Browse INI - MEM
-
- initialization vector - An initialization vector (IV) is an...
- initialization vector (IV) - An initialization vector ...
- Inline Frame - An IFrame (Inline Frame) is an HTML document embedded...
- insider threat - An insider threat is a malicious hacker (also cal...
- instant messaging spam - Spim is spam delivered through in...
- instant spam - Spim is spam delivered through instant messaging (IM)...
- integer overflow - Integer overflow is the result of trying to p...
- integrated circuit for encryption/decryption
- integrated threat management - Integrated threat man...
- integrity - Integrity, in terms of data and network security, is the as...
- integrity check-value - A cryptographic checksum is a mathe...
- intelligent video - Intelligent video is digital video technolo...
- internal cloud - Private cloud (also called internal cloud) is a m...
- International Data Encryption Algorithm
- International Data Encryption Algorithm (IDEA)
- Internet Key Exchange - The Internet Key Exchange (IKE) is ...
- Internet Key Exchange (IKE) - The Internet Key Exchan...
- Internet Protocol Security - IPsec (Internet Protocol ...
- Internet Security and Acceleration Server
- intrusion - Intrusion detection (ID) is a type of security management s...
- intrusion detection - Intrusion detection (ID) is a type of s...
- intrusion detection (ID) - Intrusion detection (ID) is a...
- intrusion detection system - Intrusion detection (ID) ...
- intrusion prevention - Intrusion prevention is a preemptive ...
- inverse mapping - Inverse mapping is a procedure used to create a...
- IP address forgery - IP spoofing, also known as IP address for...
- IP spoofing - IP spoofing, also known as IP address forgery, is a hij...
- IP spoofing (IP address forgery or a host file ...
- IP surveillance - IP surveillance is a digitized and networked ve...
- IPS - Intrusion prevention is a preemptive approach to network security used ...
- IPsec - IPsec (Internet Protocol Security) is a framework for a set of prot...
- IPsec (Internet Protocol Security) - IPsec (In...
- ISA Server - Microsoft's ISA Server (Internet Security and Acceleratio...
- ISA Server (Internet Security and Acceleration ...
- ISO 27001 - ISO 27001 (formally known as ISO/IEC 27001:2005) is a speci...
- IT ISAC - IT-ISAC (Information Technology Information Sharing and Analysi...
- IT-ISAC - IT-ISAC (Information Technology Information Sharing and Analysi...
- IT-ISAC (Information Technology Information Sha...
- IV - An initialization vector (IV) is an arbitrary number that can be used alo...
- JavaScript hijacking - JavaScript hijacking is a technique t...
- Kerberos - Kerberos is a secure method for authenticating a request for ...
- key - In cryptography, a key is a variable value that is applied using an alg...
- key chain - A key chain is a series of keys that can be created to help...
- key fob - A key fob is a type of security token: a small hardware device ...
- key lifetime - A cryptoperiod (sometimes called a key lifetime or a ...
- key logger - A keylogger, sometimes called a keystroke logger, key log...
- key string - A key string is the authentication code included in each ...
- keylogger - A keylogger, sometimes called a keystroke logger, key logge...
- keylogger (keystroke logger, key logger, or sys...
- keylogging software - A keylogger, sometimes called a keystro...
- keystroke logger - A keylogger, sometimes called a keystroke log...
- keyword stuffing - Keyword stuffing is the practice of inserting...
- Kraken - Kraken is the name given to a family of malware that's currently ...
- Kriz virus - Discovered in the fall of 1999, the Kriz virus (known mor...
- Kriz virus (W32.Kriz, W32.Kriz.dr, or PE_KRIZ)
- lamb - In biometric verification, a goat is a system end-user who is refused...
- LEAP - LEAP (Lightweight Extensible Authentication Protocol) is a Cisco-prop...
- LEAP (Lightweight Extensible Authentication Pro...
- Learning Guide: Spyware - Why spyware isn't just a home-u...
- Learning Path: malware - A progressive list of terminology...
- Legal Discovery - Electronic discovery (also called e-discovery o...
- lifestyle polygraph - A lifestyle polygraph is a lie-detector...
- Lightweight Extensible Authentication Protocol
- likejacking - Likejacking is a variation on clickjacking in which mal...
- link encryption - Link encryption (sometimes called link level or...
- link encryption (link level or link layer encry...
- link layer encryption - Link encryption (sometimes called l...
- link level - Link encryption (sometimes called link level or link laye...
- live capture - Live capture is the act or method of gathering biomet...
- location poisoning - URL poisoning, also known as location poi...
- logic bomb - In a computer program, a logic bomb, also called slag cod...
- logic bomb (slag code) - In a computer program, a logic bo...
- long ICMP - On the Internet, ping of death is a denial of service (DoS)...
- magnetic ink character recognition - MICR (mag...
- malicious ad - A malvertisement (malicious advertisement) is an adve...
- malicious advertisment - A malvertisement (malicious adver...
- malicious software - Malware (for "malicious software") is any...
- malvertisement - A malvertisement (malicious advertisement) is an ...
- malvertisement (malicious advertisement or malv...
- malvertising - A malvertisement (malicious advertisement) is an adve...
- malvertizement - A malvertizement is malicious coding served throu...
- malware - Malware (for "malicious software") is any program or file that ...
- malware (malicious software) - Malware (for "malicio...
- man in the middle - A bucket brigade attack is one in which the...
- man in the middle - A man-in-the-middle (MitM) attack is an exp...
- man in the middle attack - A man-in-the-middle (MitM) at...
- man in the middle attack - A bucket brigade attack is on...
- man in the middle attack (fire brigade attack)
- man-in-the-middle - A man-in-the-middle (MitM) attack is an exp...
- man-in-the-middle (MitM) attack - A man-in-the-mi...
- man-in-the-middle attack - A man-in-the-middle (MitM) at...
- managed file transfer - What is managed file transfer (MFT)...
- managed file transfer (MFT) - What is managed file tr...
- managed security service provider - An MSSP (ma...
- masquerade - In general, a masquerade is a disguise.
- MD2 - MD2 is an earlier, 8-bit version of MD5, an algorithm used to verify da...
- MD4 - MD4 is an earlier version of MD5, an algorithm used to verify data inte...
- MD5 - MD5 is an algorithm that is used to verify data integrity through the c...
- meet-in-the-middle attack - Meet-in-the-middle is a typ...
- Melissa virus - Melissa is a fast-spreading macro virus that is dis...
- memory-scraping malware - Memory-scraping malware is a ty...