-
-
- public key
- In cryptography, a public key is a value provided by some...
- public key certificate
- A public key certificate is a dig...
- public key cryptography
- Asymmetric cryptography is cryp...
- Public Key Cryptography Standards
- The Public-...
- public key infrastructure
- A PKI (public key infrastru...
- public-key cryptography
- Asymmetric cryptography is cryp...
- Public-Key Cryptography Standards
- The Public-...
- Public-Key Cryptography Standards (PKCS)
- pulsing zombie
- A pulsing zombie is a computer whose security has...
- PUP
- A PUP (potentially unwanted program) is a program that may be unwanted,...
- PUP (potentially unwanted program)
- A PUP (po...
- Pwn2Own
- Pwn2Own is an annual hacking competition sponsored by security ...
- quantum cryptography
- Quantum cryptography uses our current...
- Quiz: Authentication Methods
- There are quite a few...
- Quiz: Cryptography
- OK, boys and girls! Do you have your secr...
- Quiz: Cryptography answer key
- Test yourself. A Wh...
- Quiz: Firewalls
- A quiz about firewalls: A server that acts as t...
- Quiz: Mobile Device Security -- Who else can he...
- Quiz: Security Awareness for End Users
- RACF
- RACF (Resource Access Control Facility) is the IBM security managemen...
- RADIUS
- Remote Authentication Dial-In User Service (RADIUS) is a client/s...
- RADIUS (Remote Authentication Dial-In User Serv...
- RAF
- A risk assessment framework (RAF) is a strategy for prioritizing and sh...
- RAT
- A remote access Trojan (RAT) is a malware program that gives an intrude...
- RAT (remote access Trojan)
- A remote access Trojan (R...
- RavMonE virus
- The RavMonE virus, also known as W32/Rjump, is a vi...
- RavMonE virus (W32/Rjump)
- The RavMonE virus, also kno...
- raw device mapping
- Raw device mapping (RDM) is an option in ...
- raw device mapping (RDM)
- Raw device mapping (RDM) is a...
- RDM
- Raw device mapping (RDM) is an option in the VMware server virtualizati...
- rDNS
- Reverse DNS (rDNS) is a method of resolving an IP address into a doma...
- real time location system
- A real-time location system...
- real-time location system
- A real-time location system...
- real-time location system (RTLS)
- A real-time l...
- Red Flags Rule
- The Red Flags Rule (RFR) is a set of United State...
- Red Flags Rule (RFR)
- The Red Flags Rule (RFR) is a set of ...
- red team
- An ethical hacker is a computer and network expert who attack...
- red teaming
- An ethical hacker is a computer and network expert who ...
- redact
- To redact is to edit, or prepare for publishing.
- redacted
- To redact is to edit, or prepare for publishing.
- redacting
- To redact is to edit, or prepare for publishing.
- redaction
- To redact is to edit, or prepare for publishing.
- Register of Known Spam Operations
- The Registe...
- Register of Known Spam Operations (ROKSO)
- Regulation of Investigatory Powers Act
- Regulation of Investigatory Powers Act (RIPA)
- relative ID
- In Windows 2000, the relative identifier (RID) is the p...
- relative identifier
- In Windows 2000, the relative identifie...
- relative identifier (RID)
- In Windows 2000, the relati...
- remote access Trojan
- A remote access Trojan (RAT) is a mal...
- Remote Authentication Dial In User Service
- Remote Authentication Dial-In User Service
- remote backup
- Online backup is a method of offsite data storage i...
- remote wipe
- Remote wipe is the removal of data from a computer or m...
- Report on Compliance
- A Report on Compliance (ROC) is a for...
- Report on Compliance (ROC)
- A Report on Compliance (R...
- Resource Access Control Facility
- RACF (Resourc...
- Resource Access Control Facility (RACF)
- reverse DNS
- Reverse DNS (rDNS) is a method of resolving an IP addre...
- reverse DNS (rDNS)
- Reverse DNS (rDNS) is a method of resolvi...
- RFID hacking
- An RFID (radio-frequency identification) virus is mal...
- RFID virus
- An RFID (radio-frequency identification) virus is malicio...
- RFR
- The Red Flags Rule (RFR) is a set of United States federal regulations ...
- RID
- In Windows 2000, the relative identifier (RID) is the part of a securit...
- ridge
- In the biometric process of fingerscanning, a ridge is a curved lin...
- rights
- In the administration of a multi-user computer system, a privileg...
- Rijndael
- Rijndael (pronounced rain-dahl) is the algorithm that has bee...
- RIPA
- RIPA (Regulation of Investigatory Powers Act) is a law enacted in the...
- risk analysis
- Risk analysis is the process of defining and analyz...
- risk assessment framework
- A risk assessment framework...
- risk assessment framework (RAF)
- A risk assessme...
- Rivest Shamir Adleman
- RSA is an Internet encryption and a...
- Rivest-Shamir-Adleman
- RSA is an Internet encryption and a...
- ROC
- A Report on Compliance (ROC) is a form that must be completed by all Le...
- ROKSO
- The Register of Known Spam Operations (ROKSO) is a list of over 500...
- role based access control
- Role-based access control (...
- role mining
- Role mining is the process of analyzing user-to-resourc...
- role-based access control
- Role-based access control (...
- role-based access control (RBAC)
- Role-based ac...
- rootkit
- A rootkit is a collection of tools (programs) that enables admi...
- rootkits
- A rootkit is a collection of tools (programs) that enables ad...
- ROT-13
- ROT-13 is the encrypting of a message by exchanging each of the l...
- roving analysis port
- Port mirroring, also known as a rovin...
- RSA algorithm
- RSA is an Internet encryption and authentication sy...
- RSA algorithm (Rivest-Shamir-Adleman)
- RSA...
- RTLS
- A real-time location system (RTLS) is one of a number of technologies...
- S HTTP
- S-HTTP (Secure HTTP) is an extension to the Hypertext Transfer Pr...
- S-HTTP
- S-HTTP (Secure HTTP) is an extension to the Hypertext Transfer Pr...
- S-HTTP (Secure HTTP)
- S-HTTP (Secure HTTP) is an extension ...
- S.773
- The Cybersecurity Enhancement Act of 2009 (S.773) is United States ...
- S773
- The Cybersecurity Enhancement Act of 2009 (S.773) is United States le...
- SaaS
- Security-as-a-service (SaaS) is an outsourcing model for security man...
- salt
- In password protection, salt is a random string of data used to modif...
- SAM
- The Security Accounts Manager (SAM) is a database in the Windows operat...
- Same Origin Policy
- The Same Origin Policy (SOP), also called...
- Same Origin Policy (SOP)
- The Same Origin Policy (SOP),...
- SAML
- SAML (Security Assertion Markup Language) is an Extensible Markup Lan...
- SAML (Security Assertion Markup Language)
- SAR
- A Suspicious Activity Report (SAR) is a document that financial institu...
- SB-1386
- In the United States, the California Security Breach Informatio...
- scareware
- Scareware is a type of malware designed to trick victims in...