Test

Powered by Blogger.

Computer security






Computer security definitions


#ABCDEFGHIJKLMNOPQRSTUVWXYZ
Internet definitions - Network definitions
Number
0-day
2600
419

A
Abort
Access
Access control system
Account lockout
ACE
ACL
Address spoof
Admin
Administrator
Administrative
Advisory
Adware
AES
ANI
Anonymous
Application gateway
Authentication
Authorize
antivirus
antivirus program
antivirus software
Asymmetric Encryption
Attachment
Attack
AV
AVS

B
Backdoor
Bitlocker
Black hat
Blacklist
Blue box
Back orifice
BO
Bomb
Boot sector virus
Botnet
Brute-force attack
Bypass

C
Callback
Carnivore
CDA
CERT
Chain mail
Cipher
Clbuttic
Cleartext
Clickjacking
Cloaking
CMA
CMOS virus
Code signing
Combofix
Communications act
Companion virus
Computer crime
Computer security
Con
Confidentiality
COPPA
Copy protection
Crack
Cracker
Crackz
Credit card fraud
CRL
Cryptography
Cryptology
Cyberwar

D
DACL
DARPA
Data theft
DataDot
DCS1000
DDoS
Decryption
DEF CON
Deface
Default password
Deffie-Hellman
Definition
Denial Of Service
DES
Dictionary attack
Digital signature
DNS hijacking
DoD
DoS
DoS attack
Drive-by download
DRM
DSO exploit
Dumpster diving

E
E-mail bomb
E-mail spoof
Earwigging
EAP
Eavesdropping
ECHELON
EFS
Elite
Encrypt
Ethical hacking
Evil twin
EVP
Executable virus
Exploit

F
Federated identity
File protection
Finger print
Filter
Firewall
Fishing
Flame
Flaw
Flood
Foistware
Full rights

G
Gatekeeper
GPO

H
Hack
Hacker
Hackz
Haxor
Hijack
HijackThis
Hoax
Honey pot
Hotfix
HTTPS

I
ICRA
Identity theft
IDS
Intruder
Intrusion Detection System
IP cloaking
IP spoofing
ISACA

J
Jailbreaking

K
Kensington lock
Kerberos
Keylogger
Keystroke logger

L
Layer Socket Provider
Leet
Lock
Logic bomb
Login
Log off
LSP

M
Macro virus
Mail bomb
Mail relay
Malvertising
Malware
Man-in-the-middle attack
Manhole
Master Boot Record virus
MBR virus
MDC
Microsoft Security Essentials
Modification Detection Code
Multipart virus
Monitor
MSE

N
Node encryption
Non resident virus

O
Obfuscation
Orange book
OTP
Overrun
Overwrite virus

P
Packet monkey
Passphrase
Password
Password generator
Password manager
Patch
Payload
Permission
Personally identifiable information
PGP
Pharming
Phishing
Phreak
PII
Pixel tag
Policeware
Polymorphic virus
Port scanner
Predator
Pretty Good Privacy
Privacy
Privacy filter
Privilege level
Privileges
Promiscuous mode
Public Key Cryptography

Q
Quarantine

R
Random seed
Ransomware
RAT
Recover
Remote admin
Resident virus
Rookie
Root
Rootkit
RSA

S
Sabotage
Sandbox
Scam
Scareware
Scriptz
Scunthorpe problem
Secure connection
Security
Seed
Sextortion
Shoulder surfing
Sign off
Slogin
Snarf
Sniffing
Social engineering
Spam
Spear phishing
SPI
Spoof
Spoofing
Spybot
Spyware
SQL injection
SSH
Stealth virus
SYN attack

T
Tamper
Tempest
TheftGuard
Tracking bug
Trapdoor
Trojan horse
Trusted Execution Technology

U
UAC
Unauthorized access
Unlock
Update
Upgrade
Username

V
Vaccine
Virus
VoMM

W
War dial
War driving
Wardriving
WARP
Web beacon
Web bug
WEP
White hat
Windows 99
Windows Defender
Worm
WOT
WPA

X
Currently no listings
Y
Currently no listings
Z
Zero-day flaw
ZERT
Zombie

Zombie network







No comments:

Post a Comment

RSS

Categories

Followers

Blog Archive

Computer security






Computer security definitions


#ABCDEFGHIJKLMNOPQRSTUVWXYZ
Internet definitions - Network definitions
Number
0-day
2600
419

A
Abort
Access
Access control system
Account lockout
ACE
ACL
Address spoof
Admin
Administrator
Administrative
Advisory
Adware
AES
ANI
Anonymous
Application gateway
Authentication
Authorize
antivirus
antivirus program
antivirus software
Asymmetric Encryption
Attachment
Attack
AV
AVS

B
Backdoor
Bitlocker
Black hat
Blacklist
Blue box
Back orifice
BO
Bomb
Boot sector virus
Botnet
Brute-force attack
Bypass

C
Callback
Carnivore
CDA
CERT
Chain mail
Cipher
Clbuttic
Cleartext
Clickjacking
Cloaking
CMA
CMOS virus
Code signing
Combofix
Communications act
Companion virus
Computer crime
Computer security
Con
Confidentiality
COPPA
Copy protection
Crack
Cracker
Crackz
Credit card fraud
CRL
Cryptography
Cryptology
Cyberwar

D
DACL
DARPA
Data theft
DataDot
DCS1000
DDoS
Decryption
DEF CON
Deface
Default password
Deffie-Hellman
Definition
Denial Of Service
DES
Dictionary attack
Digital signature
DNS hijacking
DoD
DoS
DoS attack
Drive-by download
DRM
DSO exploit
Dumpster diving

E
E-mail bomb
E-mail spoof
Earwigging
EAP
Eavesdropping
ECHELON
EFS
Elite
Encrypt
Ethical hacking
Evil twin
EVP
Executable virus
Exploit

F
Federated identity
File protection
Finger print
Filter
Firewall
Fishing
Flame
Flaw
Flood
Foistware
Full rights

G
Gatekeeper
GPO

H
Hack
Hacker
Hackz
Haxor
Hijack
HijackThis
Hoax
Honey pot
Hotfix
HTTPS

I
ICRA
Identity theft
IDS
Intruder
Intrusion Detection System
IP cloaking
IP spoofing
ISACA

J
Jailbreaking

K
Kensington lock
Kerberos
Keylogger
Keystroke logger

L
Layer Socket Provider
Leet
Lock
Logic bomb
Login
Log off
LSP

M
Macro virus
Mail bomb
Mail relay
Malvertising
Malware
Man-in-the-middle attack
Manhole
Master Boot Record virus
MBR virus
MDC
Microsoft Security Essentials
Modification Detection Code
Multipart virus
Monitor
MSE

N
Node encryption
Non resident virus

O
Obfuscation
Orange book
OTP
Overrun
Overwrite virus

P
Packet monkey
Passphrase
Password
Password generator
Password manager
Patch
Payload
Permission
Personally identifiable information
PGP
Pharming
Phishing
Phreak
PII
Pixel tag
Policeware
Polymorphic virus
Port scanner
Predator
Pretty Good Privacy
Privacy
Privacy filter
Privilege level
Privileges
Promiscuous mode
Public Key Cryptography

Q
Quarantine

R
Random seed
Ransomware
RAT
Recover
Remote admin
Resident virus
Rookie
Root
Rootkit
RSA

S
Sabotage
Sandbox
Scam
Scareware
Scriptz
Scunthorpe problem
Secure connection
Security
Seed
Sextortion
Shoulder surfing
Sign off
Slogin
Snarf
Sniffing
Social engineering
Spam
Spear phishing
SPI
Spoof
Spoofing
Spybot
Spyware
SQL injection
SSH
Stealth virus
SYN attack

T
Tamper
Tempest
TheftGuard
Tracking bug
Trapdoor
Trojan horse
Trusted Execution Technology

U
UAC
Unauthorized access
Unlock
Update
Upgrade
Username

V
Vaccine
Virus
VoMM

W
War dial
War driving
Wardriving
WARP
Web beacon
Web bug
WEP
White hat
Windows 99
Windows Defender
Worm
WOT
WPA

X
Currently no listings
Y
Currently no listings
Z
Zero-day flaw
ZERT
Zombie

Zombie network







No comments:

Post a Comment