Computer Security Terms

This page provides links to computer security terms and their definitions.

Access ControlAdwareAsymmetric Cryptography
AttackAuthenticationAuthorization
AvailabilityBackdoorBHO
Browser HijackingBrute Force AttackBuffer Overflow
CHAPCipherCiphertext
ConfidentialityCookiesCryptoanalysis
CryptographyCryptologyDDOS Attack
DecipherDecryptionDenial of Service
DialersDictionary AttackDigital Certificate
Digital KeyDigital SignatureDigital Snooping
Disaster RecoveryDMZDNS Cache Poisoning
DOSDynamic Packet FilteringEaster Egg
EavesdroppingEgress FilteringEncipher
EncryptionFirewallFirewall Rules
Fraggle AttackHackHacker
Hacker ToolHardeningHoney Pot
ImpersonalizationIncidentIncident Handling
Ingress FilteringIntegrityIntrusion Detection
Intrusion PreventionIPSecKeylogger
Land AttackLeast PrivilegeLogic Bomb
MalwareMasqueradeNetwork Sniffer
ParasitePassword CrackingPenetration Testing
Ping of DeathPlaintextPort Scanner
Port ScanningRabbitReplay Attack
Risk AssessmentSaltingScanning
Script KiddieSecurity AssociationsSession Hijacking
Shoulder SnoopingSmurf AttackSnooping
SPAMSpoofingSpyware
SQL InjectionStatic Packet FilteringSymmetric Cryptography
SYN AttackTeardrop AttackThreat
Time BombTraffic FilteringTrojan
TunnelingUser ResponsibilitiesUser Rights
VirusVPNVulnerability
WardialingWardrivingWorm