Computer security terms

Internet definitions - Network definitions
Number

0-day
2600
419

A

Abort
Access
Access control system
Access denied
Account harvesting
Account lockout
ACE
ACL
Address spoof
Admin
Administrator
Administrative
Advisory
Adware
AES
ANI
Anonymous
Application gateway
Authentication
Authorize
Anti-spyware
Antivirus
Antivirus program
Antivirus software
Asymmetric Encryption
Attachment
Attack
AV
AVS

B

Backdoor
Biometrics
Bitlocker
Black hat
Blacklist
Blue box
Back orifice
BO
Bomb
Boot sector virus
Botnet
Bruteforce
Brute-force attack
Bypass

C

Callback
Carnivore
Catfish
CDA
CERT
Certificate
Chain mail
Cipher
Clbuttic
Cleartext
Clickjacking
Cloaking
CMA
CMOS virus
Code signing
Combofix
Communications act
Companion virus
Computer crime
Computer forensics
Computer fraud
Computer security
Con
Confidentiality
Cookie poisoning
COPPA
Copy protection
Crack
Cracker
Crackz
Credit card fraud
CRL
Cryptography
Cryptology
Cyberwar

D

DACL
Darknet
DARPA
Data theft
DataDot
DCS1000
DDoS
Decryption
DEF CON
Deface
Default password
Definition
Denial Of Service
DES
DHS
Diffie-Hellman
Dictionary attack
Digital signature
DLL injection
DNS hijacking
DoD
DoS
DoS attack
Drive-by download
DRM
DSO exploit
Dumpster diving

E

E-discovery
E-mail bomb
E-mail spoof
Earwigging
EAP
Eavesdropping
ECHELON
EFS
Elite
Encrypt
Ephemeral
EPIC
Ethical hacking
Evil twin
EVP
Executable virus
Exploit

F

Family Safety
Federated identity
File protection
Finger print
Filter
Firesheep
Firewall
Fishing
Flame
Flaw
Flood
Foistware
Forensics
Fork bomb
Full rights

G

Gatekeeper
GPO
Gray hat

H

Hack
Hackathon
Hacker
Hackz
Hashing
Haxor
Heuristic
Hijack
HijackThis
Hoax
Honey pot
Hotfix
HouseCall
HTTPS

I

ICRA
Identity theft
IDS
Incognito mode
Intruder
Intrusion Detection System
IP cloaking
IP spoofing
ISACA

J

Jailbreaking
JavaScript hijacking

K

Kensington lock
Kerberos
Keylogger
Keystroke logger

L

L3
Layer Socket Provider
Leet
Linkjacking
Lock
Logic bomb
Login
Log off
LSP

M

Macro virus
Mail bomb
Mail relay
Malvertising
Malware
Man-in-the-middle attack
Manhole
Master Boot Record virus
MBR virus
MDC
Melissa virus
Microsoft Security Essentials
MILNET
Modification Detection Code
Multipart virus
Monitor
MSE

N

Network
NIDS
Node encryption
Non resident virus
NSA

O

Obfuscation
Orange book
OTP
Overrun
Overwrite virus

P

Packet monkey
Passphrase
Password
Password generator
Password manager
Patch
Patch Tuesday
Payload
Permission
Personally identifiable information
Penetration
PGP
Pharming
Phishing
Phreak
PII
Pixel tag
Policeware
Polymorphic virus
Port scanner
Predator
Pretty Good Privacy
PRISM
Privacy
Privacy filter
Privilege level
Privileges
Promiscuous mode
Public Key Cryptography

Q

Quarantine

R

Rabbit virus
Random seed
Ransomware
RAT
Recover
Remote admin
Resident virus
Rijndael encryption
Rookie
Root
Rootkit
RSA

S

Sabotage
Salami Slicing
Sandbox
SATAN
Scam
Scareware
Scriptz
Scunthorpe problem
Secure connection
Security
Seed
Sextortion
Shoulder surfing
Sidejacking
Sign off
Slack space
Slogin
Smurf attack
Smishing
Snarf
Sniffing
Social engineering
Spam
Spear phishing
SPI
Spoof
Spoofing
Spybot
Spyware
SQL injection
SSH
SSL
Stealth virus
Stuxnet
SYN attack

T

Tamper
Tempest
Theft
TheftGuard
Throwaway account
TOR
Tracking
Tracking bug
Trapdoor
Trojan
Trojan horse
Truecrypt
Trusted Execution Technology

U

UAC
Unauthorized access
Unlock
Update
Upgrade
Username

V

Vaccine
Virus
Virus signature
Viruses
VoMM

W

Wabbit
War dial
War driving
Wardriving
WARP
Web beacon
Web bug
WEP
White hat
Windows 99
Windows Defender
WireShark
Worm
WOT
WPA

X
Currently no listings
Y
Currently no listings
Z

Zero-day flaw
ZERT
Zombie
Zombie network