
- Trojan
- In computers, a Trojan horse is a program in which malicious or h...
- Trojan horse
- In computers, a Trojan horse is a program in which ma...
- trusted computing base
- The trusted computing base (TCB) ...
- trusted computing base (TCB)
- The trusted computing...
- Trusted Computing Group
- The Trusted Computing Group (TC...
- Trusted Computing Group (TCG)
- The Trusted Computi...
- tunnel
- Tunneling is the transmission of data intended for use only withi...
- tunneling or port forwarding
- Tunneling is the tran...
- Turtle Firewall
- Turtle Firewall is an open source firewall prog...
- two-factor authentication
- Two-factor authentication i...
- two-way authentication
- Mutual authentication, also calle...
- Twofish
- Twofish is an encryption algorithm based on an earlier algorith...
- type I error
- False rejection, also called a type I error, is a mis...
- type II error
- False acceptance, also called a type II error, is a...
- universal authentication
- Universal authentication is a...
- Uptime Institute, Inc.
- The Uptime Institute, Inc. is a c...
- URL manipulation
- URL manipulation, also called URL rewriting, ...
- URL manipulation (URL rewriting)
- URL manipulat...
- URL poisoning
- URL poisoning, also known as location poisoning, is...
- URL poisoning (location poisoning)
- URL poiso...
- URL rewriting
- URL manipulation, also called URL rewriting, is the...
- user account provisioning
- User account provisioning i...
- user profile
- In a Windows environment, a user profile is a record ...
- user-interface redressing
- Clickjacking (also known as...
- validity period
- A cryptoperiod (sometimes called a key lifetime...
- vam
- SPIT (spam over Internet telephony), sometimes known as vam (voice or V...
- van Eck phreaking
- Van Eck phreaking is a form of eavesdroppin...
- vascular ID
- Finger vein ID is a biometric authentication system tha...
- VBR
- Vouch By Reference (VBR) is a protocol for adding third-party certifica...
- VBS.SST
- The Anna Kournikova VBS.SST computer virus, informally known as...
- virtual honeynet
- A honeynet is a network set up with intention...
- virtual local area network�hopping
- VLAN hopp...
- virtual machine escape
- What is virtual machine escape?Vi...
- virtual private cloud
- A virtual private cloud (VPC) is a ...
- virtual private network appliance
- A VPN (virt...
- virus hoax
- A virus hoax is a false warning about a computer virus.
- virus throttling
- Throttled data transfer, also known as data t...
- VLAN hopping
- VLAN hopping (virtual local area network hopping) is ...
- VLAN hopping (virtual local area network hopping)
- voice logger
- A voice logger is a device or program used to record ...
- Voice over IP Security Alliance
- VOIPSA (Voice o...
- Voice Over Misconfigured Internet Telephones
- voice spam
- SPIT (spam over Internet telephony), sometimes known as v...
- voiceprint
- A voiceprint is a set of measurable characteristics of a ...
- VoIP security threats
- As VoIP becomes increasingly preval...
- VoIP spam
- SPIT (spam over Internet telephony), sometimes known as vam...
- VOIPSA
- VOIPSA (Voice over IP Security Alliance) is a cross-industry coal...
- VOIPSA (Voice over IP Security Alliance)
- vomit
- Vomit (spelled all lower-case) is a Unix software utility that take...
- Vouch by Reference
- Vouch By Reference (VBR) is a protocol fo...
- Vouch by Reference (VBR)
- Vouch By Reference (VBR) is a...
- VPN appliance
- A VPN (virtual private network) appliance is a netw...
- VPN Reconnect
- VPN Reconnect is a feature of Windows 7 and Windows...
- vulnerability and patch management
- Vulnerabi...
- vulnerability disclosure
- Vulnerability disclosure is t...
- Vulnerability Discovery and Remediation
- W32 Rjump
- The RavMonE virus, also known as W32/Rjump, is a virus that...
- W32.Kriz
- Discovered in the fall of 1999, the Kriz virus (known more fo...
- W32.Kriz virus
- Discovered in the fall of 1999, the Kriz virus (k...
- W32.Kriz.dr
- Discovered in the fall of 1999, the Kriz virus (known m...
- W32/Rjump
- The RavMonE virus, also known as W32/Rjump, is a virus that...
- WAFS
- Wide-area file services (WAFS) is a storage technology that makes it ...
- war dialer
- A war dialer is a computer program used to identify the p...
- war dialing
- A war dialer is a computer program used to identify the...
- war driving
- War driving, also called access point mapping, is the a...
- war driving (access point mapping)
- War drivi...
- wardriving
- War driving, also called access point mapping, is the act...
- watermark
- Steganography (pronounced STEHG-uh-NAH-gruhf-ee, from Greek...
- weak password
- A strong password is one that is designed to be har...
- Web Services Trust Language
- Web Services Trust Lang...
- Web Services Trust Language (WS-Trust)
- WEP
- Wired Equivalent Privacy (WEP) is a security protocol, specified in the...
- What is spyware?
- In general, spyware is any technology that ai...
- white hat
- White hat describes a hacker (or, if you prefer, cracker) w...
- Wi Fi
- Wi-Fi is the popular term for a high-frequency wireless local area ...
- Wi Fi Protected Access
- Wi-Fi Protected Access (WPA) is t...