-
-
- integer overflow
- Integer overflow is the result of trying to p...
- integrated access management
- Integrated access man...
- integrated access management (IAM)
- Integrate...
- integrity
- Integrity, in terms of data and network security, is the as...
- integrity check-value
- A cryptographic checksum is a mathe...
- intelligent video
- Intelligent video is digital video technolo...
- Interior Gateway Protocol
- An IGP (Interior Gateway Pr...
- internal cloud
- Private cloud (also called internal cloud) is a m...
- International Data Encryption Algorithm
- International Data Encryption Algorithm (IDEA)
- Internet Key Exchange
- The Internet Key Exchange (IKE) is ...
- Internet Key Exchange (IKE)
- The Internet Key Exchan...
- Internet porn
- Internet porn is sexually explicit content made ava...
- Internet Protocol Security
- IPsec (Internet Protocol ...
- Internet Security and Acceleration Server
- intrusion
- Intrusion detection (ID) is a type of security management s...
- intrusion detection
- Intrusion detection (ID) is a type of s...
- intrusion detection (ID)
- Intrusion detection (ID) is a...
- intrusion detection system
- Intrusion detection (ID) ...
- intrusion prevention
- Intrusion prevention is a preemptive ...
- inverse mapping
- Inverse mapping is a procedure used to create a...
- iOS Erase
- iOS Erase is a feature that obliterates everything stored i...
- IP surveillance
- IP surveillance is a digitized and networked ve...
- IPS
- Intrusion prevention is a preemptive approach to network security used ...
- IPsec
- IPsec (Internet Protocol Security) is a framework for a set of prot...
- IPsec (Internet Protocol Security)
- IPsec (In...
- iris recognition
- Iris recognition is a method of identifying p...
- ISA Server
- Microsoft's ISA Server (Internet Security and Acceleratio...
- ISA Server (Internet Security and Acceleration ...
- ISO 27001
- ISO 27001 (formally known as ISO/IEC 27001:2005) is a speci...
- ISO/IEC 38500
- ISO/IEC 38500 is an international standard created ...
- IT ISAC
- IT-ISAC (Information Technology Information Sharing and Analysi...
- IT-ISAC
- IT-ISAC (Information Technology Information Sharing and Analysi...
- IT-ISAC (Information Technology Information Sha...
- IV
- An initialization vector (IV) is an arbitrary number that can be used alo...
- JavaScript hijacking
- JavaScript hijacking is a technique t...
- Kerberos
- Kerberos is a secure method for authenticating a request for ...
- key
- In cryptography, a key is a variable value that is applied using an alg...
- key chain
- A key chain is a series of keys that can be created to help...
- key fob
- A key fob is a type of security token: a small hardware device ...
- key lifetime
- A cryptoperiod (sometimes called a key lifetime or a ...
- key logger
- A keylogger, sometimes called a keystroke logger, key log...
- key string
- A key string is the authentication code included in each ...
- keylogger
- A keylogger, sometimes called a keystroke logger, key logge...
- keylogger (keystroke logger, key logger, or sys...
- keylogging software
- A keylogger, sometimes called a keystro...
- keystroke logger
- A keylogger, sometimes called a keystroke log...
- KnujOn
- KnujOn is an interactive Web-based spam reporting service. Throug...
- Kriz virus
- Discovered in the fall of 1999, the Kriz virus (known mor...
- Kriz virus (W32.Kriz, W32.Kriz.dr, or PE_KRIZ)
- lamb
- In biometric verification, a goat is a system end-user who is refused...
- lean data transfer
- Throttled data transfer, also known as da...
- LEAP
- LEAP (Lightweight Extensible Authentication Protocol) is a Cisco-prop...
- LEAP (Lightweight Extensible Authentication Pro...
- Learning Guide: Spyware
- Why spyware isn't just a home-u...
- lifestyle polygraph
- A lifestyle polygraph is a lie-detector...
- Lightweight Extensible Authentication Protocol
- link encryption
- Link encryption (sometimes called link level or...
- link encryption (link level or link layer encry...
- link layer encryption
- Link encryption (sometimes called l...
- link level
- Link encryption (sometimes called link level or link laye...
- listener
- An event sink, sometimes called a listener, is a piece of cod...
- live capture
- Live capture is the act or method of gathering biomet...
- location poisoning
- URL poisoning, also known as location poi...
- logic bomb
- In a computer program, a logic bomb, also called slag cod...
- logic bomb (slag code)
- In a computer program, a logic bo...
- long ICMP
- On the Internet, ping of death is a denial of service (DoS)...
- LUHN formula
- The LUHN formula, also called modulus 10, is a simple...
- LUHN formula (modulus 10)
- The LUHN formula, also call...
- LUN masking
- LUN masking is a further constraint added to zoning, su...
- magnetic ink character recognition
- MICR (mag...
- malicious software
- Malware (for "malicious software") is any...
- malvertizement
- A malvertizement is malicious coding served throu...
- malware
- Malware (for "malicious software") is any program or file that ...
- malware (malicious software)
- Malware (for "malicio...
- malware throttling
- Throttled data transfer, also known as da...
- man in the middle
- A bucket brigade attack is one in which the...
- man in the middle
- A man-in-the-middle (MitM) attack is an exp...
- man in the middle attack
- A man-in-the-middle (MitM) at...
- man in the middle attack
- A bucket brigade attack is on...
- man in the middle attack (fire brigade attack)
- man-in-the-middle
- A man-in-the-middle (MitM) attack is an exp...
- man-in-the-middle (MitM) attack
- A man-in-the-mi...
- man-in-the-middle attack
- A man-in-the-middle (MitM) at...
- managed file transfer
- What is managed file transfer (MFT)...
- managed file transfer (MFT)
- What is managed file tr...
- managed security service provider
- An MSSP (ma...
- managed security services
- Managed security services (...
- managed security services (MSS)
- Managed securit...
- masquerade
- In general, a masquerade is a disguise.
- Massachusetts data protection law
- What is the...
- MD2
- MD2 is an earlier, 8-bit version of MD5, an algorithm used to verify da...
- MD4
- MD4 is an earlier version of MD5, an algorithm used to verify data inte...
- MD5
- MD5 is an algorithm that is used to verify data integrity through the c...
- meet-in-the-middle attack
- Meet-in-the-middle is a typ...
- Melissa virus
- Melissa is a fast-spreading macro virus that is dis...
- message authentication code
- A cryptographic checksu...
- message integrity code
- A cryptographic checksum is a mat...
- metamorphic malware
- Metamorphic malware is malicious softwa...
- MFA
- Multifactor authentication (MFA) is a security system in which more tha...
- MFT
- What is managed file transfer (MFT)?Managed file transfer (MFT) is a ty...
- MICR
- MICR (magnetic ink character recognition) is a technology used to ver...
- MICR (magnetic ink character recognition)
- Microsoft Antigen
- Microsoft Antigen is a set of programs that...
- Microsoft Management Console
- The Microsoft Managem...
- Microsoft Management Console (MMC)
- The Micro...
- Microsoft Point to Point Encryption
- MPPE (M...
- Microsoft Point-to-Point Encryption
- MPPE (M...
- Microsoft System Center Mobile Device Manager
- Microsoft System Center Mobile Device Manager (...
- MIEL e-Security
- MIEL e-Security is a Mumbai-based organization ...
- minutiae
- In the biometric process of fingerscanning, minutiae are spec...
- mitm
- A man-in-the-middle (MitM) attack is an exploit in which an intruder ...
- MitM
- Active man-in-the-middle (MitM) is an attack method that allows an in...
- MitM attack
- A man-in-the-middle (MitM) attack is an exploit in whic...