Browse BPC - CWE
-
- BPCP - A disaster recovery plan (DRP) -- sometimes referred to as a business...
- brain fingerprinting - Brain fingerprinting is a controversi...
- browser hijacker - A browser hijacker (sometimes called hijackwa...
- browser hijacker (hijackware) - A browser hijacker ...
- brute force - Brute force (also known as brute force cracking) is a t...
- brute force cracking - Brute force (also known as brute forc...
- bucket brigade - A bucket brigade attack is one in which the attac...
- buffer overflow - A buffer overflow occurs when a program or proc...
- Bugbear - Bugbear is a computer virus that spread in early October, 2002,...
- business continuity plan - A disaster recovery plan (DRP...
- business logic attack - A business logic attack is an explo...
- business process contingency plan - A disaster ...
- bypass - Bypass, in general, means either to go around something by an ext...
- CA - (CA also stands for conditional access, a term used in DTV.) A certificat...
- CA-ACF2 - ACF2 (more formally, CA-ACF2; the ACF stands for Access Control...
- cache cramming - Cache cramming is a method of tricking a computer...
- cache poisoning - Cache poisoning, also called domain name system...
- cache poisoning (domain name system poisoning o...
- caller ID spoofing - Caller ID spoofing is a service that allo...
- CAN - A corporate area network (CAN) is a separate, protected portion of a co...
- capacitive scanner - A capacitive scanner is a fingerscanning ...
- capture - Capture is the process or means of obtaining and storing extern...
- card verification value - Card verification value (CVV) i...
- card verification value (CVV) - Card verification v...
- Cardholder Information Security Program - Payme...
- Cardholder Information Security Program Payment...
- Carnivore - Carnivore was an Internet surveillance system developed for...
- CBC - Cipher block chaining (CBC) is a mode of operation for a block cipher (...
- cell phone spam - SMS spam (sometimes called cell phone spam) is ...
- certificate authority - (CA also stands for conditional acc...
- certificate authority (CA) - (CA also stands for condi...
- Certificate Revocation List - Certificate Revocation ...
- Certificate Revocation List (CRL) - Certificate...
- certification - In information technology as in other fields such a...
- Certified Information Systems Security Professi...
- Certified Information Systems Security Professi...
- CFB - Ciphertext feedback (CFB) is a mode of operation for a block cipher. In...
- chaffing - Chaffing and winnowing are dual components of a privacy-enhan...
- chaffing and winnowing - Chaffing and winnowing are dual c...
- challenge response authentication mechanism
- challenge-response authentication mechanism
- Chernobyl virus - The Chernobyl virus is a computer virus with a ...
- cipher - A cipher (pronounced SAI-fuhr) is any method of encrypting text (...
- cipher block chaining - Cipher block chaining (CBC) is a mo...
- cipher block chaining (CBC) - Cipher block chaining (...
- ciphertext - Ciphertext is encrypted text.
- ciphertext feedback - Ciphertext feedback (CFB) is a mode of ...
- ciphertext feedback (CFB) - Ciphertext feedback (CFB) i...
- CISP PCI - CISP (Cardholder Information Security Program) and PCI (Payme...
- CISP-PCI - CISP (Cardholder Information Security Program) and PCI (Payme...
- CISP-PCI (Cardholder Information Security Progr...
- CISPA - The Cyber Intelligence Sharing and Protection Act (CISPA) of 2011 i...
- CISSP - The Certified Information Systems Security Professional (CISSP) exa...
- Class C2 - Class C2 is a security rating established by the U.S. Nationa...
- clickjacking - Clickjacking (also known as user-interface or UI redr...
- clickjacking (user-interface or UI redressing a...
- clipboard hijack attack - A clipboard hijacking is an exp...
- Clipper - The Escrowed Encryption Standard (EES) is a standard for encryp...
- cloud cartography - Cloud cartography is a scheme for pinpointi...
- CloudAV - CloudAV is a program that combines multiple antivirus applicati...
- COBIT - COBIT (Control Objectives for Information and Related Technology) i...
- COBIT (Control Objectives for Information and R...
- cocooning - Cocooning is the act of insulating or hiding oneself from t...
- cold site - A hot site is a commercial disaster recovery service that a...
- command injection - Command injection is the insertion of HTML ...
- Common Vulnerabilities and Exposures - Commo...
- Common Vulnerabilities and Exposures (CVE)
- Common Weakness Enumeration - Common Weakness Enumera...
- Common Weakness Enumeration (CWE) - Common Weak...
- computer barnacle - In a computer, a barnacle is unwanted progr...
- Computer Security Incident Response Team (CSIRT)
- Computer-based Discovery - Electronic discovery (also ca...
- Conficker - Conficker is a fast-spreading worm that targets a vulnerabi...
- Consumer Data Privacy - Consumer privacy, also known as cus...
- consumer privacy - Consumer privacy, also known as customer priv...
- consumer privacy (customer privacy) - Consume...
- Content Discovery - Electronic discovery (also called e-discove...
- Content Protection for Removable Media
- Content Protection for Removable Media (CPRM)
- Control Objectives for Information and Related ...
- cookie poisoning - On the Web, cookie poisoning is the modificat...
- corporate area network - A corporate area network (CAN) is...
- corporate area network (CAN) - A corporate area netw...
- corporate cloud - Private cloud (also called internal cloud) is a...
- CPRM - Content Protection for Removable Media (CPRM) is a hardware-based tec...
- cracker - A cracker is someone who breaks into someone else's computer sy...
- cracking - Brute force (also known as brute force cracking) is a trial a...
- CRAM - CRAM (challenge-response authentication mechanism) is the two-level s...
- CRAM (challenge-response authentication mechanism)
- CRL - Certificate Revocation List (CRL) is one of two common methods when usi...
- cryptographic checksum - A cryptographic checksum is a mat...
- cryptography - Cryptography is the science of information security.
- cryptology - Cryptology is the mathematics, such as number theory, and...
- cryptoperiod - A cryptoperiod (sometimes called a key lifetime or a ...
- cryptoperiod (key lifetime or a validity period)
- Customer Data Privacy - Consumer privacy, also known as cus...
- customer privacy - Consumer privacy, also known as customer priv...
- CVE - Common Vulnerabilities and Exposures (CVE) is a list of standard terms ...
- CVV - Card verification value (CVV) is a combination of features used in cred...
- CWE - Common Weakness Enumeration (CWE) is a universal online dictionary of w...