Browse SHO - TRT
-
- short messaging service spam - SMS spam (sometimes c...
- shoulder surfing - Shoulder surfing is using direct observation ...
- SID - In Windows NT and 2000 operating systems, the security identifier (SID)...
- SIM - Security information management (SIM) is the practice of collecting, mo...
- single factor authentication - Single-factor authent...
- single sign on - Single sign-on (SSO)is a session/user authenticat...
- single sign-on - Single sign-on (SSO)is a session/user authenticat...
- single sign-on (SSO) - Single sign-on (SSO)is a session/user...
- single-factor authentication - Single-factor authent...
- single-factor authentication (SFA) - Single-fa...
- slag code - In a computer program, a logic bomb, also called slag code,...
- smart building - A smart home or building is a home or building, u...
- smart card - A smart card is a plastic card about the size of a credit...
- smart home - A smart home or building is a home or building, usually a...
- smart home or building - A smart home or building is a hom...
- smart meter hack - A smart meter hack is the unauthorized access...
- SMS spam - SMS spam (sometimes called cell phone spam) is any junk messa...
- SMS spam (cell phone spam or short messaging se...
- smurf - A smurf attack is an exploitation of the Internet Protocol (IP) bro...
- smurf attack - A smurf attack is an exploitation of the Internet Pro...
- smurfing - A smurf attack is an exploitation of the Internet Protocol (I...
- snake oil - In cryptographic and other computer products, snake oil is ...
- snarf attack - Bluesnarfing is the theft of information from a wirel...
- sniffer keystroke logger - A keylogger, sometimes called...
- sniper-sniffing robot - A sniper-sniffing robot is a tactic...
- snoop server - A snoop server is a server that uses a packet sniffer...
- snooping - Snooping, in a security context, is unauthorized access to an...
- Snort - Snort is an open source network intrusion detection system (NIDS) c...
- SnortSnarf - SnortSnarf is a program that was designed for use with Sn...
- software piracy - Software piracy is the illegal copying, distrib...
- SOP - The Same Origin Policy (SOP), also called Single Origin Policy, is a se...
- spam blog - A splog (spam blog) is a fake blog created solely to promot...
- spam cocktail - A spam cocktail (or anti-spam cocktail) is the use ...
- spam cocktail (or anti-spam cocktail) - A s...
- spam over Internet telephony - SPIT (spam over Inter...
- SPF - Sender Policy Framework (SPF) is an anti-spam approach in which the Int...
- spim - Spim is spam delivered through instant messaging (IM) instead of thro...
- spim (instant messaging spam) - Spim is spam delive...
- SPIT - SPIT (spam over Internet telephony), sometimes known as vam (voice or...
- SPIT (spam over Internet telephony) - SPIT (s...
- splog - A splog (spam blog) is a fake blog created solely to promote affili...
- splog (spam blog) - A splog (spam blog) is a fake blog created ...
- splogger - A splog (spam blog) is a fake blog created solely to promote ...
- spoof - Spoof was a game involving trickery and nonsense that was invented ...
- spoofing - E-mail spoofing is the forgery of an e-mail header so that th...
- SSH - Secure Shell (SSH), sometimes known as Secure Socket Shell, is a UNIX-b...
- SSL card - A server accelerator card (also known as an SSL card) is a Pe...
- SSO - Single sign-on (SSO)is a session/user authentication process that permi...
- SST virus - The Anna Kournikova VBS.SST computer virus, informally know...
- stack overflow - A stack overflow is an undesirable condition in w...
- stack smashing - Stack smashing is causing a stack in a computer a...
- stateful inspection - Stateful inspection is a firewall techn...
- stealth - In computing, stealth refers to an event, object, or file that ...
- stealth virus - In computer security, a stealth virus is a computer...
- steganographic - Steganography (pronounced STEHG-uh-NAH-gruhf-ee, ...
- steganography - Steganography (pronounced STEHG-uh-NAH-gruhf-ee, fr...
- storage encryption - Storage encryption is the use of encrypti...
- storage security - Storage security is the group of parameters a...
- stream cipher - A stream cipher is a method of encrypting text (to ...
- strong password - A strong password is one that is designed to be...
- Stuxnet - The Stuxnet worm is a rootkit exploit that targets Supervisory ...
- symetric key - A session key is an encryption and decryption key tha...
- symmetric algorithm - A secret key algorithm (sometimes calle...
- SYN flooding - SYN flooding is a method that the user of a hostile c...
- SYN scanning - SYN scanning is a tactic that a malicious hacker (or ...
- system monitor - A keylogger, sometimes called a keystroke logger,...
- systems management - Systems management is the management of t...
- TACACS - TACACS (Terminal Access Controller Access Control System) is an o...
- TACACS (Terminal Access Controller Access Contr...
- TACACS+ - TACACS (Terminal Access Controller Access Control System) is an...
- talking Trojan - A talking Trojan is a Trojan horse program that m...
- targeted attack - A targeted attack is one that seeks to breach t...
- tarpitting - Tarpitting is the practice of slowing the transmission of...
- TCB - The trusted computing base (TCB) is everything in a computing system th...
- TCP Wrapper - TCP Wrapper is a public domain computer program that pr...
- tcpdump - Tcpdump is an open source command-line tool for monitoring (sni...
- telepresence - Telepresence is a sophisticated form of robotic remot...
- Tempest - Tempest was the name of a classified (secret) U.S. government p...
- Tempest-shielding - Tempest was the name of a classified (secre...
- Terminal Access Controller Access Control System
- TGT - An authentication ticket, also known as a ticket-granting ticket (TGT),...
- threat management - Integrated threat management is a comprehen...
- TIA - Total Information Awareness (TIA) is the name of a massive U.S. data mi...
- ticket-granting ticket - An authentication ticket, also kn...
- tiger team - In the computer industry, a tiger team is a group of prog...
- TLS - Transport Layer Security (TLS) is a protocol that ensures privacy betwe...
- token - In general, a token is an object that represents something else, su...
- tokenization - Tokenization is the process of replacing sensitive da...
- topsite - A topsite is a stringently protected underground FTP server at ...
- Total Information Awareness - Total Information Aware...
- Total Information Awareness (TIA) - Total Infor...
- TPM - A trusted platform module (TPM) is a specialized chip that can be insta...
- Transport Layer Security - Transport Layer Security (TLS...
- Transport Layer Security (TLS) - Transport Layer S...
- trap door - A back door is a means of access to a computer program that...
- trapdoor - A back door is a means of access to a computer program that b...
- trigraph - A trigraph is a three-character replacement for a special or ...