Terms related to security threats, including definitions about anti-virus programs or firewalls and words and phrases about malware, viruses, Trojans and other security attacks.
Browse 0-D - BOT
-
- 0-day - A zero-day exploit is one that takes advantage of a security vulner...
- 802.11x - 802.11x refers to a group of evolving wireless local area netwo...
- AAA - Authentication, authorization, and accounting (AAA) is a framework for ...
- AAA server - An AAA server is a server program that handles user reque...
- AAA server (authentication, authorization, and ...
- Access Control Facility - ACF2 (more formally, CA-ACF2; t...
- access point mapping - War driving, also called access point...
- ACF2 - ACF2 (more formally, CA-ACF2; the ACF stands for Access Control Facil...
- ACF2 or CA-ACF2 (Access Control Facility)
- active man in the middle attack - Active man-in-t...
- active man-in-the-middle attack - Active man-in-t...
- active man-in-the-middle attack (MitM)
- active reconnaissance - Active reconnaissance is a type of ...
- ADS - An alternate data stream (ADS) is a feature of Windows New Technology F...
- advanced evasion technique - An advanced evasion techn...
- advanced evasion technique (AET) - An advanced e...
- advanced persistent threat - An advanced persistent th...
- advanced persistent threat (APT) - An advanced p...
- AES - The Advanced Encryption Standard (AES) is an encryption algorithm for s...
- AET - An advanced evasion technique (AET) is a type of network attack that co...
- AFIS - The Automated Fingerprint Identification System (AFIS) is a biometric...
- alternate data stream - An alternate data stream (ADS) is a...
- alternate data stream (ADS) - An alternate data strea...
- AML - Anti-laundering software is a type of computer program used by financia...
- Anna - The Anna Kournikova VBS.SST computer virus, informally known as "Anna...
- Anna Kournikova virus VBS.SST - The Anna Kournikova...
- Anonymous - Anonymous is a loosely organized hacktivist collective crea...
- anti money laundering software - Anti-laundering s...
- anti spam cocktail - A spam cocktail (or anti-spam cocktail) i...
- anti-money laundering software - Anti-laundering s...
- anti-money laundering software (AML) - Anti-...
- anti-spam cocktail - A spam cocktail (or anti-spam cocktail) i...
- anti-virus software - Antivirus (or "anti-virus") software is...
- Antigen - Sybari's Antigen is antivirus software for Lotus Domino and Mic...
- antivirus software - Antivirus (or "anti-virus") software is a...
- application blacklisting - Application blacklisting, som...
- application whitelisting - Application whitelisting is a...
- APT - An advanced persistent threat is a network attack in which an unauthori...
- asymmetric algorithm - Asymmetric cryptography is cryptograp...
- asymmetric cryptography - Asymmetric cryptography is cryp...
- asymmetric cryptography (public-key cryptography)
- attack vector - An attack vector is a path or means by which a hack...
- audit trail - In accounting, an audit trail is the sequence of paperw...
- authenticate - Authentication is the process of determining whether ...
- authentication - Authentication is the process of determining whet...
- authentication authorization accounting
- authentication authorization accounting
- authentication ticket - An authentication ticket, also know...
- authentication ticket or ticket-granting ticket...
- authentication token - A security token (sometimes called an...
- authentication, authorization, and accounting (...
- authorization - Authorization is the process of giving someone perm...
- Automated Clearing House fraud (ACH fraud)
- Automated Fingerprint Identification System
- Automated Fingerprint Identification System (AFIS)
- baby botnet - A micro-botnet, also called a mini-botnet or baby botne...
- back door - A back door is a means of access to a computer program that...
- Back Orifice - Back Orifice is a rootkit program designed to expose ...
- backdoor - A back door is a means of access to a computer program that b...
- backscatter - Backscatter body scanning is an X-ray-based technology ...
- backscatter body scanning - Backscatter body scanning i...
- backscatter spam - Backscatter spam, also called misdirected bou...
- backscatting - Backscatter body scanning is an X-ray-based technolog...
- backtracking - Directory traversal is a form of HTTP exploit in whic...
- backup with DAT USB - A DAT USB drive is a tape drive with di...
- barnacle - In a computer, a barnacle is unwanted programming, such as ad...
- bastion host - On the Internet, a bastion host is the only host comp...
- Bayesian filter - A Bayesian filter is a program that uses Bayesi...
- BCP - A disaster recovery plan (DRP) -- sometimes referred to as a business c...
- beaming - In infrared transmission, beaming is the communication of data ...
- bifurcation - In the biometric process of fingerscanning, a bifurcati...
- BinHex - BinHex is a utility for converting (encoding) Macintosh files int...
- biometric authentication - Biometric verification is any...
- biometric identification - Biometric verification is any...
- biometric payment - Biometric payment is a point of sale techno...
- biometric verification - Biometric verification is any mea...
- BIOS attack - A BIOS attack is an exploit that infects the BIOS with ...
- BIOS rootkit - A BIOS-level rootkit is programming that exists in a ...
- BIOS rootkit attack - A BIOS-level rootkit attack, also known...
- BitLocker - BitLocker is an operating system-level extension to Vista t...
- black hat - Black hat is used to describe a hacker (or, if you prefer, ...
- blended attack - A blended threat is an exploit that combines elem...
- blended exploit - A blended threat is an exploit that combines el...
- blended threat - A blended threat is an exploit that combines elem...
- block cipher - A block cipher is a method of encrypting text (to pro...
- Blowfish - Blowfish is an encryption algorithm that can be used as a rep...
- blue bomb - A "blue bomb" (also known as "WinNuke") is a technique for ...
- blue bomb (WinNuke) - A "blue bomb" (also known as "WinNuke")...
- blue pill rootkit - The blue pill rootkit is malware that execu...
- bluesnarf - Bluesnarfing is the theft of information from a wireless de...
- bluesnarfing - Bluesnarfing is the theft of information from a wirel...
- BO2K - Back Orifice is a rootkit program designed to expose the security def...
- bot - A zombie (also known as a bot) is a computer that a remote attacker has...
- bot network - A zombie army (also known as a botnet) is a number of I...
- bot worm - A bot worm is a self-replicating malware program that resides...
- bot-worm - A bot worm is a self-replicating malware program that resides...
- BotHunter - BotHunter is a type of bot application that looks for other...
- botnet - A zombie army (also known as a botnet) is a number of Internet co...
- botnet (zombie army) - A zombie army (also known as a botnet...
- botworm - A bot worm is a self-replicating malware program that resides i...