-
-
- remote access Trojan
- A remote access Trojan (RAT) is a mal...
- Remote Authentication Dial In User Service
- Remote Authentication Dial-In User Service
- remote deposit capture
- Remote deposit capture (RDC) is a...
- remote deposit capture (RDC)
- Remote deposit captur...
- Resource Access Control Facility
- RACF (Resourc...
- Resource Access Control Facility (RACF)
- reverse DNS
- Reverse DNS (rDNS) is a method of resolving an IP addre...
- reverse DNS (rDNS)
- Reverse DNS (rDNS) is a method of resolvi...
- RIA
- A rich Internet application (RIA) is a Web application designed to deli...
- Rich Internet Application
- A rich Internet application...
- Rich Internet Application (RIA)
- A rich Internet...
- RID
- In Windows 2000, the relative identifier (RID) is the part of a securit...
- ridge
- In the biometric process of fingerscanning, a ridge is a curved lin...
- rights
- In the administration of a multi-user computer system, a privileg...
- Rijndael
- Rijndael (pronounced rain-dahl) is the algorithm that has bee...
- RIPA
- RIPA (Regulation of Investigatory Powers Act) is a law enacted in the...
- risk-based authentication (RBA)
- Risk-based auth...
- Rivest Shamir Adleman
- RSA is an Internet encryption and a...
- Rivest-Shamir-Adleman
- RSA is an Internet encryption and a...
- ROKSO
- The Register of Known Spam Operations (ROKSO) is a list of over 500...
- role based access control
- Role-based access control (...
- role-based access control
- Role-based access control (...
- role-based access control (RBAC)
- Role-based ac...
- rootkit
- A rootkit is a collection of tools (programs) that enables admi...
- rootkits
- A rootkit is a collection of tools (programs) that enables ad...
- roving analysis port
- Port mirroring, also known as a rovin...
- RSA algorithm
- RSA is an Internet encryption and authentication sy...
- RSA algorithm (Rivest-Shamir-Adleman)
- RSA...
- rule base
- In the context of a computer server acting as a firewall, a...
- S HTTP
- S-HTTP (Secure HTTP) is an extension to the Hypertext Transfer Pr...
- S-HTTP
- S-HTTP (Secure HTTP) is an extension to the Hypertext Transfer Pr...
- S-HTTP (Secure HTTP)
- S-HTTP (Secure HTTP) is an extension ...
- S.773
- The Cybersecurity Enhancement Act of 2009 (S.773) is United States ...
- S773
- The Cybersecurity Enhancement Act of 2009 (S.773) is United States le...
- SaaS
- Security-as-a-service (SaaS) is an outsourcing model for security man...
- SafeSquid
- SafeSquid is an HTTP 1.1 content filtering proxy server.
- salt
- In password protection, salt is a random string of data used to modif...
- SAML
- SAML (Security Assertion Markup Language) is an Extensible Markup Lan...
- SAML (Security Assertion Markup Language)
- SB-1386
- In the United States, the California Security Breach Informatio...
- scareware
- Scareware is a type of malware designed to trick victims in...
- screened subnet
- A screened subnet (also known as a 'triple-home...
- screened subnet (triple-homed firewall)
- script kiddie
- Script kiddy (sometimes spelled kiddie) is a deroga...
- script kiddy
- Script kiddy (sometimes spelled kiddie) is a derogati...
- script kiddy (or script kiddie)
- Script kiddy (s...
- SDDL
- Security Descriptor Definition Language (SDDL) is a formal way to spe...
- search engine hacking
- Google hacking is the use of a sear...
- seat management
- Seat management is a method of coordinating all...
- secret key
- In cryptography, a private or secret key is an encryption...
- secret key algorithm
- A secret key algorithm (sometimes cal...
- secret key algorithm (symmetric algorithm)
- Secure Electronic Transaction
- Secure Electronic T...
- Secure Electronic Transaction (SET)
- Secure ...
- Secure HTTP
- S-HTTP (Secure HTTP) is an extension to the Hypertext T...
- Secure Shell
- Secure Shell (SSH), sometimes known as Secure Socket ...
- Secure Shell (SSH)
- Secure Shell (SSH), sometimes known as Se...
- Secure Socket Shell
- Secure Shell (SSH), sometimes known as ...
- Secure Sockets Layer
- SSL (Secure Sockets Layer) is a commo...
- Secure Sockets Layer (SSL)
- SSL (Secure Sockets Layer...
- Security as a Service
- Security-as-a-service (SaaS) is an ...
- Security as a Service (SaaS)
- Security-as-a-service...
- Security Assertion Markup Language
- SAML (Sec...
- security audit
- A security audit is a systematic evaluation of th...
- security certification
- The Certified Information Systems...
- security clearance
- A security clearance is an authorization ...
- Security Descriptor Definition Language
- Security Descriptor Definition Language (SDDL)
- security event (security incident)
- A securit...
- security ID
- In Windows NT and 2000 operating systems, the security ...
- security identifier
- In Windows NT and 2000 operating system...
- security identifier (SID)
- In Windows NT and 2000 oper...
- security information management
- Security inform...
- security information management (SIM)
- Sec...
- Security Learning Guides
- We've gathered a collection o...
- security policy
- In business, a security policy is a document th...
- Security Quizzes
- We've gathered a collection of our quizzes on...
- security token
- A security token (sometimes called an authenticat...
- security token (authentication token)
- A s...
- Sender ID
- Sender ID is Microsoft's proposed e-mail sender authenticat...
- sender permitted from
- Sender Policy Framework (SPF) is an...
- Sender Policy Framework
- Sender Policy Framework (SPF) i...
- Sender Policy Framework (SPF)
- Sender Policy Frame...
- Serious Organized Crime Agency
- The Serious Organ...
- Serious Organized Crime Agency (SOCA)
- The...
- server accelerator card
- A server accelerator card (also...
- server accelerator card (SSL card)
- A server ...
- session hijacking
- Session hijacking, also known as TCP sessio...
- session hijacking (TCP session hijacking)
- session ID
- A session ID is a unique number that a Web site's server ...
- Session Initiation Protocol trunking
- Sessi...
- session key
- A session key is an encryption and decryption key that ...
- session prediction
- Session prediction, also called credentia...
- session prediction (credential/session prediction)
- session replay
- Session replay is a scheme a cracker uses to masq...
- SET
- Secure Electronic Transaction (SET) is a system for ensuring the securi...
- SFA
- Single-factor authentication (SFA) is the traditional security process ...