-
-
- spam blog
- A splog (spam blog) is a fake blog created solely to promot...
- spam cocktail
- A spam cocktail (or anti-spam cocktail) is the use ...
- spam cocktail (or anti-spam cocktail)
- A s...
- spam over Internet telephony
- SPIT (spam over Inter...
- spear phishing
- Spear phishing is an e-mail spoofing fraud attemp...
- spear-phishing
- Spear phishing is an e-mail spoofing fraud attemp...
- spearphishing
- Spear phishing is an e-mail spoofing fraud attempt ...
- Specific Biometric Techniques: Glossary
- SPF
- Sender Policy Framework (SPF) is an anti-spam approach in which the Int...
- spim
- Spim is spam delivered through instant messaging (IM) instead of thro...
- spim (instant messaging spam)
- Spim is spam delive...
- SPIT
- SPIT (spam over Internet telephony), sometimes known as vam (voice or...
- SPIT (spam over Internet telephony)
- SPIT (s...
- splog
- A splog (spam blog) is a fake blog created solely to promote affili...
- splog (spam blog)
- A splog (spam blog) is a fake blog created ...
- splogger
- A splog (spam blog) is a fake blog created solely to promote ...
- spoof
- Spoof was a game involving trickery and nonsense that was invented ...
- spoofing
- E-mail spoofing is the forgery of an e-mail header so that th...
- SSAE 16
- SSAE 16, also called Statement on Standards for Attestation Eng...
- SSH
- Secure Shell (SSH), sometimes known as Secure Socket Shell, is a UNIX-b...
- SSL card
- A server accelerator card (also known as an SSL card) is a Pe...
- SSL VPN
- An SSL VPN (Secure Sockets Layer virtual private network) is a ...
- SSL VPN (Secure Sockets Layer virtual private n...
- SSO
- Single sign-on (SSO)is a session/user authentication process that permi...
- SST virus
- The Anna Kournikova VBS.SST computer virus, informally know...
- stack smashing
- Stack smashing is causing a stack in a computer a...
- STAR
- The Security, Trust and Assurance Registry (STAR) is an online regist...
- stateful inspection
- Stateful inspection is a firewall techn...
- stealth
- In computing, stealth refers to an event, object, or file that ...
- stealth virus
- In computer security, a stealth virus is a computer...
- steganographic
- Steganography (pronounced STEHG-uh-NAH-gruhf-ee, ...
- steganography
- Steganography (pronounced STEHG-uh-NAH-gruhf-ee, fr...
- storage encryption
- Storage encryption is the use of encrypti...
- storage security
- Storage security is the group of parameters a...
- stream cipher
- A stream cipher is a method of encrypting text (to ...
- strong password
- A strong password is one that is designed to be...
- Suspicious Activity Report
- A Suspicious Activity Rep...
- Suspicious Activity Report (SAR)
- A Suspicious ...
- symetric key
- A session key is an encryption and decryption key tha...
- symmetric algorithm
- A secret key algorithm (sometimes calle...
- SYN flooding
- SYN flooding is a method that the user of a hostile c...
- SYN scanning
- SYN scanning is a tactic that a malicious hacker (or ...
- system monitor
- A keylogger, sometimes called a keystroke logger,...
- systems management
- Systems management is the management of t...
- TaaS
- Testing as a Service (TaaS) is an outsourcing model in which testing ...
- TACACS
- TACACS (Terminal Access Controller Access Control System) is an o...
- TACACS (Terminal Access Controller Access Contr...
- TACACS+
- TACACS (Terminal Access Controller Access Control System) is an...
- tarpitting
- Tarpitting is the practice of slowing the transmission of...
- TCB
- The trusted computing base (TCB) is everything in a computing system th...
- TCG
- The Trusted Computing Group (TCG) is a not-for-profit organization that...
- TCP Wrapper
- TCP Wrapper is a public domain computer program that pr...
- tcpdump
- Tcpdump is an open source command-line tool for monitoring (sni...
- telepresence
- Telepresence is a sophisticated form of robotic remot...
- Tempest
- Tempest was the name of a classified (secret) U.S. government p...
- Tempest-shielding
- Tempest was the name of a classified (secre...
- Terminal Access Controller Access Control System
- Testing as a Service
- Testing as a Service (TaaS) is an out...
- Testing as a Service (TaaS)
- Testing as a Service (T...
- TGT
- An authentication ticket, also known as a ticket-granting ticket (TGT),...
- the Indian Computer Emergency Response Team
- threat management
- Integrated threat management is a comprehen...
- TIA
- Total Information Awareness (TIA) is the name of a massive U.S. data mi...
- ticket-granting ticket
- An authentication ticket, also kn...
- tiger team
- In the computer industry, a tiger team is a group of prog...
- TLS
- Transport Layer Security (TLS) is a protocol that ensures privacy betwe...
- token
- In general, a token is an object that represents something else, su...
- tokenization
- Tokenization is the process of replacing sensitive da...
- Top searches of 2008
- What were people searching the WhatIs...
- topsite
- A topsite is a stringently protected underground FTP server at ...
- Total Information Awareness
- Total Information Aware...
- Total Information Awareness (TIA)
- Total Infor...
- TPM
- A trusted platform module (TPM) is a specialized chip that can be insta...
- transitive trust
- Transitive trust is a two-way relationship au...
- Transport Layer Security
- Transport Layer Security (TLS...
- Transport Layer Security (TLS)
- Transport Layer S...
- trap door
- A back door is a means of access to a computer program that...
- trapdoor
- A back door is a means of access to a computer program that b...
- trigraph
- A trigraph is a three-character replacement for a special or ...
- triple homed firewall
- A screened subnet (also known as a ...
- triple-homed firewall
- A screened subnet (also known as a ...
- Trusted Cloud Initiative
- The Trusted Cloud Initiative ...
- trusted computing
- Trusted computing is a broad term that refe...
- trusted computing base
- The trusted computing base (TCB) ...
- trusted computing base (TCB)
- The trusted computing...
- Trusted Computing Group
- The Trusted Computing Group (TC...
- Trusted Computing Group (TCG)
- The Trusted Computi...
- trusted platform module
- A trusted platform module (TPM)...
- trusted platform module (TPM)
- A trusted platform ...
- tunnel
- Tunneling is the transmission of data intended for use only withi...
- tunneling or port forwarding
- Tunneling is the tran...
- Turtle Firewall
- Turtle Firewall is an open source firewall prog...
- two-factor authentication
- Two-factor authentication i...
- two-way authentication
- Mutual authentication, also calle...
- Twofish
- Twofish is an encryption algorithm based on an earlier algorith...
- type I error
- False rejection, also called a type I error, is a mis...
- type II error
- False acceptance, also called a type II error, is a...
- UK Government Connect Secure Extranet
- The...
- UK Government Connect Secure Extranet (GCSX)