-
-
- DSS
- Digital Signature Standard (DSS) is the digital signature algorithm(DSA...
- DTN
- A disruption-tolerant network (DTN) is a network designed so that tempo...
- due diligence
- Due diligence is the process of systematically rese...
- dumb
- A dumb network is one that provides the physical interconnection betw...
- dumb network
- A dumb network is one that provides the physical inte...
- dump site
- A topsite is a stringently protected underground FTP server...
- dynamic packet filter
- A dynamic packet filter is a firewa...
- e-mail forgery
- E-mail spoofing is the forgery of an e-mail heade...
- e-signature
- A digital signature (not to be confused with a digital ...
- eavesdropping
- Eavesdropping is the unauthorized real-time interce...
- ECB
- Electronic Code Book (ECB) is a mode of operation for a block cipher, w...
- ECC
- Elliptical curve cryptography (ECC) is a public key encryption techniqu...
- Echelon
- Echelon is an officially unacknowledged U.S.-led global spy net...
- EES
- The Escrowed Encryption Standard (EES) is a standard for encrypted comm...
- EFS
- The Encrypting File System (EFS) is a feature of the Windows 2000 opera...
- egress filtering
- Egress filtering is a process in which outbou...
- Electrohippies Collective
- The Electrohippies Collecti...
- Electronic Code Book
- Electronic Code Book (ECB) is a mode ...
- Electronic Code Book (ECB)
- Electronic Code Book (ECB...
- electronic signature
- A digital signature (not to be confus...
- Elk Cloner
- Elk Cloner was the first computer virus known to have spr...
- elliptical curve cryptography
- Elliptical curve cr...
- elliptical curve cryptography (ECC)
- Ellipti...
- email spoofing
- E-mail spoofing is the forgery of an e-mail heade...
- emanation monitoring
- Tempest was the name of a classified ...
- EMR-shielding
- Tempest was the name of a classified (secret) U.S. ...
- encoding
- Encoding is the process of putting a sequence of characters (...
- encoding and decoding
- Encoding is the process of putting ...
- encoding/decoding
- Encoding is the process of putting a sequen...
- encrypt
- Encryption is the conversion of data into a form, called a ciph...
- Encrypting File System
- The Encrypting File System (EFS) ...
- Encrypting File System (EFS)
- The Encrypting File S...
- encryption
- Encryption is the conversion of data into a form, called ...
- encryption key management
- Encryption key management i...
- endpoint fingerprinting
- Endpoint fingerprinting is a fe...
- endpoint security
- Endpoint security is an approach to network...
- endpoint security management
- Endpoint security man...
- Engine hacking
- Google hacking is the use of a search engine, suc...
- enterprise wipe
- Enterprise wipe is a security feature offered b...
- Escrowed Encryption Standard
- The Escrowed Encrypti...
- Escrowed Encryption Standard (EES)
- The Escro...
- ESP
- Event stream processing (ESP) is a software capacity designed to suppor...
- ethical hacker
- An ethical hacker is a computer and network exper...
- ethical hacking
- An ethical hacker is a computer and network exp...
- ethical worm
- An ethical worm is a program that automates network-b...
- event
- An event, in a computing context, is any identifiable occurrence th...
- event handling
- Event handling is the receipt of an event at some...
- event sink
- An event sink, sometimes called a listener, is a piece of...
- event sink (listener)
- An event sink, sometimes called a l...
- event stream processing
- Event stream processing (ESP) i...
- event stream processing (ESP)
- Event stream proces...
- evil twin
- In security, an evil twin is a home-made wireless access po...
- exploit
- In computing, an exploit is an attack on a computer system, esp...
- exponential key exchange
- Diffie-Hellman key exchange, ...
- extrusion prevention
- Extrusion prevention is the practice ...
- facial recognition
- Facial recognition (or face recognition) ...
- false acceptance
- False acceptance, also called a type II error...
- false acceptance (type II error)
- False accepta...
- false rejection
- False rejection, also called a type I error, is...
- false rejection (type I error)
- False rejection, ...
- false rejection rate
- False rejection, also called a type I...
- FAR
- False acceptance, also called a type II error, is a mistake occasionall...
- Faraday cage
- A Faraday cage is a metallic enclosure that prevents ...
- fast flux DNS
- Fast flux DNS is a technique that a cybercriminal c...
- fault-management configuration accounting perfo...
- FCAPS
- FCAPS (fault-management, configuration, accounting, performance, an...
- FCAPS (fault-management, configuration, account...
- FDE
- What is full-disk encryption (FDE)?Full-disk encryption (FDE) is encryp...
- Federal Financial Institutions Examination Council
- FFIEC compliance
- FFIEC compliance is conformance to a set of s...
- FFIEC compliance (Federal Financial Institution...
- FH-CDMA
- Frequency hopping is one of two basic modulation techniques use...
- finger image
- Fingerscanning, also called fingerprint scanning, is ...
- finger vein ID
- Finger vein ID is a biometric authentication syst...
- fingernail storage
- Fingernail storage is a method of writing...
- fingerprint scanning
- Fingerscanning, also called fingerpri...
- fingerscanning
- Fingerscanning, also called fingerprint scanning,...
- fingerscanning (fingerprint scanning)
- Fin...
- FIPS PUB 197
- The Advanced Encryption Standard (AES) is an encrypti...
- fire brigade attack
- A bucket brigade attack is one in which...
- fire fighting
- Firefighting is an emergency allocation of resource...
- firefighting
- Firefighting is an emergency allocation of resources,...
- Firesheep
- Firesheep is a Firefox plug-in that automates session hijac...
- Firestarter
- Firestarter is an open source firewall program for pers...
- firewall
- A firewall is a set of related programs, located at a network...
- Firewall Builder
- Firewall Builder, also called Fwbuilder, is a...
- Firewall Builder (Fwbuilder)
- Firewall Builder, als...
- first computer virus
- Elk Cloner was the first computer vir...
- Five Steps to Incident Management in a Virtuali...
- Flexible Mandatory Access Control
- Flexible Ma...
- Flexible Mandatory Access Control (FMAC)
- flow routing
- Flow routing is a network routing technology that tak...
- FMAC
- Flexible Mandatory Access Control (FMAC) is an ongoing project intend...
- footbath
- In computers, a sheepdip (or, variously, sheep dipping or a f...
- footprinting
- In the study of DNA, footprinting is the method used ...
- forensic
- Forensic, in a general sense, means "related to or used in co...
- frequency-hopping spread spectrum
- Frequency h...
- full disk encryption
- What is full-disk encryption (FDE)?Fu...
- full-disk encryption
- What is full-disk encryption (FDE)?Fu...
- full-disk encryption (FDE)
- What is full-disk encrypt...