Computer security terms

Updated: 09/03/2019 by Computer Hope
Internet terms - Network terms
Top 10 computer security terms
Computer Virus

Network
Monitor
Incognito mode
Virus
Ethical hacking
Network terms
Username
Computer crime
Antivirus
HTTPS

Number

0-day
2600
3DES
419

A
Adware

Abort
Access
Access card
Access control system
Access denied
Account harvesting
Account lockout
ACE
ACL
Address spoof
Admin
Administrator
Administrative
Advisory
Adware
AES
ANI
Anonymous
Application gateway
Authentication
Authorize
Anti-spyware
Antivirus
Antivirus program
Antivirus software
Append virus
Asymmetric Encryption
Attachment
Attack
AUP
AV
AVS

B
bitlocker

Back orifice
Backdoor
Biometrics
Bitlocker
Black hat
Blacklist
Bleachbit
Block cipher
Blue box
Back orifice
BO
Bomb
Boot sector virus
Bootleg
Botnet
Bruteforce
Brute-force attack
Bug bounty
Burner phone
Bypass

C
Cult of the Dead Cow logo

Callback
Carnivore
Catfish
Cavity virus
CD key
CDA
CDC
CERT
Certificate
Certificate authority
Chain mail
Checksum
Chernobyl packet
Cipher
Ciphertext
Clbuttic
Cleartext
Clickjacking
Cloaking
CMA
CMOS virus
Code signing
Combofix
Communications act
Companion virus
Computer crime
Computer forensics
Computer fraud
Computer security
Con
Confidentiality
Cookie poisoning
COPPA
Copy protection
Crack
Cracker
Crackz
Credit card fraud
Cridex malware
CRL
Cross-site scripting
Cryptanalysis
Cryptography
Cryptolocker
Cryptology
Cyber law
Cyberwar
Cult of the dead cow
CVE

D
DEF CON

DACL
Dark web
Darknet
DARPA
Data carving
Data protection
Data Protection Directive
Data recovery
Data theft
DataDot
DCS1000
DDoS
Dead man's switch
Decryption
Deep Web
DEF CON
Deface
Default password
Definition
Denial
Denial Of Service
DES
DHS
Differential cryptanalysis
Diffie-Hellman
Dictionary attack
Digital rights management
Digital signature
Directory harvest attack
Disaster recovery
DLL injection
DLP
DNS hijacking
DoD
DoS
DoS attack
DRDoS
Drive-by download
DRM
DSO exploit
DSS
Dumpster diving

E
Encrypt

E-discovery
E-mail spoof
Earwigging
EAP
EAP-FAST
Eavesdropping
ECDSA
ECHELON
EFS
Elite
Encrypt
Encrypted virus
Ephemeral
EPIC
Ethical hacking
Evil twin
EVP
Executable virus
Exploit

F
ZyXEL ZyWall with Firewall

Fake antivirus
Family Safety
Federated identity
FIDO Alliance
File protection
Fingerprint
Filter
Firesheep
Firewall
Fishing
Flame
Flaw
Flood
Fob
FOIA
Foistware
Forensics
Fork bomb
Freedom of Information Act
Full rights
Fuzz testing

G

Gatekeeper
GCHQ
Glary Utilities
GlassWire
GPG
GPO
Gray hat

H
Computer hacker

Hack
Hackathon
Hacker
Hackz
Hashing
Haxor
Hazard
HDCP
Heap spraying
Heuristic
Hiew
Hijack
HijackThis
Hoax
Homomorphic encryption
Honey pot
HOPE
Hotfix
HouseCall
HTTPS

I
intrusion detection system

ICRA
IDEA
Identity theft
IDS
Inactive Account Manager
Incognito mode
InfoSec
Integrity
Intruder
Intrusion Detection System
IP cloaking
IP spoofing
IPS
ISACA

J

Jailed shell
Jailbreaking
JavaScript hijacking
Joe Job

K

Kali Linux
Kensington lock
Kerberos
Key fob
Keygen
Keylogger
Keystroke logger
Killer poke

L
Password

L3
Layer Socket Provider
Leet
Let's Encrypt
LFD
Linkjacking
Lock
Logic bomb
Login
Log off
LoJack
LSP

M
Backdoor

Macro virus
Mail bomb
Mail relay
Malvertisement
Malvertising
Malware
Man-in-the-middle attack
Manhole
Manifesto
Master Boot Record virus
MBR virus
MDC
Melissa virus
Meltdown
Metadata
Microsoft Security Essentials
MILNET
Modification Detection Code
Monkey testing
Multipart virus
Monitor
MSE

N
Department of Homeland Security (DHS) logo

National Cybersecurity Center
NAP
NCSC
Network
Network Access Protection
NIDS
Node encryption
Non-resident virus
NSA

O

Obfuscation
OCTAVE
One-time password
Orange book
OTP
Overrun
Overwrite virus

P
PRISM

Packet monkey
Passphrase
Password
Password generator
Password manager
Password protect
Passport
Patch
Patch Tuesday
Payload
Permission
Personally identifiable information
Penetration
Penetration test
Pentest
People hacking
PGP
Pharming
Phishing
Phreak
Picture password
Piggyback
PII
Pin
Ping storm
Pixel tag
Policeware
Polyinstantiation
Polymorphic virus
Port scanner
Predator
Pretty Good Privacy
Prime number
PRISM
Privacy
Privacy filter
Private
Privileges
Product key
Promiscuous mode
Proof-of-Work (PoW)
Public Key Cryptography

Q

Quantum cryptography
Quarantine

R
Computer security

Rabbit virus
Rainbow
Random seed
Ransomware
RAT
RBAC
RCE
Read-only
Recover
Remote admin
Reset password
Resident virus
Restricted function
Right
Rijndael encryption
Role-based access control
Rookie
Root
Rootkit
RSA
Rule

S
Social engineering

Sabotage
Salami Slicing
Sandbox
Sanitized data
SATAN
Scam
Scareware
Script-kiddie
Scriptz
Scunthorpe problem
SDDL
Secure boot
Secure connection
Secure Enclave
Security hole
Secure network
Security
Security through obscurity
Seed
SELinux
Setuid
Sextortion
Shadow
Shadow ban
Shellshock
Shoulder surfing
Sidejacking
SIGINT
Sign off
Silk Road
Slack space
Slogin
Smurf attack
Smishing
Snarf
Sniffing
Social engineering
Spacefiller virus
Spam
Spectre
Spear phishing
SPI
Spit
Spoof
Spoofing
Spybot
Spyware
SQL injection
SSH
SSL
Stealth virus
Stuxnet
SYN attack

T
Trojan horse

Tamper
TCPA
Tempest
Theft
TheftGuard
Throwaway account
TLS
TOR
Tor Browser
Tracking
Tracking bug
Trapdoor
Trojan
Trojan horse
Truecrypt
Trusted Execution Technology
Two-factor authentication

U
Computer fraud

UAC
Unauthorized access
Unethical hack
Unit 8200
Unlock
Update
Upgrade
Username
UTM

V

Vaccine
Vein recognition
Virus
Virus signature
Viruses
VoMM

W
White hat

Wabbit
War dial
War driving
Warchalking
Wardriving
WARP
Wave bubble
Web beacon
Web bug
WEP
Whaling
White hat
Windows 99
Windows Defender
WireShark
Worm
WOT
WPA

X

Currently no listings

Y

Currently no listings

Z

Zero-day flaw
Zero filling
ZERT
Zombie
Zombie network
Zoo