-
-
- KPO
- Knowledge process outsourcing (KPO) is the allocation of relatively hig...
- Kriz virus
- Discovered in the fall of 1999, the Kriz virus (known mor...
- Kriz virus (W32.Kriz, W32.Kriz.dr, or PE_KRIZ)
- KVP
- A key-value pair (KVP) is a set of two linked data items: a key, which ...
- lamb
- In biometric verification, a goat is a system end-user who is refused...
- LEAP
- LEAP (Lightweight Extensible Authentication Protocol) is a Cisco-prop...
- LEAP (Lightweight Extensible Authentication Pro...
- Learning Guide: Spyware
- Why spyware isn't just a home-u...
- Learning Path: Security
- This page provides a learning p...
- Legal Discovery
- Electronic discovery (also called e-discovery o...
- lifestyle polygraph
- A lifestyle polygraph is a lie-detector...
- Lightweight Extensible Authentication Protocol
- link encryption
- Link encryption (sometimes called link level or...
- link encryption (link level or link layer encry...
- link layer encryption
- Link encryption (sometimes called l...
- link level
- Link encryption (sometimes called link level or link laye...
- live capture
- Live capture is the act or method of gathering biomet...
- location poisoning
- URL poisoning, also known as location poi...
- logic bomb
- In a computer program, a logic bomb, also called slag cod...
- logic bomb (slag code)
- In a computer program, a logic bo...
- long ICMP
- On the Internet, ping of death is a denial of service (DoS)...
- LUN masking
- LUN masking is a further constraint added to zoning, su...
- MAC
- A message authentication code (MAC) is a cryptographic checksum on data...
- MAD
- Mobile Active Defense’s main product is the Mobile Enterprise Complianc...
- magnetic ink character recognition
- MICR (mag...
- Mahindra Special Services Group
- Mahindra Specia...
- Mahindra Special Services Group (MSSG)
- malicious software
- Malware (for "malicious software") is any...
- malvertizement
- A malvertizement is malicious coding served throu...
- malware
- Malware (for "malicious software") is any program or file that ...
- malware (malicious software)
- Malware (for "malicio...
- man in the middle
- A bucket brigade attack is one in which the...
- man in the middle
- A man-in-the-middle (MitM) attack is an exp...
- man in the middle attack
- A man-in-the-middle (MitM) at...
- man in the middle attack
- A bucket brigade attack is on...
- man in the middle attack (fire brigade attack)
- man-in-the-middle
- A man-in-the-middle (MitM) attack is an exp...
- man-in-the-middle (MitM) attack
- A man-in-the-mi...
- man-in-the-middle attack
- A man-in-the-middle (MitM) at...
- managed file transfer
- What is managed file transfer (MFT)...
- managed file transfer (MFT)
- What is managed file tr...
- managed security service provider
- An MSSP (ma...
- mantrap
- A mantrap is a small room with an entry door on one wall and an...
- mantrap (interlocking door controller)
- masquerade
- In general, a masquerade is a disguise.
- Massachusetts data protection law
- What is the...
- MD2
- MD2 is an earlier, 8-bit version of MD5, an algorithm used to verify da...
- MD4
- MD4 is an earlier version of MD5, an algorithm used to verify data inte...
- MD5
- MD5 is an algorithm that is used to verify data integrity through the c...
- Melissa virus
- Melissa is a fast-spreading macro virus that is dis...
- message authentication code
- A cryptographic checksu...
- message authentication code
- A message authenticatio...
- message authentication code (MAC)
- A message a...
- message integrity code
- A cryptographic checksum is a mat...
- Metasploit Project - Metasploit Framework
- MFA
- Multifactor authentication (MFA) is a security system in which more tha...
- MFT
- What is managed file transfer (MFT)?Managed file transfer (MFT) is a ty...
- MICR
- MICR (magnetic ink character recognition) is a technology used to ver...
- MICR (magnetic ink character recognition)
- micro-virtualization
- Micro-virtualization is technology th...
- micropayment
- A micropayment is an e-commerce transaction involving...
- Microsoft Antigen
- Microsoft Antigen is a set of programs that...
- Microsoft Management Console
- The Microsoft Managem...
- Microsoft Management Console (MMC)
- The Micro...
- Microsoft Network Access Protection
- Network...
- Microsoft Network Access Protection (NAP)
- Microsoft Point to Point Encryption
- MPPE (M...
- Microsoft Point-to-Point Encryption
- MPPE (M...
- Microsoft System Center Mobile Device Manager
- Microsoft System Center Mobile Device Manager (...
- MIEL e-Security
- MIEL e-Security is a Mumbai-based organization ...
- minutiae
- In the biometric process of fingerscanning, minutiae are spec...
- mitm
- A man-in-the-middle (MitM) attack is an exploit in which an intruder ...
- MitM
- Active man-in-the-middle (MitM) is an attack method that allows an in...
- MitM attack
- A man-in-the-middle (MitM) attack is an exploit in whic...
- MMC
- The Microsoft Management Console (MMC) is an application that provides ...
- Mobile Active Defense
- Mobile Active Defense’s main produc...
- Mobile Active Defense (MAD)
- Mobile Active Defense’s...
- mobile application management (MAM)
- Mobile ...
- mobile phone spam
- SMS spam (sometimes called cell phone spam)...
- Modes of Attack
- Test yourself. A WhatIs.com tech vocabulary qui...
- modification detection code
- A cryptographic checksu...
- MPPE
- MPPE (Microsoft Point-to-Point Encryption) is a method of encrypting ...
- MPPE (Microsoft Point-to-Point Encryption)
- MSCMDM
- Microsoft System Center Mobile Device Manager (MSCMDM) is server-...
- MSSG
- Mahindra Special Services Group (MSSG) is a corporate security consul...
- MSSP
- An MSSP (managed security service provider) is an Internet service pr...
- MSSP (managed security service provider)
- multi part virus
- A hybrid virus (sometimes called a multi-part...
- multi-part virus
- A hybrid virus (sometimes called a multi-part...
- multifactor authentication
- Multifactor authenticatio...
- multifactor authentication (MFA)
- Multifactor a...
- multipartite virus
- A hybrid virus (sometimes called a multi-...
- mutual authentication
- Mutual authentication, also called ...
- Mytob
- Mytob is a worm used by hackers to gather personal and financial in...
- NACHA
- The National Automated Clearing House Association (NACHA) is a not-...
- NAP
- Network access protection (NAP), introduced with Windows Server 2008, i...