-
-
- MMC
- The Microsoft Management Console (MMC) is an application that provides ...
- mobile phone spam
- SMS spam (sometimes called cell phone spam)...
- mobile security (wireless security)
- Mobile ...
- Modes of Attack
- Test yourself. A WhatIs.com tech vocabulary qui...
- modification detection code
- A cryptographic checksu...
- modulus 10
- The LUHN formula, also called modulus 10, is a simple alg...
- MPPE
- MPPE (Microsoft Point-to-Point Encryption) is a method of encrypting ...
- MPPE (Microsoft Point-to-Point Encryption)
- MSCMDM
- Microsoft System Center Mobile Device Manager (MSCMDM) is server-...
- MSS
- Managed security services (MSS) is a systematic approach to managing an...
- MSSP
- An MSSP (managed security service provider) is an Internet service pr...
- MSSP (managed security service provider)
- multi part virus
- A hybrid virus (sometimes called a multi-part...
- multi-part virus
- A hybrid virus (sometimes called a multi-part...
- multifactor authentication
- Multifactor authenticatio...
- multifactor authentication (MFA)
- Multifactor a...
- multipartite virus
- A hybrid virus (sometimes called a multi-...
- mutual authentication
- Mutual authentication, also called ...
- Mytob
- Mytob is a worm used by hackers to gather personal and financial in...
- NAC
- Network access control (NAC), also called network admission control, is...
- National Computer Security Center
- The Nationa...
- National Computer Security Center (NCSC)
- national ID card
- A national identity card is a portable docume...
- national identity card
- A national identity card is a por...
- NBA
- Network behavior analysis (NBA) is a method of enhancing the security o...
- NBAD
- Network behavior anomaly detection (NBAD) is the continuous monitorin...
- NBAR
- Network Based Application Recognition (NBAR) is a mechanism that clas...
- NBAR (Network Based Application Recognition)
- NCSC
- The National Computer Security Center (NCSC) is a U.S. government org...
- Near Field Communication
- Near Field Communication (NFC...
- Near Field Communication (NFC)
- Near Field Commun...
- netstat
- Netstat is a common command line TCP/IP networking utility avai...
- network access control
- Network access control (NAC), als...
- network access control (NAC)
- Network access contro...
- network analyzer
- A network analyzer is a combination of hardwa...
- network analyzer (protocol analyzer or packet a...
- Network Based Application Recognition
- Net...
- network behavior analysis
- Network behavior analysis (...
- network behavior analysis (NBA)
- Network behavio...
- network behavior anomaly detection
- Network b...
- network behavior anomaly detection (NBAD)
- network encryption
- Network encryption (sometimes called netw...
- network encryption (network layer or network le...
- network forensics
- Network forensics is the capture, recording...
- network intrusion detection system
- Host intr...
- network intrusion detection systems
- Host in...
- network layer
- Network encryption (sometimes called network layer,...
- network level encryption
- Network encryption (sometimes...
- network perimeter
- A network perimeter is the boundary between...
- network scanning
- Network scanning is a procedure for identifyi...
- NFAT
- An infinite sequence is a list or string of discrete objects, usually...
- NFC
- Near Field Communication (NFC) is a short-range wireless connectivity s...
- NIDS
- Host intrusion detection systems (HIDS) and network intrusion detecti...
- Nimda
- First appearing on September 18, 2001, Nimda is a computer virus th...
- non-repudiation
- Nonrepudiation is the assurance that someone ca...
- nonce
- A nonce, in information technology, is a number generated for a spe...
- nonce (number used once or number once)
- nonrepudiation
- Nonrepudiation is the assurance that someone cann...
- nuking
- A "blue bomb" (also known as "WinNuke") is a technique for causin...
- number once
- A nonce, in information technology, is a number generat...
- number used once
- A nonce, in information technology, is a numb...
- OCSP
- OCSP (Online Certificate Status Protocol) is one of two common scheme...
- OCSP (Online Certificate Status Protocol)
- OFB
- In cryptography, output feedback (OFB) is a mode of operation for a blo...
- offensive security
- Offensive security is a proactive and ant...
- one-time pad
- In cryptography, a one-time pad is a system in which ...
- OneID
- OneID is a digital identity management service that provides a repo...
- Online Certificate Security Protocol
- OCSP ...
- Online Certificate Status Protocol
- OCSP (Onl...
- Open Source Hardening Project
- The Open Source Har...
- Open System Authentication
- Open System Authenticatio...
- Open System Authentication (OSA)
- Open System A...
- Open Web Application Security Project Top Ten
- OSA
- Open System Authentication (OSA) is a process by which a computer can g...
- output feedback
- In cryptography, output feedback (OFB) is a mod...
- output feedback (OFB)
- In cryptography, output feedback (O...
- OWASP Top Ten
- The OWASP Top Ten is a list of the 10 most dangerou...
- ownership tag
- An ownership tag is a security feature on Compaq co...
- P and NP
- P versus NP (polynomial versus nondeterministic polynomial) r...
- P equals NP
- P versus NP (polynomial versus nondeterministic polynom...
- P versus NP
- P versus NP (polynomial versus nondeterministic polynom...
- P versus NP (polynomial versus nondeterministic...
- packet analyzer
- A network analyzer is a combination of hardware...
- packet monkey
- On the Internet, a packet monkey is someone (see cr...
- Palladium
- Palladium is a plan from Intel, AMD, and Microsoft to build...
- pass phrase
- A passphrase is a string of characters longer than the ...
- passive FTP
- Passive FTP (sometimes referred to as PASV FTP because ...
- passive reconnaissance
- Passive reconnaissance is an atte...
- passphrase
- A passphrase is a string of characters longer than the us...
- password
- A password is an unspaced sequence of characters used to dete...
- password chaos
- Identity chaos (sometimes called password chaos) ...
- password cracker
- A password cracker is an application program ...
- password cracking
- A password cracker is an application progra...
- password hardening
- Password hardening is any one of a variet...
- password synchronization
- Password synchronization is a...
- PASV FTP
- Passive FTP (sometimes referred to as PASV FTP because it inv...
- PAT
- Port Address Translation (PAT), is an extension to network address tran...
- PE_KRIZ
- Discovered in the fall of 1999, the Kriz virus (known more form...
- PEAP
- PEAP (Protected Extensible Authentication Protocol) is a version of E...
- PEAP (Protected Extensible Authentication Proto...