Security management
Terms related to security management, including definitions about intrusion detection systems (IDS) and words and phrases about asset management, security policies, security monitoring, authorization and authentication.HAR - LOO
- hard drive overwriter
- hard-drive encryption
- Hash-based Message Authentication Code (HMAC)
- hashing
- HI-MEMS cyborg insects (Hybrid Insect ...
- hijacking
- holistic security
- homomorphic encryption
- Honey Encryption
- honey monkey
- honeynet
- Honeynet Project
- honeypot (computing)
- host intrusion prevention systems (HIPS)
- hot site and cold site
- hotword
- htaccess
- HTTPS (HTTP over SSL or HTTP Secure)
- hybrid virus (multi-part or ...
- hypervisor security
- I-SPY Act -- Internet Spyware ...
- identity and access management (IAM)
- identity chaos (password chaos)
- Identity Ecosystem
- identity governance
- identity theft
- IFrame (Inline Frame)
- IISP (Institute of Information Security...
- IM worm
- in the wild
- incident
- incident response
- incident response plan (IRP)
- Indicators of Compromise (IOC)
- Information Assurance Standard 6 (IAS 6)
- information security (infosec)
- Information Security Breaches Survey (ISBS)
- information security management system (ISMS)
- information signature
- Information Technology Amendment Act ...
- information-centric security
- Infosys Technologies (Infosys Limited)
- Infranet Initiative
- initialization vector (IV)
- insider threat
- integer overflow
- integrated access management (IAM)
- integrated threat management
- intelligence (intel)
- intelligent video
- International Data Encryption Algorithm...
- International Information Systems ...
- Internet Key Exchange (IKE)
- Internet reboot keys
- intrusion detection system (IDS)
- intrusion prevention
- inverse mapping
- IP camera
- IP Spoofing
- IP surveillance
- IPsec (Internet Protocol Security)
- iptables
- iris recognition
- ISA Server (Internet Security and ...
- ISO 27001
- ISO 27002 (International Organization ...
- ISO/IEC 38500
- ISSA (Information Systems Security ...
- IT incident report
- IT systems management
- IT-ISAC (Information Technology ...
- IT/OT convergence
- ITIL v3
- JavaScript hijacking
- journaling file system
- Kerberos
- key
- key chain
- key fob
- key string
- key-value pair (KVP)
- keylogger (keystroke logger or system ...
- keystroke dynamics
- kiosk mode (Windows assigned access)
- knowledge process outsourcing (KPO)
- knowledge-based authentication (KBA)
- Kriz virus (W32.Kriz, W32.Kriz.dr, or ...
- law of unintended consequences
- LEAP (Lightweight Extensible ...
- Learning Guide: Spyware
- Let's Encrypt
- lifestyle polygraph
- link encryption (link level or link ...
- live capture
- local wipe
- locked down device (LDD)
- log management
- logic bomb (slag code)
- Lookout Mobile Security