Browse DRI - FIQ
-
- drive-by pharming - Drive-by pharming is a vulnerability exploi...
- drive-by spamming - Drive-by spamming is a variation of drive-b...
- DRP - A disaster recovery plan (DRP) -- sometimes referred to as a business c...
- DSCI - The Data Security Council of India (DSCI) is a not-for-profit organiz...
- DSO exploit - A data source object (DSO) exploit is a form of spyware...
- DSO exploit (data source object exploit)
- DSS - Digital Signature Standard (DSS) is the digital signature algorithm(DSA...
- dumb - A dumb network is one that provides the physical interconnection betw...
- dumb network - A dumb network is one that provides the physical inte...
- dump site - A topsite is a stringently protected underground FTP server...
- Duqu - Duqu is a remote access Trojan (RAT) that is designed to steal data f...
- Duqu (W32.Duqu) - Duqu is a remote access Trojan (RAT) that is de...
- dynamic packet filter - A dynamic packet filter is a firewa...
- e discovery - Electronic discovery (also called e-discovery or edisco...
- e-discovery - Electronic discovery (also called e-discovery or edisco...
- e-Mail Discoverability - Electronic discovery (also called...
- e-mail forgery - E-mail spoofing is the forgery of an e-mail heade...
- eavesdropping - Eavesdropping is the unauthorized real-time interce...
- ECB - Electronic Code Book (ECB) is a mode of operation for a block cipher, w...
- ECC - Elliptical curve cryptography (ECC) is a public key encryption techniqu...
- Echelon - Echelon is an officially unacknowledged U.S.-led global spy net...
- EDD - Electronic discovery (also called e-discovery or ediscovery) refers to ...
- ediscovery - Electronic discovery (also called e-discovery or ediscove...
- EES - The Escrowed Encryption Standard (EES) is a standard for encrypted comm...
- EFS - The Encrypting File System (EFS) is a feature of the Windows 2000 opera...
- egress filtering - Egress filtering is a process in which outbou...
- Electrohippies Collective - The Electrohippies Collecti...
- Electronic Code Book - Electronic Code Book (ECB) is a mode ...
- Electronic Code Book (ECB) - Electronic Code Book (ECB...
- Electronic Content Discovery - Electronic discovery ...
- Electronic Data Discovery - Electronic discovery (also ...
- Electronic Data Management - Electronic discovery (als...
- electronic discovery - Electronic discovery (also called e-d...
- electronic discovery (e-discovery or ediscovery)
- Electronic Document Discovery - Electronic discover...
- Electronic Evidence - Electronic discovery (also called e-dis...
- Electronic Evidence Discovery - Electronic discover...
- Electronic Information Discovery - Electronic di...
- Electronic-discovery - Electronic discovery (also called e-d...
- Elk Cloner - Elk Cloner was the first computer virus known to have spr...
- elliptical curve cryptography - Elliptical curve cr...
- elliptical curve cryptography (ECC) - Ellipti...
- Email Discoverability - Electronic discovery (also called e...
- eMail Evidence Discovery - Electronic discovery (also ca...
- eMail Search and Discovery - Electronic discovery (als...
- email spoofing - E-mail spoofing is the forgery of an e-mail heade...
- emanation monitoring - Tempest was the name of a classified ...
- emergency management plan - An emergency management pla...
- EMR-shielding - Tempest was the name of a classified (secret) U.S. ...
- encoding - Encoding is the process of putting a sequence of characters (...
- encoding and decoding - Encoding is the process of putting ...
- encoding/decoding - Encoding is the process of putting a sequen...
- encrypt - Encryption is the conversion of data into a form, called a ciph...
- Encrypting File System - The Encrypting File System (EFS) ...
- Encrypting File System (EFS) - The Encrypting File S...
- encryption - Encryption is the conversion of data into a form, called ...
- encryption/decryption IC - A data encryption/decryption ...
- endpoint fingerprinting - Endpoint fingerprinting is a fe...
- endpoint security - Endpoint security is an approach to network...
- Enterprise Search and Discovery - Electronic disc...
- Escrowed Encryption Standard - The Escrowed Encrypti...
- Escrowed Encryption Standard (EES) - The Escro...
- ethical hacker - An ethical hacker is a computer and network exper...
- ethical hacking - An ethical hacker is a computer and network exp...
- ethical worm - An ethical worm is a program that automates network-b...
- evil twin - In security, an evil twin is a home-made wireless access po...
- exploit - In computing, an exploit is an attack on a computer system, esp...
- exponential key exchange - Diffie-Hellman key exchange, ...
- extrusion prevention - Extrusion prevention is the practice ...
- FACTA - FACTA (Fair and Accurate Credit Transactions Act) is an amendment t...
- FACTA (Fair and Accurate Credit Transactions Act)
- Fair and Accurate Credit Transactions Act
- Fair Credit Reporting Act - FCRA (Fair Credit Reporting...
- false acceptance - False acceptance, also called a type II error...
- false acceptance (type II error) - False accepta...
- false rejection - False rejection, also called a type I error, is...
- false rejection (type I error) - False rejection, ...
- false rejection rate - False rejection, also called a type I...
- FAR - False acceptance, also called a type II error, is a mistake occasionall...
- Faraday cage - A Faraday cage is a metallic enclosure that prevents ...
- fast flux DNS - Fast flux DNS is a technique that a cybercriminal c...
- FCRA - FCRA (Fair Credit Reporting Act) is a United States Law that regulate...
- FCRA (Fair Credit Reporting Act) - FCRA (Fair Cr...
- Federal Financial Institutions Examination Council
- federated identity management - Federated Identity ...
- federated identity management (FIM) - Federat...
- FFIEC compliance - FFIEC compliance is conformance to a set of s...
- FFIEC compliance (Federal Financial Institution...
- FH-CDMA - Frequency hopping is one of two basic modulation techniques use...
- FIM - Federated Identity Management (FIM) is an arrangement that can be made ...
- Financial Crimes Enforcement Network - Finan...
- Financial Crimes Enforcement Network (FinCEN)
- FinCEN - Financial Crimes Enforcement Network (FinCEN) is a bureau of the ...
- finger image - Fingerscanning, also called fingerprint scanning, is ...
- fingernail storage - Fingernail storage is a method of writing...
- fingerprint scanning - Fingerscanning, also called fingerpri...
- fingerscanning - Fingerscanning, also called fingerprint scanning,...
- fingerscanning (fingerprint scanning) - Fin...
- FIPS PUB 197 - The Advanced Encryption Standard (AES) is an encrypti...