Computer security terms

Internet definitions - Network definitions
Number

0-day
2600
3DES
419

A

Abort
Access
Access control system
Access denied
Account harvesting
Account lockout
ACE
ACL
Address spoof
Admin
Administrator
Administrative
Advisory
Adware
AES
ANI
Anonymous
Application gateway
Authentication
Authorize
Anti-spyware
Antivirus
Antivirus program
Antivirus software
Asymmetric Encryption
Attachment
Attack
AV
AVS

B

Backdoor
Biometrics
Bitlocker
Black hat
Blacklist
Block cipher
Blue box
Back orifice
BO
Bomb
Boot sector virus
Botnet
Bruteforce
Brute-force attack
Bypass

C

Callback
Carnivore
Catfish
CDA
CDC
CERT
Certificate
Chain mail
Chernobyl packet
Cipher
Clbuttic
Cleartext
Clickjacking
Cloaking
CMA
CMOS virus
Code signing
Combofix
Communications act
Companion virus
Computer crime
Computer forensics
Computer fraud
Computer security
Con
Confidentiality
Cookie poisoning
COPPA
Copy protection
Crack
Cracker
Crackz
Credit card fraud
Cridex malware
CRL
Cryptography
Cryptolocker
Cryptology
Cyber law
Cyberwar
Cult of the dead cow

D

DACL
Darknet
DARPA
Data Protection Directive
Data theft
DataDot
DCS1000
DDoS
Decryption
Deep Web
DEF CON
Deface
Default password
Definition
Denial Of Service
DES
DHS
Diffie-Hellman
Dictionary attack
Digital signature
Directory harvest attack
DLL injection
DLP
DNS hijacking
DoD
DoS
DoS attack
Drive-by download
DRM
DSO exploit
Dumpster diving

E

E-discovery
E-mail bomb
E-mail spoof
Earwigging
EAP
EAP-FAST
Eavesdropping
ECDSA
ECHELON
EFS
Elite
Encrypt
Ephemeral
EPIC
Ethical hacking
Evil twin
EVP
Executable virus
Exploit

F

Family Safety
Federated identity
File protection
Finger print
Filter
Firesheep
Firewall
Fishing
Flame
Flaw
Flood
Foistware
Forensics
Fork bomb
Full rights

G

Gatekeeper
GPO
Gray hat

H

Hack
Hackathon
Hacker
Hackz
Hashing
Haxor
Hazard
Heap spraying
Heuristic
Hiew
Hijack
HijackThis
Hoax
Homomorphic encryption
Honey pot
HOPE
Hotfix
HouseCall
HTTPS

I

ICRA
IDEA
Identity theft
IDS
Incognito mode
InfoSec
Intruder
Intrusion Detection System
IP cloaking
IP spoofing
ISACA

J

Jailbreaking
JavaScript hijacking

K

Kensington lock
Kerberos
Keylogger
Keystroke logger

L

L3
Layer Socket Provider
Leet
Linkjacking
Lock
Logic bomb
Login
Log off
LoJack
LSP

M

Macro virus
Mail bomb
Mail relay
Malvertising
Malware
Man-in-the-middle attack
Manhole
Master Boot Record virus
MBR virus
MDC
Melissa virus
Microsoft Security Essentials
MILNET
Modification Detection Code
Multipart virus
Monitor
MSE

N

National Cybersecurity Center
NAP
NCSC
Network
Network Access Protection
NIDS
Node encryption
Non resident virus
NSA

O

Obfuscation
OCTAVE
One-time password
Orange book
OTP
Overrun
Overwrite virus

P

Packet monkey
Passphrase
Password
Password generator
Password manager
Patch
Patch Tuesday
Payload
Permission
Personally identifiable information
Penetration
Penetration test
Pentest
PGP
Pharming
Phishing
Phreak
Piggyback
PII
Ping storm
Pixel tag
Policeware
Polymorphic virus
Port scanner
Predator
Pretty Good Privacy
PRISM
Privacy
Privacy filter
Privilege level
Privileges
Promiscuous mode
Public Key Cryptography

Q

Quantum cryptography
Quarantine

R

Rabbit virus
Rainbow
Random seed
Ransomware
RBAC
RAT
Recover
Remote admin
Reset password
Resident virus
Rijndael encryption
Role-Based Access Control
Rookie
Root
Rootkit
RSA

S

Sabotage
Salami Slicing
Sandbox
Sanitized data
SATAN
Scam
Scareware
Scriptz
Scunthorpe problem
SDDL
Secure connection
Security
Seed
SELinux
Setuid
Sextortion
Shoulder surfing
Sidejacking
Sign off
Slack space
Slogin
Smurf attack
Smishing
Snarf
Sniffing
Social engineering
Spam
Spear phishing
SPI
Spoof
Spoofing
Spybot
Spyware
SQL injection
SSH
SSL
Stealth virus
Stuxnet
SYN attack

T

Tamper
Tempest
Theft
TheftGuard
Throwaway account
TLS
TOR
Tor Browser
Tracking
Tracking bug
Trapdoor
Trojan
Trojan horse
Truecrypt
Trusted Execution Technology
Two-factor authentication

U

UAC
Unauthorized access
Unethical hack
Unlock
Update
Upgrade
Username

V

Vaccine
Virus
Virus signature
Viruses
VoMM

W

Wabbit
War dial
War driving
Wardriving
WARP
Wave bubble
Web beacon
Web bug
WEP
White hat
Windows 99
Windows Defender
WireShark
Worm
WOT
WPA

X
Currently no listings
Y
Currently no listings
Z

Zero-day flaw
ZERT
Zombie
Zombie network