Internet Security Glossary - Index
*-property
3DES
ABA Guidelines
Abstract Syntax Notation One
ACC
access
access control
access control center
access control list
access control service
access mode
accountability
accredit
accreditation
ACL
acquirer
active attack
active wiretapping
add-on security
administrative security
Advanced Encryption Standard
adversary
AES
aggregation
AH
algorithm
alias
American National Standards Institute
anonymous
anonymous login
ANSI
APOP
archive
ARL
ARPANET
ASN.1
association
assurance
assurance level
asymmetric cryptography
attack
attribute authority
attribute certificate
audit service
audit trail
AUTH
authentic signature
authenticate
authentication
authentication code
authentication exchange
Authentication Header
authentication information
authentication service
authenticity
authority
authority certificate
authority revocation list
authorization
authorize
automated information system
availability
availability service
back door
back up vs. backup
baggage
bandwidth
bank identification number
Basic Encoding Rules
bastion host
BCA
BCI
Bell-LaPadula Model
BER
beyond A1
BIN
bind
biometric authentication
bit
BLACK
block cipher
Blowfish
brand
brand certification authority
brand CRL identifier
break
bridge
British Standard 7799
browser
brute force
BS7799
byte
CA
CA certificate
call back
capability
CAPI
CAPSTONE chip
card
card backup
card copy
card restore
cardholder
cardholder certificate
cardholder certification authority
CAST
category
CAW
CBC
CCA
CCITT
CERT
certificate
certificate authority
certificate chain
certificate chain validation
certificate creation
certificate expiration
certificate extension
certificate holder
certificate management
certificate owner
certificate policy
certificate policy qualifier
certificate reactivation
certificate rekey
certificate renewal
certificate request
certificate revocation
certificate revocation list
certificate revocation tree
certificate serial number
certificate status responder
certificate update
certificate user
certificate validation
certification
certification authority
certification authority workstation
certification hierarchy
certification path
certification policy
certification practice statement
certification request
certify
CFB
Challenge Handshake Authentication Protocol
challenge-response
Challenge-Response Authentication Mechanism
channel
CHAP
checksum
chosen-ciphertext attack
chosen-plaintext attack
CIAC
CIK
cipher
cipher block chaining
cipher feedback
ciphertext
ciphertext-only attack
CIPSO
CKL
class 2, 3, 4, or 5
classification
classification level
classified
clean system
clearance
clearance level
cleartext
client
CLIPPER chip
closed security environment
CMS
code
color change
Common Criteria
Common Criteria for Information Technology Security
Common IP Security Option
common name
communication security
community string
compartment
compromise
compromised key list
COMPUSEC
computer emergency response team
Computer Incident Advisory Capability
computer network
computer security
computer security incident response team
computer security object
Computer Security Objects Register
COMSEC
confidentiality
configuration control
confinement property
connectionless data integrity service
contingency plan
controlled security mode
cookie
Coordinated Universal Time
copy
correctness integrity
correctness proof
countermeasure
country code
covert channel
CPS
cracker
CRAM
CRC
credential
critical
CRL
CRL distribution point
CRL extension
cross-certificate
cross-certification
cryptanalysis
crypto
cryptographic algorithm
cryptographic application programming interface
cryptographic card
cryptographic component
cryptographic hash
cryptographic ignition key
cryptographic key
Cryptographic Message Syntax
cryptographic module
cryptographic system
cryptographic token
cryptography
Cryptoki
cryptology
cryptonet
cryptoperiod
cryptosystem
CSIRT
CSOR
cut-and-paste attack
cyclic redundancy check
DAC
DAP
DASS
data
Data Authentication Algorithm
data authentication code vs. Data Authentication Code
data compromise
data confidentiality
data confidentiality service
Data Encryption Algorithm
data encryption key
Data Encryption Standard
data integrity
data integrity service
data origin authentication
data origin authentication service
data privacy
data security
datagram
DEA
deception
decipher
decipherment
decode
decrypt
decryption
dedicated security mode
default account
degauss
degausser
DEK
delta CRL
denial of service
DER
DES
dictionary attack
Diffie-Hellman
digest
digital certificate
digital certification
digital document
digital envelope
Digital ID
digital key
digital notary
digital signature
Digital Signature Algorithm
Digital Signature Standard
digital watermarking
digitized signature
Directory
directory
Directory Access Protocol
directory vs. Directory
disaster plan
disclosure
discretionary access control
disruption
Distinguished Encoding Rules
distinguished name
Distributed Authentication Security Service
distribution point
DN
DNS
DOI
domain
domain name
Domain Name System
domain of interpretation
dominate
dongle
downgrade
draft RFC
DSA
DSS
dual control
dual signature
EAP
eavesdropping
ECB
ECC
ECDSA
economy of mechanism
EDI
EDIFACT
EE
EES
El Gamal algorithm
electronic codebook
electronic commerce
electronic data interchange
electronic signature
elliptic curve cryptography
Elliptic Curve Digital Signature Algorithm
emanation
emanations security
emergency plan
EMSEC
EMV
Encapsulating Security Payload
encipher
encipherment
encode
encrypt
encryption
encryption certificate
end entity
end system
end user
end-to-end encryption
entity
entrapment
ephemeral key
error detection code
Escrowed Encryption Standard
ESP
Estelle
evaluated products list
evaluated system
expire
exposure
Extensible Authentication Protocol
extension
extranet
fail safe
fail soft
failure control
Federal Information Processing Standards
Federal Public-key Infrastructure
Federal Standard 1027
File Transfer Protocol
filtering router
financial institution
fingerprint
FIPS
FIPS PUB 140-1
firewall
firmware
FIRST
flaw hypothesis methodology
flooding
flow analysis
flow control
formal specification
formulary
FORTEZZA
Forum of Incident Response and Security Teams
forward secrecy
FPKI
FTP
gateway
GCA
GeneralizedTime
Generic Security Service Application Program Interface
geopolitical certificate authority
Green Book
GRIP
GSS-API
guard
guest login
GULS
hacker
handle
hardware
hardware token
hash code
hash function
hash result
hash value
hierarchical PKI
hierarchy management
hierarchy of trust
hijack attack
HMAC
honey pot
host
HTML
HTTP
https
hybrid encryption
hyperlink
hypermedia
hypertext
Hypertext Markup Language
Hypertext Transfer Protocol
IAB
IANA
ICANN
ICMP
ICMP flood
ICRL
IDEA
identification
Identification Protocol
identity-based security policy
IEEE
IEEE 802.10
IEEE P1363
IESG
IETF
IKE
IMAP4
IMAP4 AUTHENTICATE
in the clear
indirect certificate revocation list
indistinguishability
information
Information Technology Security Evaluation Criteria
INFOSEC
initialization value
initialization vector
insider attack
Institute of Electrical and Electronics Engineers, Inc.
integrity
integrity check
intelligent threat
International Data Encryption Algorithm
International Standard
International Traffic in Arms Regulations
Internet
internet
Internet Architecture Board
Internet Assigned Numbers Authority
Internet Control Message Protocol
Internet Corporation for Assigned Names and Numbers
Internet Draft
Internet Engineering Steering Group
Internet Engineering Task Force
Internet Message Access Protocol, version 4
Internet PCA
Internet Policy Registration Authority
Internet Protocol
Internet Protocol security
Internet Protocol Security Option
Internet Protocol Suite
Internet Security Association and Key Management Protocol
Internet Society
Internet Standard
Internet Standards document
internet vs. Internet
internetwork
intranet
intruder
intrusion
intrusion detection
invalidity date
IP
IP address
IP Security Option
IPRA
IPsec
IPsec Key Exchange
IPSO
ISAKMP
ISD
ISO
ISOC
issue
issuer
ITAR
ITSEC
ITU-T
IV
KDC
KEA
KEK
Kerberos
key
key agreement
key authentication
key center
key confirmation
key distribution
key distribution center
key encapsulation
key escrow
key establishment
Key Exchange Algorithm
key generation
key generator
key length
key lifetime
key management
Key Management Protocol
key material identifier
key pair
key recovery
key space
key translation center
key transport
key update
key validation
key-encrypting key
keyed hash
keying material
KMID
KMP
known-plaintext attack
L2F
L2TP
label
Language of Temporal Ordering Specification
lattice model
Law Enforcement Access Field
Layer 2 Forwarding Protocol
Layer 2 Tunneling Protocol
LDAP
LEAF
least privilege
Lightweight Directory Access Protocol
link
link encryption
link-by-link encryption
logic bomb
login
LOTOS
MAC
malicious logic
malware
man-in-the-middle
mandatory access control
manipulation detection code
masquerade attack
MCA
MD2
MD4
MD5
merchant
merchant certificate
merchant certification authority
mesh PKI
message authentication code vs. Message Authentication Code
message digest
Message Handling Systems
message indicator
message integrity check
message integrity code
Message Security Protocol
MHS
MIME
MIME Object Security Services
Minimum Interoperability Specification for PKI Components
MISPC
MISSI
MISSI PCA
MISSI user
MLS
mode
mode of operation
modulus
Morris Worm
MOSS
MSP
multilevel secure
multilevel security mode
Multipurpose Internet Mail Extensions
mutual suspicion
National Computer Security Center
National Information Assurance Partnership
National Institute of Standards and Technology
National Security Agency
NCSC
need-to-know
network
NIAP
NIST
NLSP
no-lone zone
no-PIN ORA
non-critical
non-repudiation service
nonce
NORA
notarization
NSA
NULL encryption algorithm
OAKLEY
object
object identifier
object reuse
OCSP
octet
OFB
ohnosecond
OID
On-line Certificate Status Protocol
one-time pad
One-Time Password
one-time password
one-way encryption
one-way function
open security environment
Open Systems Interconnection Reference Model
operational integrity
operations security
OPSEC
ORA
Orange Book
organizational certificate
organizational registration authority
origin authentication
origin authenticity
OSI
OSIRM
OTP
out of band
output feedback
outside attack
outsider attack
P1363
PAA
packet filter
pagejacking
PAN
PAP
partitioned security mode
passive attack
passive wiretapping
password
Password Authentication Protocol
password sniffing
path discovery
path validation
payment card
payment gateway
payment gateway certification authority
PC card
PCA
PCMCIA
peer entity authentication
peer entity authentication service
PEM
penetration
penetration test
perfect forward secrecy
perimeter
periods processing
permission
personal identification number
personality
personality label
personnel security
PFS
PGP
Photuris
phreaking
physical security
piggyback attack
PIN
ping of death
ping sweep
PKCS
PKCS #10
PKCS #11
PKCS #7
PKI
PKIX
PKIX private extension
plaintext
Point-to-Point Protocol
Point-to-Point Tunneling Protocol
policy
policy approving authority
policy certification authority
policy creation authority
Policy Management Authority
policy mapping
POP3
POP3 APOP
POP3 AUTH
port scan
POSIX
Post Office Protocol, version 3
PPP
PPTP
pre-authorization
Pretty Good Privacy
primary account number
privacy
Privacy Enhanced Mail
private component
private extension
private key
privilege
privilege management infrastructure
privileged process
procedural security
proprietary
protected checksum
protected distribution system
protection authority
protection ring
protocol
protocol suite
proxy server
pseudo-random
pseudo-random number generator
public component
public key
public-key certificate
public-key cryptography
Public-Key Cryptography Standards
public-key forward secrecy
public-key infrastructure
RA
RA domains
RADIUS
Rainbow Series
random
random number generator
RBAC
RC2
RC4
realm
RED
Red Book
RED/BLACK separation
reference monitor
reflection attack
register
registration
registration authority
regrade
rekey
reliability
relying party
Remote Authentication Dial-In User Service
renew
replay attack
repository
repudiation
Request for Comment
residual risk
restore
revocation
revocation date
revocation list
revoke
RFC
risk
risk analysis
risk assessment
risk management
Rivest Cipher #2
Rivest Cipher #4
Rivest-Shamir-Adleman
role-based access control
root
root certificate
root key
root registry
router
RSA
rule-based security policy
S-HTTP
S/Key
S/MIME
safety
SAID
salt
sanitize
SASL
SCA
scavenging
screening router
SDE
SDNS
seal
secret
secret-key cryptography
Secure Data Exchange
Secure Data Network System
Secure Hash Standard
Secure Hypertext Transfer Protocol
Secure Sockets Layer
secure state
Secure-HTTP
Secure/MIME
security
security architecture
security association
security association identifier
security audit
security audit trail
security class
security clearance
security compromise
security domain
security environment
security event
security fault analysis
security gateway
security incident
security intrusion
security kernel
security label
security level
security management infrastructure
security mechanism
security model
security parameters index
security perimeter
security policy
Security Protocol 3
Security Protocol 4
security service
security situation
security token
security violation
security-relevant event
self-signed certificate
semantic security
sensitive
separation of duties
serial number
server
session key
SET
SET PCA
SET private extension
SET qualifier
SET Secure Electronic Transaction or SET
SETCo
SHA-1
shared secret
SHS
sign
signature
signature certificate
signer
SILS
simple authentication
Simple Authentication and Security Layer
Simple Key-management for Internet Protocols
Simple Mail Transfer Protocol
Simple Network Management Protocol
simple security property
single sign-on
situation
SKIP
SKIPJACK
slot
smart card
smart token
SMI
SMTP
smurf
sniffing
SNMP
social engineering
SOCKS
soft TEMPEST
software
SORA
source authentication
source integrity
SP3
SP4
spam
SPC
SPI
split key
split knowledge
spoofing attack
SSH
SSL
SSO
SSO PIN
SSO-PIN ORA
Standards for Interoperable LAN/MAN Security
star property
Star Trek attack
steganography
storage channel
stream cipher
strong authentication
subject
subnetwork
subordinate certification authority
subordinate distinguished name
superencryption
survivability
symmetric cryptography
symmetric key
SYN flood
system
system entity
system high
system high security mode
system integrity
system integrity service
system low
system resource
system security officer
system verification
TAC
TACACS
TACACS+
tamper
TCB
TCP
TCP/IP
TCSEC
TELNET
TEMPEST
Terminal Access Controller Access Control System
TESS
The Exponential Encryption System
the Web
threat
threat action
threat analysis
threat consequence
thumbprint
ticket
timing channel
TLS
TLSP
token
token backup
token copy
token management
token restore
token storage key
top CA
top-level specification
traffic analysis
traffic flow confidentiality
traffic padding
tranquillity property
Transmission Control Protocol
Transport Layer Security
Transport Layer Security Protocol
transport mode vs. tunnel mode
trap door
triple DES
triple-wrapped
Trojan horse
trust
trust chain
trust hierarchy
trust level
trust-file PKI
trusted
trusted certificate
trusted computer system
Trusted Computer System Evaluation Criteria
trusted computing base
trusted distribution
trusted key
trusted path
trusted process
trusted subnetwork
trusted system
Trusted Systems Interoperability Group
trustworthy system
TSIG
tunnel
tunnel mode
two-person control
Type I cryptography
Type II cryptography
Type III cryptography
UDP
unclassified
unencrypted
unforgeable
uniform resource identifier
uniform resource locator
uniform resource name
untrusted process
UORA
update
URI
URL
URN
user
User Datagram Protocol
user identifier
user PIN
user-PIN ORA
usurpation
UTC
UTCTime
v1 certificate
v1 CRL
v2 certificate
v2 CRL
v3 certificate
valid certificate
valid signature
validate vs. verify
validation
validity period
value-added network
VAN
verification
verify
violation
virtual private network
virus
VPN
vulnerability
W3
war dialer
Wassenaar Arrangement
watermarking
web of trust
web server
web vs. Web
wiretapping
work factor
World Wide Web
worm
wrap
WWW
X.400
X.500
X.500 Directory
X.509
X.509 attribute certificate
X.509 authority revocation list
X.509 certificate
X.509 certificate revocation list
X.509 public-key certificate
XTACACS
Yellow Book
zeroize