-
-
- unified threat management
- Unified threat management (...
- unified threat management (UTM)
- Unified threat ...
- URL poisoning
- URL poisoning, also known as location poisoning, is...
- URL poisoning (location poisoning)
- URL poiso...
- user account provisioning
- User account provisioning i...
- user profile
- In a Windows environment, a user profile is a record ...
- user-interface redressing
- Clickjacking (also known as...
- UTM
- Unified threat management (UTM) refers to a comprehensive security prod...
- validity period
- A cryptoperiod (sometimes called a key lifetime...
- vam
- SPIT (spam over Internet telephony), sometimes known as vam (voice or V...
- van Eck phreaking
- Van Eck phreaking is a form of eavesdroppin...
- vascular ID
- Finger vein ID is a biometric authentication system tha...
- VBS.SST
- The Anna Kournikova VBS.SST computer virus, informally known as...
- virtual firewall
- A virtual firewall is a software appliance th...
- virtual honeynet
- A honeynet is a network set up with intention...
- virtual local area network�hopping
- VLAN hopp...
- virtual machine escape
- What is virtual machine escape?Vi...
- virtual NAS
- Virtual NAS is a virtual machine (VM) that acts as a fi...
- virus
- In computers, a virus is a program or programming code that replica...
- virus hoax
- A virus hoax is a false warning about a computer virus.
- VLAN hopping
- VLAN hopping (virtual local area network hopping) is ...
- VLAN hopping (virtual local area network hopping)
- VMware Horizon Application Manager
- VMware Ho...
- voice logger
- A voice logger is a device or program used to record ...
- Voice over IP Security Alliance
- VOIPSA (Voice o...
- Voice Over Misconfigured Internet Telephones
- voice spam
- SPIT (spam over Internet telephony), sometimes known as v...
- voiceprint
- A voiceprint is a set of measurable characteristics of a ...
- VoIP security threats
- As VoIP becomes increasingly preval...
- VoIP spam
- SPIT (spam over Internet telephony), sometimes known as vam...
- VOIPSA
- VOIPSA (Voice over IP Security Alliance) is a cross-industry coal...
- VOIPSA (Voice over IP Security Alliance)
- vomit
- Vomit (spelled all lower-case) is a Unix software utility that take...
- vulnerability analysis
- Vulnerability analysis, also know...
- vulnerability analysis (vulnerability assessment)
- vulnerability and patch management
- Vulnerabi...
- vulnerability assessment
- Vulnerability analysis, also ...
- vulnerability disclosure
- Vulnerability disclosure is t...
- Vulnerability Discovery and Remediation
- vulnerability management
- Vulnerability management is a...
- vulnerability scanner
- A vulnerability scanner is a progra...
- W32 Rjump
- The RavMonE virus, also known as W32/Rjump, is a virus that...
- W32.Kriz
- Discovered in the fall of 1999, the Kriz virus (known more fo...
- W32.Kriz virus
- Discovered in the fall of 1999, the Kriz virus (k...
- W32.Kriz.dr
- Discovered in the fall of 1999, the Kriz virus (known m...
- W32/Rjump
- The RavMonE virus, also known as W32/Rjump, is a virus that...
- WAFS
- Wide-area file services (WAFS) is a storage technology that makes it ...
- war dialer
- A war dialer is a computer program used to identify the p...
- war dialing
- A war dialer is a computer program used to identify the...
- war driving
- War driving, also called access point mapping, is the a...
- war driving (access point mapping)
- War drivi...
- wardriving
- War driving, also called access point mapping, is the act...
- watermark
- Steganography (pronounced STEHG-uh-NAH-gruhf-ee, from Greek...
- weak password
- A strong password is one that is designed to be har...
- Web filter
- A Web filter is a program that can screen an incoming Web...
- Web filtering
- A Web filter is a program that can screen an incomi...
- Web page filter
- A Web filter is a program that can screen an in...
- Web Services Trust Language
- Web Services Trust Lang...
- Web Services Trust Language (WS-Trust)
- Web-based backup
- Online backup is a method of offsite data sto...
- WEP
- Wired Equivalent Privacy (WEP) is a security protocol, specified in the...
- What is spyware?
- In general, spyware is any technology that ai...
- white hat
- White hat describes a hacker (or, if you prefer, cracker) w...
- Wi Fi
- Wi-Fi is the popular term for a high-frequency wireless local area ...
- Wi Fi Protected Access
- Wi-Fi Protected Access (WPA) is t...
- Wi-Fi
- Wi-Fi is the popular term for a high-frequency wireless local area ...
- Wi-Fi (wireless fidelity)
- Wi-Fi is the popular term f...
- Wi-Fi Protected Access
- Wi-Fi Protected Access (WPA) is t...
- Wi-Fi Protected Access (WPA)
- Wi-Fi Protected Acces...
- wide area file services
- Wide-area file services (WAFS) ...
- wide-area file services
- Wide-area file services (WAFS) ...
- wide-area file services (WAFS)
- Wide-area file se...
- Wiegand
- Wiegand is the trade name for a technology used in card readers...
- WiFi
- Wi-Fi is the popular term for a high-frequency wireless local area ne...
- WikiScanner
- WikiScanner is a free, Web-based database application t...
- wildcard certificate
- A wildcard certificate is a digital c...
- Wingate
- Wingate is a product that allows people on a small home network...
- winnowing
- Chaffing and winnowing are dual components of a privacy-enh...
- WinNuke
- A "blue bomb" (also known as "WinNuke") is a technique for caus...
- Wired Equivalent Privacy
- Wired Equivalent Privacy (WEP...
- Wired Equivalent Privacy (WEP)
- Wired Equivalent ...
- wireless fidelity
- Wi-Fi is the popular term for a high-freque...
- Wireless Transport Layer Security
- Wireless Tr...
- Wireless Transport Layer Security (WTLS)
- Wireshark
- Wireshark is an open source tool for analyzing packets and ...
- wolf
- In biometric verification, a goat is a system end-user who is refused...
- worm
- In a computer, a worm is a self-replicating virus that does not alter...
- WPA
- Wi-Fi Protected Access (WPA) is the latest security standard for users ...
- WS Trust
- Web Services Trust Language (WS-Trust) is a specification tha...
- WS-Trust
- Web Services Trust Language (WS-Trust) is a specification tha...
- WTLS
- Wireless Transport Layer Security (WTLS) is the security level for Wi...
- X-ray body scanning
- Backscatter body scanning is an X-ray-b...
- XTACACS
- TACACS (Terminal Access Controller Access Control System) is an...
- zero day
- A zero-day exploit is one that takes advantage of a security ...
- zero-day exploit
- A zero-day exploit is one that takes advantag...
- zombie
- A zombie (also known as a bot) is a computer that a remote attack...
- zombie (bot)
- A zombie (also known as a bot) is a computer that a r...
- zombie army
- A zombie army (also known as a botnet) is a number of I...
- zoo
- A zoo is a collection of viruses and worms that exist only in virus and...
- Zotob
- Zotob is a computer worm used by an attacker to gather personal and...