Computer security terms

Updated: 08/08/2017 by Computer Hope
Internet definitions - Network definitions
Top 10 Computer Security Terms

Computer VirusNetwork
Monitor
Incognito mode
Virus
Ethical hacking
Network definitions
Username
Computer crime
Antivirus
HTTPS

Number

0-day
2600
3DES
419

A

AdwareAbort
Access
Access control system
Access denied
Account harvesting
Account lockout
ACE
ACL
Address spoof
Admin
Administrator
Administrative
Advisory
Adware
AES
ANI
Anonymous
Application gateway
Authentication
Authorize
Anti-spyware
Antivirus
Antivirus program
Antivirus software
Append virus
Asymmetric Encryption
Attachment
Attack
AV
AVS

B

bitlockerBackdoor
Biometrics
Bitlocker
Black hat
Blacklist
Block cipher
Blue box
Back orifice
BO
Bomb
Boot sector virus
Botnet
Bruteforce
Brute-force attack
Bug bounty
Bypass

C

Cult of the Dead Cow logoCallback
Carnivore
Catfish
Cavity virus
CDA
CDC
CERT
Certificate
Chain mail
Chernobyl packet
Cipher
Clbuttic
Cleartext
Clickjacking
Cloaking
CMA
CMOS virus
Code signing
Combofix
Communications act
Companion virus
Computer crime
Computer forensics
Computer fraud
Computer security
Con
Confidentiality
Cookie poisoning
COPPA
Copy protection
Crack
Cracker
Crackz
Credit card fraud
Cridex malware
CRL
Cross-site scripting
Cryptanalysis
Cryptography
Cryptolocker
Cryptology
Cyber law
Cyberwar
Cult of the dead cow

D

DEF CONDACL
Darknet
DARPA
Data Protection Directive
Data theft
DataDot
DCS1000
DDoS
Dead man's switch
Decryption
Deep Web
DEF CON
Deface
Default password
Definition
Denial Of Service
DES
DHS
Diffie-Hellman
Dictionary attack
Digital rights management
Digital signature
Directory harvest attack
DLL injection
DLP
DNS hijacking
DoD
DoS
DoS attack
Drive-by download
DRM
DSO exploit
Dumpster diving

E

EncryptE-discovery
E-mail spoof
Earwigging
EAP
EAP-FAST
Eavesdropping
ECDSA
ECHELON
EFS
Elite
Encrypt
Encrypted virus
Ephemeral
EPIC
Ethical hacking
Evil twin
EVP
Executable virus
Exploit

F

Picture of ZyXEL ZyWall with FirewallFamily Safety
Federated identity
FIDO Alliance
File protection
Finger print
Filter
Firesheep
Firewall
Fishing
Flame
Flaw
Flood
FOIA
Foistware
Forensics
Fork bomb
Freedom of Information Act
Full rights
Fuzz testing

G

Gatekeeper
GCHQ
GPO
Gray hat

H

Computer hackerHack
Hackathon
Hacker
Hackz
Hashing
Haxor
Hazard
Heap spraying
Heuristic
Hiew
Hijack
HijackThis
Hoax
Homomorphic encryption
Honey pot
HOPE
Hotfix
HouseCall
HTTPS

I

intrusion detection systemICRA
IDEA
Identity theft
IDS
Inactive Account Manager
Incognito mode
InfoSec
Integrity
Intruder
Intrusion Detection System
IP cloaking
IP spoofing
IPS
ISACA

J

Jailed shell
Jailbreaking
JavaScript hijacking

K

Kali Linux
Kensington lock
Kerberos
Keylogger
Keystroke logger
Killer poke

L

PasswordL3
Layer Socket Provider
Leet
Linkjacking
Lock
Logic bomb
Login
Log off
LoJack
LSP

M

BackdoorMacro virus
Mail bomb
Mail relay
Malvertising
Malware
Man-in-the-middle attack
Manhole
Master Boot Record virus
MBR virus
MDC
Melissa virus
Microsoft Security Essentials
MILNET
Modification Detection Code
Monkey testing
Multipart virus
Monitor
MSE

N

Department of Homeland Security (DHS) logoNational Cybersecurity Center
NAP
NCSC
Network
Network Access Protection
NIDS
Node encryption
Non resident virus
NSA

O

Obfuscation
OCTAVE
One-time password
Orange book
OTP
Overrun
Overwrite virus

P

PRISMPacket monkey
Passphrase
Password
Password generator
Password manager
Patch
Patch Tuesday
Payload
Permission
Personally identifiable information
Penetration
Penetration test
Pentest
People hacking
PGP
Pharming
Phishing
Phreak
Piggyback
PII
Ping storm
Pixel tag
Policeware
Polyinstantiation
Polymorphic virus
Port scanner
Predator
Pretty Good Privacy
Prime
PRISM
Privacy
Privacy filter
Privileges
Promiscuous mode
Public Key Cryptography

Q

Quantum cryptography
Quarantine

R

Computer securityRabbit virus
Rainbow
Random seed
Ransomware
RBAC
RAT
Recover
Remote admin
Reset password
Resident virus
Rijndael encryption
Role-Based Access Control
Rookie
Root
Rootkit
RSA

S

Social engineeringSabotage
Salami Slicing
Sandbox
Sanitized data
SATAN
Scam
Scareware
Scriptz
Scunthorpe problem
SDDL
Secure boot
Secure connection
Secure network
Security
Security through obscurity
Seed
SELinux
Setuid
Sextortion
Shellshock
Shoulder surfing
Sidejacking
Sign off
Silk Road
Slack space
Slogin
Smurf attack
Smishing
Snarf
Sniffing
Social engineering
Spacefiller virus
Spam
Spear phishing
SPI
Spoof
Spoofing
Spybot
Spyware
SQL injection
SSH
SSL
Stealth virus
Stuxnet
SYN attack

T

Trojan horseTamper
Tempest
Theft
TheftGuard
Throwaway account
TLS
TOR
Tor Browser
Tracking
Tracking bug
Trapdoor
Trojan
Trojan horse
Truecrypt
Trusted Execution Technology
Two-factor authentication

U

Computer fraudUAC
Unauthorized access
Unethical hack
Unit 8200
Unlock
Update
Upgrade
Username
UTM

V

Vaccine
Virus
Virus signature
Viruses
VoMM

W

White hatWabbit
War dial
War driving
Wardriving
WARP
Wave bubble
Web beacon
Web bug
WEP
White hat
Windows 99
Windows Defender
WireShark
Worm
WOT
WPA

X
Currently no listings
Y
Currently no listings
Z

Zero-day flaw
ZERT
Zombie
Zombie network