Terms related to security management, including definitions about intrusion detection systems (IDS) and words and phrases about asset management, security policies, security monitoring, authorization and authentication.
Browse 0-D - BUF
-
- 0-day - A zero-day exploit is one that takes advantage of a security vulner...
- 802.11x - 802.11x refers to a group of evolving wireless local area netwo...
- AAA - Authentication, authorization, and accounting (AAA) is a framework for ...
- AAA server - An AAA server is a server program that handles user reque...
- AAA server (authentication, authorization, and ...
- Access Control Facility - ACF2 (more formally, CA-ACF2; t...
- access point mapping - War driving, also called access point...
- ACF2 - ACF2 (more formally, CA-ACF2; the ACF stands for Access Control Facil...
- ACF2 or CA-ACF2 (Access Control Facility)
- Active Directory domain (AD domain) - An Acti...
- Active Directory tree (AD tree) - An Active Direc...
- active man in the middle attack - Active man-in-t...
- active man-in-the-middle attack - Active man-in-t...
- active man-in-the-middle attack (MitM)
- AES - The Advanced Encryption Standard (AES) is an encryption algorithm for s...
- AFIS - The Automated Fingerprint Identification System (AFIS) is a biometric...
- AIDC - Automatic Identification and Data Capture (AIDC) is a broad set of te...
- Anna - The Anna Kournikova VBS.SST computer virus, informally known as "Anna...
- Anna Kournikova virus VBS.SST - The Anna Kournikova...
- anti spam cocktail - A spam cocktail (or anti-spam cocktail) i...
- anti-spam cocktail - A spam cocktail (or anti-spam cocktail) i...
- anti-virus software - Antivirus (or "anti-virus") software is...
- Antigen - Sybari's Antigen is antivirus software for Lotus Domino and Mic...
- antivirus software - Antivirus (or "anti-virus") software is a...
- application blacklisting - Application blacklisting, som...
- application whitelisting - Application whitelisting is a...
- asymmetric algorithm - Asymmetric cryptography is cryptograp...
- asymmetric cryptography - Asymmetric cryptography is cryp...
- asymmetric cryptography (public-key cryptography)
- attack vector - An attack vector is a path or means by which a hack...
- audit trail - In accounting, an audit trail is the sequence of paperw...
- authenticate - Authentication is the process of determining whether ...
- authentication - Authentication is the process of determining whet...
- authentication authorization accounting
- authentication authorization accounting
- authentication server - An authentication server is an appl...
- authentication ticket - An authentication ticket, also know...
- authentication ticket or ticket-granting ticket...
- authentication token - A security token (sometimes called an...
- authentication, authorization, and accounting (...
- authorization - Authorization is the process of giving someone perm...
- Automated Fingerprint Identification System
- Automated Fingerprint Identification System (AFIS)
- Automatic Identification and Data Capture
- Automatic Identification and Data Capture (AIDC)
- AV storm - An AV storm is the performance degradation that occurs when a...
- back door - A back door is a means of access to a computer program that...
- Back Orifice - Back Orifice is a rootkit program designed to expose ...
- backdoor - A back door is a means of access to a computer program that b...
- backscatter - Backscatter body scanning is an X-ray-based technology ...
- backscatter body scanning - Backscatter body scanning i...
- backscatting - Backscatter body scanning is an X-ray-based technolog...
- backtracking - Directory traversal is a form of HTTP exploit in whic...
- backup on the Web - Online backup is a method of offsite data s...
- backup with DAT USB - A DAT USB drive is a tape drive with di...
- barnacle - In a computer, a barnacle is unwanted programming, such as ad...
- bastion host - On the Internet, a bastion host is the only host comp...
- Bayesian filter - A Bayesian filter is a program that uses Bayesi...
- BCDR - Business Continuity and Disaster Recovery (BCDR or BC/DR) are closely...
- BCP - A disaster recovery plan (DRP) -- sometimes referred to as a business c...
- beaming - In infrared transmission, beaming is the communication of data ...
- bifurcation - In the biometric process of fingerscanning, a bifurcati...
- BinHex - BinHex is a utility for converting (encoding) Macintosh files int...
- biometric authentication - Biometric verification is any...
- biometric identification - Biometric verification is any...
- biometric payment - Biometric payment is a point of sale techno...
- biometric verification - Biometric verification is any mea...
- BIOS attack - A BIOS attack is an exploit that infects the BIOS with ...
- BIOS rootkit - A BIOS-level rootkit is programming that exists in a ...
- BitLocker - BitLocker is an operating system-level extension to Vista t...
- black hat - Black hat is used to describe a hacker (or, if you prefer, ...
- blended attack - A blended threat is an exploit that combines elem...
- blended exploit - A blended threat is an exploit that combines el...
- blended threat - A blended threat is an exploit that combines elem...
- block cipher - A block cipher is a method of encrypting text (to pro...
- Blowfish - Blowfish is an encryption algorithm that can be used as a rep...
- blue bomb - A "blue bomb" (also known as "WinNuke") is a technique for ...
- blue bomb (WinNuke) - A "blue bomb" (also known as "WinNuke")...
- blue pill rootkit - The blue pill rootkit is malware that execu...
- bluesnarf - Bluesnarfing is the theft of information from a wireless de...
- bluesnarfing - Bluesnarfing is the theft of information from a wirel...
- BO2K - Back Orifice is a rootkit program designed to expose the security def...
- bot - A zombie (also known as a bot) is a computer that a remote attacker has...
- bot network - A zombie army (also known as a botnet) is a number of I...
- bot worm - A bot worm is a self-replicating malware program that resides...
- bot-worm - A bot worm is a self-replicating malware program that resides...
- BotHunter - BotHunter is a type of bot application that looks for other...
- botnet - A zombie army (also known as a botnet) is a number of Internet co...
- botnet (zombie army) - A zombie army (also known as a botnet...
- botworm - A bot worm is a self-replicating malware program that resides i...
- BPCP - A disaster recovery plan (DRP) -- sometimes referred to as a business...
- brain fingerprinting - Brain fingerprinting is a controversi...
- brand spoof - Phishing is an e-mail fraud method in which the perpetr...
- brand spoofing - Phishing is an e-mail fraud method in which the p...
- browser hijacker - A browser hijacker (sometimes called hijackwa...
- browser hijacker (hijackware) - A browser hijacker ...
- brute force - Brute force (also known as brute force cracking) is a t...
- brute force cracking - Brute force (also known as brute forc...
- bucket brigade - A bucket brigade attack is one in which the attac...
- buffer overflow - A buffer overflow occurs when a program or proc...