Computer security terms

Updated: 05/06/2024 by Computer Hope
Internet terms - Network terms
Top 10 computer security terms
Computer Virus

Network
Prime number
Username
Computer crime
Monitor
Scam
Unauthorized access
Cyber law
Update
Antivirus

Number

0-day
2600
2FA
3DES
419

A
Adware on a computer

Abort
Abuse
Access
Access card
Access control system
Access denied
Access log
Access number
Access rights
Account harvesting
Account lockout
ACE
ACL
Actor
Address spoof
Admin
Administrator
Administrative
Advanced persistent threat
Advisory
Adware
AES
Air gap
ANI
Anonymous
Application gateway
Authentication
Authorize
Anti-spyware
Antivirus
Antivirus program
Antivirus software
Append virus
APT
Asymmetric cryptography
Atlas VPN
Attachment
Attack
Attack tagging
Attaging
AUP
Authy
AV
AVS

B
Bitlocker on Windows 10

Back orifice
Backdoor
Bad actor
Bifurcate
Biometrics
Bitlocker
Black hat
Blacklist
Blagging
Bleachbit
Block cipher
Blue box
Back orifice
BO
Bomb
Boot sector virus
Bootleg
Botnet
Breach
Bruteforce
Brute-force attack
Bug bounty
Burner
Butt dial
Bypass

C
Cult of the Dead Cow logo

Callback
Card
Carnivore
Catfish
Cavity virus
CCTV
CD key
CDA
CDC
Censorship
CERT
Certificate
Certificate authority
Chain mail
Checksum
Chernobyl packet
Chilling effect
Chrome notifications
CIA
Cipher
Ciphertext
CISSP
Clbuttic
Cleartext
Clickjacking
Cloaking
CMA
CMOS virus
Code signing
Cold call
Combofix
Communications act
Companion virus
Compromise
Compromised
Compromised account
Computer crime
Computer forensics
Computer fraud
Computer security
Computer security risk
Con
Confidentiality
Cookie poisoning
COPPA
Copy protection
Crack
Cracker
Crackz
Credential
Credit card fraud
Cridex malware
CRL
Cross-site scripting
Cryptanalysis
Cryptographic nonce
Cryptography
Cryptolocker
Cryptology
Cybercriminal
Cyberextortionist
Cyber law
Cyberwar
Cult of the dead cow
CVE

D
DEF CON

DACL
Dark web
Darknet
Dark pattern
DARPA
Data breach
Data carving
Data diddling
Data loss
Data protection
Data Protection Directive
Data recovery
Data theft
DataDot
DCS1000
DDoS
Dead man's switch
Decryption
Deep Web
DEF CON
Deface
Default password
Definition
Denial
Denial Of Service
DES
DHS
Differential cryptanalysis
Diffie-Hellman
Diffie-hellman key exchange
Dictionary attack
Digital citizenship
Digital rights management
Digital signature
Directory harvest attack
Disaster recovery
DLL injection
DLP
DNS hijacking
DoD
DoS
DoS attack
Doxing
DRDoS
Drive-by download
DRM
DroidKit
DSO
DSO exploit
DSS
Dumpster diving

E
Encrypt data for security

E-discovery
E-mail spoof
Earwigging
EAP
EAP-FAST
Eavesdropping
ECDSA
ECHELON
EFS
Elite
Encrypt
Encrypted virus
Endpoint
End-to-end encryption
Ephemeral
EPIC
Ethical hacking
Evil twin
EVP
Executable virus
Exploit
ExpressVPN

F
ZyXEL ZyWall with Firewall

Face ID
Facial recognition
Fake
Fake antivirus
Fake tech support
Family Safety
FBI
Federated identity
Fencing
FIDO Alliance
File protection
File tab
Fingerprint
Filter
FIPS
Firesheep
Firewall
Fishing
Flame
Flaw
Flood
Fob
FOIA
Foistware
Forensics
Fork bomb
Freedom of Information Act
Full rights
Fuzz testing

G

Gatekeeper
GCHQ
Glary Utilities
GlassWire
Google Authenticator
Google Nest
GPG
GPO
Gray hat

H
Anonymous individual using a laptop.

Hack
Hackathon
Hacker
HackerOne
Hacktivism
Hactivist
Hackz
Harvester
Hash
Hashing
Haxor
Hazard
HDCP
Heap spraying
Heuristic
Hiew
Hijack
HijackThis
Hoax
Homomorphic encryption
Honeypot
HOPE
Hotfix
HouseCall
HTTP
HTTPS

I
intrusion detection system

ICRA
IDEA
Identity
Identity theft
IDS
Inactive Account Manager
Incognito mode
Infect
InfoSec
Insider
Insider threat
Integrity
Intruder
Intrusion detection software
Intrusion detection system
IP cloaking
IPsec
IP spoofing
IPS
ISACA
Island hopping

J

Jailed shell
Jailbreaking
JavaScript hijacking
Joe Job

K

Kali Linux
Kensington lock
Kerberos
Key fob
Keygen
Keylogger
Keystroke logger
Killer poke

L
Password for Linux account

L3 cache
LastPass
Layer Socket Provider
Leak
Leet
Let's Encrypt
LFD
Linkjacking
Lock
Lockdown
Locked file
Lock screen
Logic bomb
Login
Login screen
Log off
LoJack
Loophole
LSP

M
Backdoor access to a computer or server

Macro virus
Mail bomb
Mail relay
Malicious
Malicious actor
Malicious payload
Malvertisement
Malvertising
Malware
Malwarebytes
Malware dropper
Man-in-the-middle attack
Manhole
Manifesto
Master Boot Record virus
MBR virus
MDC
Melissa virus
Meltdown
Metadata
MFA
Microsoft Defender Antivirus
Microsoft Security Essentials
MILNET
Mixing
Modification Detection Code
Monkey testing
Mullvad
Multi-factor authentication
Multipart virus
Multipartite virus
Monitor
MSE

N
Department of Homeland Security (DHS) logo

National Cybersecurity Center
NAP
Nation state
NCSC
Network
Network Access Protection
NIDS
NOBUS
Node encryption
Nonce
Non-resident virus
NordVPN
NSA

O

Obfuscation
OCTAVE
One-time password
Orange book
OTP
Overrun
Overwrite
Overwrite virus
OWASP

P
PRISM logo

Packet monkey
Passcode
Passphrase
Password
Password generator
Password manager
Password protect
Passport
Patch
Patch Tuesday
Pattern file
Payload
Permission
Personally identifiable information
Penetration
Penetration test
Pentest
People hacking
PGP
Pharming
Phishing
Phreak
Picture password
Pig butchering
Piggyback
PII
Pin
Ping storm
Pivot
Pivoting
Pixel tag
Pocket call
Pocket dial
POE
Point of entry
Police scanner
Policeware
Polyinstantiation
Polymorphic virus
Port scanner
Possessed object
PoW
Predator
Pretty Good Privacy
Prime number
PRISM
Privacy
Privacy filter
Private
Privileges
Product key
Promiscuous mode
Proof-of-Work
Protected
Public-key cryptography
Public-key forward secrecy
Pump and dump
PureVPN

Q

Quantum cryptography
Quarantine

R
Computer security

Rabbit virus
Rainbow
Random seed
Ransomware
RAT
RBAC
RCE
Read-only
Recover
Remote admin
Reset password
Resident virus
Restricted function
Right
Rijndael encryption
Risk
Role-based access control
Rookie
Root
Rootkit
RSA
Rule

S
Social engineering

Sabotage
Safe
Samsung Knox
Salami Slicing
Sandbox
Sanitized data
SATAN
Scam
Scareware
Script kiddie
Scriptz
Scunthorpe problem
SDDL
Secret question
Secure boot
Secure connection
Secure Enclave
Security
Security hole
Security question
Secure network
Security
Security through obscurity
Seed
SELinux
Setuid
Sextortion
Shadow
Shadow ban
Shellshock
Shoulder surfing
Sidejacking
SIGINT
Sign off
Silk Road
Simjacking
SIM swap
SIM swap scam
Slack space
Slogin
Smurf attack
Smishing
Snarf
Sniffing
Social engineering
Spacefiller virus
Spam
Spectre
Spear phishing
SPI
SPIT
Spoof
Spoofing
Spybot
Spyware
SQL injection
SSH
SSL
Stealth virus
Stuxnet
Superfish
Surfshark
Swatting
SYN attack

T
Trojan horse

Tabnabbing
Tamper
Tarsnap
TCPA
Tempest
Threat
Threat actor
Theft
TheftGuard
Throwaway account
TLS
Tor
Tor Browser
Track
Tracking
Tracking bug
Trapdoor
Trip code
Trojan
Trojan horse
Truecrypt
TrustArc
TRUSTe
Trusted Execution Technology
Trusted source
Two-factor authentication

U
Computer fraud

UAC
Unauthorized access
Unethical hacking
Unit 8200
Unlock
Update
Upgrade
USENIX
Username
UTM

V

Vaccine
Vandalism
Vein recognition
Virus
Virus signature
Viruses
Vishing
VoMM
Vulnerability

W
White hat

Wabbit
War dial
War driving
Warchalking
Wardriving
WARP
Watch list
Wave bubble
Web beacon
Web bug
Web harvester
WEP
Whale
Whaling
White hat
Windows 99
Windows Defender
Windows Defender Antivirus
Windows Defender Firewall
WireShark
Worm
WOT
WPA

X

Currently, no listings.

Y

Currently, no listings.

Z

Zero-day flaw
Zero filling
ZERT
Zombie
Zombie network
Zoo

Back to the computer dictionary