JavaScriptMessages
APEC
Asia Pacific Economic Cooperation
.English
.Español
.tiếng Việt
.По-русски
.한국어
.日本語
.简体中文版
Home
News
Rss Feeds
SiteMap
Academics
Tools
Tool Downloads (Pg. 1)
Tool Downloads (Pg. 2)
Tool Downloads (Pg. 3)
Tool Downloads (Pg. 4)
Curriculum
CNSS Standards
Ethics and Law
K-12 Material
NSA Centers of Excellence
Teaching Materials
4012 Presentation
Course Modules
Module 1
01. (I) Corporate Resource
02. (II) Basic Problems
03. (III) Ethical Issues
04. (IV) Studies
Teaching Considerations
Module 2
01. (I) Ethics
02. (II) Environment
03. (III) Physical
04. (IV) Data
05. (V) Security Training
Teaching Considerations
Module 3
01. (I) Planning
02. (II) Organizational Policies & Procedures
03. (III) Ethics and Professionalism
04. (IV) Personnel Security
05. (V) Physical Security
06. (VI) System Security
07. (VII) Threats & Vulnerabilities
08. (VIII) Data Security & Recovery
09. (IX) Control and Audit
10. (X) Costs and Benefits
Teaching Considerations
Module 4
01. (I) Underlying Problem
02. (II) Laws as Tools for Information Security
03. (III) Laws and Legislation as Legal Options to
Teaching Considerations
Module 5
01. (I) Overview
02. (II) System Sensitivity
03. (III) Security Requirements
04. (IV) Levels of Security
05. (V) Data Life Cycles
06. (VI) Sample Protection Plan
Teaching Considerations
Module 6
01. (I) Overview
02. (II) Threats
03. (III) Countermeasures
04. (IV) Tradeoffs-Costs & Benefits
05. (V) Network Design
Teaching Considerations
Module 7
01. (I) Overview
02. (II) Development of Security Program
03. (III) Risk Analysis
04. (IV) Contingency Planning
05. (V) Legal Issues for Managers
06. (VI) System Validation & Verification (Accredi
07. (VII) Information Systems Audit
08. (VIII) Computer Security Check List
Teaching Considerations
Module 8
Course Modules Website
Course Videos
IA Videos
Videos (Pg. 1)
Videos (Pg. 2)
Videos (Pg. 3)
Videos (Pg. 4)
Videos (Pg. 5)
Videos (Pg. 6)
Videos (Pg. 7)
External Links
Academic Sites
Government Sites
Independent Organizations
Industry Sites
General Interest
Common Criteria
IA Activities
Professional Certification
Seminal Works
Seminal Papers
Glossary
Publications
Government Documents
Gov Docs (Pg. 1)
Gov Docs (Pg. 2)
Gov Docs (Pg. 3)
Gov Docs (Pg. 4)
Gov Docs (Pg. 5)
Gov Docs (Pg. 6)
IA Posters
IA Posters (Pg. 1)
IA Posters (Pg. 2)
IA Posters (Pg. 3)
IA Posters (Pg. 4)
IA Posters (Pg. 5)
IA Posters (Pg. 6)
Industry Documents
NIATEC Publications
Older Papers
Publisher Databases
Login
Glossary
Filter:
#
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
All
Return to List
#
(TM) *
/T/*
@-Party*
[AuQ1]
[AuQ2]
[AuQ3]
[AuQ4]
[AuQ5]
0*
120 Reset*
3DES (Triple DES)
4. 2*
802.11
802.11i
802.1x
A
A1
Abandoned Call
Abbrev
Abbreviated Dialing
ABEND
Abort
Aborted Connection
Above Type 2 Magnetic Media
AC
AC Erasure
Accept
Acceptable Level Of Risk
Acceptance
Acceptance Certification
Acceptance Inspection
Acceptance Test
Access
Access Attempt
Access Authorization
Access card
Access Category
Access Code
Access Contention
Access Control
Access Control List
Access Control List(ACL)
Access control lists (ACLs)
Access Control Measures
Access Control Mechanism
Access Control Mechanism(s)
Access Control Models
Access Control Policies
Access control policy
Access Control Roster
Access Control Software
Access Controls
Access Level
Access Line
Access List
Access Mode
Access Node
Access Originator
Access Period
Access Permissions
Access permissions (authorizations)
Access Phase
Access Point
Access point. 1)
Access Port
Access Privileges
Access Request
Access Time
Access To Information
Access Type
Accessible Space
Accidental
Account Administration
Account Administrator
Account Management
Accountability
Accountability For Sensitive Data
Accountability Information
Accounting
Accounting Legend
Accounting Legend Code (ALC)
Accounting Number
Accounting System
Accreditation
Accreditation Authority
Accumulator
Accuracy
ACD
ACK
ACK (Acknowledgement)
Acknowledge Character
Acknowledgement
Acknowledgement (ACK)
Acknowledgement number
ACL
ACLs (Access control lists)
Acme
Acolyte
A-Condition
Acoustic Coupler
Acoustic Emanation
Acoustical Intelligence
ACOUSTINT
Acquisition
Acquisition Program
Acquisition Specification
Acquisitions
Active Attack
Active content
Active Directory
Active Directory Users and Computers
Active fingerprinting
Active Server Pages
Active Wiretapping
Active-X
Activity
Activity Log
ACU
A-D
Ad Hoc Query
Ada
Adaptive Channel Allocation
Adaptive Communication
Adaptive Routing
Adaptive System
ADC
ADCCP
Add Mode
Added Bit
Added Block
Adder
Adder-Subtracter
Add-On Security
Address
Address Field
Address Message Sequencing
Address Part
Address Pattern
Address Separator
Address Space
Address spoofing
Address Translation Unit
Addressability
Addressable Point
Adequate Notice
Adger
ADH
Ad-Hockery
ADM
Admin
Administration
Administrative Security
Administrative Security Policies And Procedures
Administrative Tools
Administrative User
Administratively Controlled Information
Administrator
Administrator Of General Services
ADP
ADP Facility
ADP Security
ADP Security Documentation
ADP Security Staff
ADP Storage Media
ADP System
ADP System Security
ADPCM
ADPE
Advanced Data Communication Control Procedure
Advanced Development Model
Advanced Encryption Standard (AES)
Advanced Intelligent Network
ADVENT
Adversary
Adversary Scenario
AE
AES
AFAIK
AFDTC
Affirm
AFJ
AFR
AFSSI
AFSSM
Agencies
Agency
Agency-Specific Policies And Procedures
Agent
Aggregation
Aggregation Problem
AH (Authentication Header)
AI
AI-Complete
AIG
AIN
AIOD
Air Conditioning
Air gap
AIRK
Airplane Rule
AIS
AIS Security
AISS
AJ
AK
AKD/RCU
AKDC
AKM
Alarm
Alarm Center
Alarm Indicator
Alarm Sensor
Alarms, Signals And Reports
ALC
ALC-3
ALC-4
ALE
Algorithm
Algorithmic Language
Aliasing Bug
All-Elbows
Allman Style'*
Alpha Profile
Alphabet
Alphabet Translation
Alphabet Transliteration
Alphabetic Character Set
Alphabetic Code
Alphabetic String
Alphabetic Word
Alphanumeric
Alphanumeric Character Set
Alphanumeric Code
Alphanumeric Data
Alt /awlt/
Alt Bit
Alternate COMSEC
Alternate COMSEC Manager
Alternate Mark Inversion Signal
Alternate Routing
Alternating Current
Alternative
Altmode
ALU
Aluminum Book
AMA
Ambient Level
Ambiguity
American National Standard Code For Information Interchange
American National Standards Institute
American Standard Code For Information Interchange (ASCII)
AMI
Amp Off
Amper
AMPS
AMS
Analog Computer
Analog Control
Analog Data
Analog Decoding
Analog Encoding
Analog Facsimile Equipment
ANALOG Signal
Analog Synchronization
Analog Technology
Analog Transmission
Analog-To-Digital
Analog-To-Digital Coder
Analog-To-Digital Converter
Analog-To-Digital Encoder
Analysis
ANDVT
Angle Brackets
Angry Fruit Salad
ANI
Annual cost of protection
Annual Loss Expectancy
Annual Reports
Annual threat severity
Anomaly detection analysis
Anonymous websurfing services
ANSI
Answer Back
Answer Signal
Anti-Jam
Anti-Jamming
Anti-replay protection
Anti-Spoof
Anti-Virus Program
Antivirus programs
AOS
AOSS
AP
Apache
APC
APD
APL
App
Append Access Mode
Applicant
Application
Application Development Control
Application firewall
Application Layer
Application layer authentication
Application monitors
Application Software
Application Software (functional)
Applications Security
Appreciations
Approval Accreditation
Approval To Operate
Approval/accreditation
Approved Circuit
Approving
APU
AR
AR 380-380
ARCH:D1
ARCH:D2
Archive
Archivist
Area Code
Arena
ARES
Arg
Argument
Arithmetic And Logic Unit
Arithmetic Operation
Arithmetic Overflow
Arithmetic Register
Arithmetic Shift
Arithmetic Underflow
Arithmetic Unit
ARMM
ARPANET
ARQ
Array
Array Processor
Arrest
ARS
Artificial Intelligence
ASCII
ASCIIbetical Order
ASPJ
Assemble
Assembler
Assembly
Assembly Language
Assembly Phase
Assembly Program
Assembly Time
Assertion
Assessing Controlled Access Protection
Assessment
Assessments (e. G. , Surveys, Inspections)
Asset
Asset Category
Asset Container
Asset enumeration
Asset Granularity
Association Description
Assurance
Assurance Testing
ASU
Asymmetrical warfare
Asynchronous And Synchronous Communications
Asynchronous Attack
Asynchronous Network
Asynchronous Operation
Asynchronous Transfer Mode
Asynchronous Transmission
Asynchronous Working
AT&T
ATAM
Atomic
Attachment
Attachment Unit Interface
Attack
Attack automation
Attack software
Attack Time
Attacker-in-the-middle attack
Attempt
Attention Character
Attenuation
Attoparsec
Attribute
Attribute Of An Entity
AUD (audit)
AUD/D1
AUD/D2
AUD/D3
Audit
Audit Analysis Tools
Audit Collection Requirements
Audit Event
Audit Log
Audit logs
Audit Mechanism
Audit Parameters
Audit Record
Audit Reduction Tools
Audit Review File
Audit Trail
Audit Trails And Logging
Audit Trails And Logging Policies
Auditable Events
Auditing Tools
Auditor
Authenticate
Authenticated User
Authentication
Authentication credentials
Authentication Data Base
Authentication Equipment
Authentication Header (AH)
Authentication Period
Authentication Process
Authentication System
Authenticator
Authority Arrest
Authorization
Authorization Process
Authorizations (access permissions)
Authorized Station
Authorized Vendor
Authorized Vendor Program
Autobogotiphobia*
AUTODIN
Automagically*
Auto-Manual System
Automated action
Automated Data Medium
Automated Data Processing
Automated Data Processing Equipment
Automated Data Processing Security
Automated Decision Making Computer
Automated Decision-Making System
Automated Information
Automated Information System
Automated Information System Security
Automated Information Systems Security
Automated Information Systems(s)
Automated Security
Automated Security Monitoring
Automated Security Tools
Automated System Security
Automatic
Automatic Answering
Automatic Data Handling
Automatic Data Processing
Automatic Data Processing Equipment
Automatic Data Processing System
Automatic Dialing
Automatic Message Accounting
Automatic Message Processing System
Automatic Number Identification
Automatic Operation
Automatic Remote
Automatic Remote Rekeying
Automatic Remote Reprogramming And Rekeying
Automatic Repeat-Request
Automatic Route Selection
Automatic Secure Voice Communications Network (AUTOSEVOCOM)
Automatic Voice Network
Automation
Automation Security
Autonomous
AUTOSEVOCOM
AUTOVON
Auxiliary Operation
Auxiliary Power
Auxiliary Storage
AV
Availability
Availability Of Data
Avatar
Average Rate Of Transmission
Avoiding Information Monopolies
AVP
Awk*
B
B
B Channel
B1
B1FF*
B2
B3
Back Door
Backbone Site*
Backdoor
Backdoor account
Backdoor Trojan
Backgammon*
Background checks
Background Investigations #
Background Processing
Background*
Backspace And Overstrike*
Back-To-Back Connection
Backup
Backup console
Backup facility
Backup File
Backup Plan
Backup Procedures
Backup retention plan
Backups#
Backward Channel
Backward Combatability*
Backward Recovery
Bacterium
Bad Thing*
BAD*
Balanced Code
Banana Label*
Band
Bandwidth
Bandwidth Compression
Bang
Bang On*
Bang Path*
Banner
Banner*
Bar Code
Bare Metal*
Baroque*
Base
Base Address
Base C4 Systems Security Office
Base Computer Systems Security Officer
Baseband
Baseline
Baselines
Basic Software
Basic Software (nonfunctional)
Basic Status
BASIC*
Basic/Generic Management Issues#
Bastion host
Batch mode
Batch Processing
Batch scripts
Batch*
Baterium
Bathtub Curve*
Baud
Baud Rate
Baudot Code
Bboard*
BBS
BCC
BCD
BCI
BCSSO
Bd
Beam*
Beanie Key*
Bearer Channel
Bearer Service
Beep*
Behavioral scanning
Bell-La Padula
Bell-La Padula Security Model
Bell-LaPadula Model
Bells And Whistles*
Benign
Benign Environment
Benign payload
BER
BERT
Best practices
Beta*
Between-The-Lines Entry
Beyond A1
Bible*
BiCapitalization*
Biff*
Big Gray Wall*
Big Iron*
Big Red Switch*
Big Room, The*
Big Win*
Big-Endian*
Bignum*
Bigot*
Binary
Binary Code
Binary Digit
Binary Element
Binary Exponential Backoff
Binary Notation
Binary Synchronous Communication
Binary-Coded Decimal
Binary-Coded Decimal Code
Binary-Coded Decimal Interchange Code
Binary-Coded Decimal Notation
Binary-Coded Decimal Representation
Binding
Binding/Handshaking#
Biometric
Biometric authentication
Biometrics#
BIOS password
B-ISDN
Bi-Sync
Bit
Bit Bang*
Bit Bashing*
Bit Bucket*
Bit Configuration
Bit Decay*
Bit Density
Bit Error Rate
Bit Error Ratio
Bit Error Ratio Tester
Bit Interval
Bit Inversion
Bit Pairing
Bit Position
Bit Rate
Bit Robbing
Bit Rot*
Bit Slip
Bit Stream Transmission
Bit String
Bit Synchronization
Bit Twiddling*
Bitblt*
Bit-By-Bit Asynchronous Operation
Bit-Count Integrity
BITNET*
Bit-Paired Keyboard*
Bits Per Inch
Bits Per Second
Bits*
Bit-Sequence Independence
Bit-Stepped
Bit-Synchronous Operation
BIU
Bixie*
Black
Black Art*
BLACK Equipment Area (BEA)
Black hat hackers
Black hole
Black Hole*
Black Key
BLACK Line
BLACK Signal
Blanking
Blast*
Blended threats
Blink*
Blinkenlights*
Blinking
Blit*
Blitter*
Blivet*
BLOB*
Block
Block Character
Block Check
Block Check Character
Block Code
Block Diagram
Block encryption
Block Length
Block Parity
Block Transfer
Block Transfer Attempt
Block Transfer Computations*
Block Transfer Efficiency
Block Transfer Failure
Block Transfer Rate
Block Transfer Time
Block-Error Probability
Blocking
Blocking Criterion
Blocking Factor
Blocking Formulas
Block-Loss Probability
Block-Misdelivery Probability
Blow An EPROM*
Blow Away*
Blow Out*
Blow Past*
Blow Up*
BLT*
Blue Book*
Body
Border firewalls
Bourne Shell and Bourne Again Shell (BASH)
BPI
BPOC
BPS
BQS*
BR
Breach
Bridge
Broken Arrow*
Broken*
Broket*
Brooks's Law*
Browsing
BRS*
Brute Force And Ignorance*
Brute Force*
Brute-force guessing
BSA
BSD*
BSE
Bubble Sort*
Bucky Bits*
Budget
Budget And Accounting Act
Budget And Accounting Procedures Act Of 1950
Buffer
Buffer overflow
Buffer Overflow*
Bug
Bugging
Bulk Encryption
Bulletproof*
Bum*
Bump*
Burble*
Buried Treasure*
Burn-In Period*
Burst Page*
Burst Transmission#
Bus
Bus Interface Unit
Bus Topology
Business Aspects Of Information Security#
Business champions
Business continuity plan
Business process analysis
Busy Back
Busy-Wait*
Buzz*
BW
BWQ*
By Hand*
Byte
C
C Programmer's Disease*
C*
C1
C2
C3
C3I
C4
C4 Systems Security Vulnerability Reporting Program
CA
Cabling#
Cache
Cache Memory
Call
Call Back
Call Forwarding
Call Hold
Call Identifier
Call Processing
Call Set-Up Time
Call Sign Cipher
Call-Back Security#
Called-Party Camp-On
Caller ID#
Calling-Party Camp-On
Callsign
Callsign Cipher
CAMA
Camp-On
Can
Cancel Character
Candygrammar*
Canister
Canonical*
Can't Happen*
Capability
Capability-Based
Capability-Based System
Card Walloper
Carder
Careless Employees
Careware
Cargo Cult Programming
Carnivore
Carrier
Carrier Sense Multiple Access With Collision Detection (CSMA/CD)
Cascade
Cascading
Case And Paste
Casters-Up Mode
Cat
Catastrophe
Catatonic
Categories Of Data
Category
Caution Statement
Caveats
CBA
CBC
CCB
CCEP
CCI
CCI Assembly
CCI Component
CCI Equipment
CCIS
CCITT
CCO
Cd Tilde
CDR
CDRL
CDS
Cell
CELP
Central Computer Facility
Central Office Of
Central Office Of Record
Central Processing Unit
Central Processor
Central security management console
CEOI
CEPR
CERT
Certificate authority (CA)
Certificate Of Action
Certificate Of Action Statement
Certificate revocation list (CRL)
Certification
Certification And Accreditation Program
Certified TEMPEST
Certified Tempest Technical Authority
CERTs (Computer emergency response teams)
CF
CFD
CFE
CGI (Common Gateway Interface)
Chad
Chad Box
Chad Tape
Chadless Tape
Chain
Chain of evidence
Challenge And Reply
Challenge And Reply Authentication
Challenge message
Challenge-response authentication
Change Control Policies
Change Controls
Change management process
Change request
Channel
Channel Hopping
Channel Op
CHANOP
CHAP (Challenge-Handshake Authentication Protocol)
Char
Character
Character Check
Character Generator
Character Interval
Character Recognition
Character Set
Character Stepped
Character-Count
Character-Count And Bit-Count Integrity
Charter of Fundamental Rights
Chase Pointers
Chawmp
Check
Check Bit
Check Character
Check Digit
Check Word
Checksum
Chernobyl Packet
Chiclet Keyboard
Chief security officer (CSO)
Children’s Online Privacy Protection Act
Chine Nual
Chmod
Choke
Chomp
CHOP
Chown
Christmas Tree
Christmas Tree Packet
Chrome
Chroot
Chug
CI
CIA
CIAC
CIK
Cinderella Book
CIP
Cipher
Cipher Block Chaining (CBC)
Cipher System
Cipher Text
Cipher Text Auto-Key
Ciphertext
Ciphony
Circles of trust
Circuit
Circuit Breaker
Circuit firewall
Circuit-Switched Networks
CIRCULAR No. A-127
Circular No. A-130
CIRK
Civil Rights Act
CK
CKG
CKL
Cladding
Clandestine Operation
C-Language
Class
Class A1, Verified Design
Class B1, Labeled Security Protection
Class B3, Security Domains
Class C1, Discretionary Security Protection
Class C2, Controlled Access Protection
Class D, Minimal Protection
Class A
Class B
Class C
Classful addressing
Classic C
Classification
Classification Guide
Classified
Classified Computer Security Program
Classified Data/information
Classified Defence Information
Classified Defense Information
Classified Information
Classified Materials Handling And Shipping
Classless InterDomain Routing (CIDR)
Clean
Clear
Clear Channel
Clear Text
Clearance Level
Clearance Verification
Clearing
Clearing ADP Media
Clearing Magnetic Media
Client firewall
Client/Server Security
CLIs (command-line interfaces)
CLMD
Clobber
Clock
Clocks
Clone
Closed Security
Closed Security Environment
Closed Shop
Closed User Group
Closed User Group With Outgoing Access
Closed-circuit television (CCTV)
Clover Key
CM
CMCS
CMP
CMS
CN
CNCS
CNK
CNLZ
Coax
Coaxial Cable
COBOL
Code
Code Book
Code Character
Code Conversion
Code Element
Code Freeze
Code Grinder
Code Group
Code inspection
Code Restriction
Code System
Code Vocabulary
Code Word
CODEC
Coded Character Set
Coded Image
Coded Set
Code-Excited Linear Prediction
Code-Independent Data Communication
Coder
Codes
Codewalker
Coding Scheme
Coercive Force
Coercivity
Cognizant Agent
Cognizant Security Authority
Coherent
Cokebottle
Cold Boot
Cold sites
Cold Start
Collaborative Computing
Collateral
Collusion
Colours
Combinational Logic Element
COMINT
Comm Mode
Comma-Free Code
Command
Command And Control
Command And Control System
Command Authority
Command Key
Command Languages/interfaces
Command, Control And Communications
Command, Control, Communications, And Computer (C4) Systems
Command, Control, Communications, And Computer (C4) Systems Security
Command, Control, Communications, And Computer System
Command-line interface (CLI)
Comment Out
Commercial Carrier
Commercial COMSEC
Commercial COMSEC Endorsement Program
Commercial vulnerability testing tools
Common Carrier
Common Carrier Security
Common Fill Device
Common Gateway Interface (CGI)
Common Sense
Common word passwords
Common-Channel Interoffice Signaling
Communication Deception
Communications
Communications Assistance for Law Enforcement Act
Communications Center
Communications Center Security
Communications Channel
Communications Cover
Communications Deception
Communications Devices
Communications Intelligence
Communications Profile
Communications Security
Communications Security (COMSEC)
Communications Security Equipment
Communications Security Material
Communications Security Policy And Guidance
Communications Security Survey
Communications System
Communications Systems Abuse
Community Of Interest
COMP
Compact
Companion Document Series
Comparator
Compartment
Compartment "S" Variable
Compartmentalization
Compartmentation
Compartmented Information
Compartmented Intelligence/sensitive Compartmented Information (SCI)
Compartmented Mode
Compartmented Security Mode
Compartmented/partitioned Mode
Compelled Signaling
Competent Authority
Competitor
Compile
Compiler
Compiling Program
Compliance Review
Component
Comprehensive security
Compress
Compression
Compromise
Compromising
Compromising Emanation Performance Requirement
Compromising Emanations
Compulsory tunneling
COMPUSEC
Computer
Computer Abuse
Computer and Internet use policy
Computer Conferencing
Computer Confetti
Computer Crime
Computer Cryptography
Computer Emergency Response Team
Computer Emergency Response Team/Coordination Center (CERT/CC)
Computer emergency response teams (CERTs)
Computer Facility
Computer Fraud
Computer Fraud And Abuse Act
Computer Fraud and Abuse Act of 1986
Computer Graphics 1. Methods and techniques for converting data to or from graphic displays via co
Computer Installation
Computer Language
Computer Management
Computer Matching
Computer Matching Responsibilities
Computer Network
Computer Program
Computer Program Origin
Computer Protection Plan
Computer Routine
Computer Science
Computer Science And Architecture
Computer Security
Computer Security Act
Computer Security Act Of 1987 100-235
Computer Security Incident
Computer Security Law
Computer Security Officer
Computer Security Policy
Computer Security Subsystem
Computer Security Subsystem Interpretation
Computer Security Technical Vulnerability Reporting Program
Computer Security Technical Vulnerability Reporting Program (CSTVRP)
Computer Site
Computer System
Computer System Fault Tolerance
Computer System Manager
Computer System Resilience
Computer Systems Security Officer
Computer Word
Computer-based firewall
Computer-Dependent Language
Computer-Oriented Language
Computers At Risk
Computing System
Computron
COMSEC
COMSEC Account
COMSEC Account Audit
COMSEC Accounting
COMSEC Aid
COMSEC Boundary
COMSEC Chip Set
COMSEC Control
COMSEC Control Program
COMSEC Crypto-Algorithm
COMSEC Custodian
COMSEC End Item
COMSEC Equipment
COMSEC Facility
COMSEC Incident
COMSEC Insecurity
COMSEC Manager
COMSEC Material
COMSEC Material Control System
COMSEC Material Destruction Procedures
COMSEC Material Identification And Inventory
COMSEC Modification
COMSEC Module
COMSEC Monitoring
COMSEC No-Lone Zone
COMSEC Profile
COMSEC Responsible Officer
COMSEC Survey
COMSEC System Data
COMSEC Testing
COMSEC Training
Concealment System
Conceptual Entity
Condition Out
Conducted Signals
Conduit
Confidential Source
Confidentiality
Configuration
Configuration Control
Configuration Control Board
Configuration Management
Configuration Review Board
Confinement
Confinement Channel
Confinement Property
Conformance Testing
CONJ
Connection
Connectionless
Connectionless Data Transfer
Connectionless Mode Transmission
Connection-oriented
Connectivity
Connector Conspiracy
Cons
Consequences
Considered Harmful
Console
Contained
Container
Containment
Contamination
Content Vectoring Protocol (CVP)
Content-Addressable Storage
Contention
Context. User-Friendly
Contingency Key
Contingency Management
Contingency Plan
Contingency Plan Testing
Contingency Planning
Continuity Of Operations
Continuity Plan
Continuity Planning
Continuous Operation
Contract
Contracting For Security Services
Contractor Security Safeguards
Contracts
Contracts, Agreements, And Other Obligations
Control Character
Control Function
Control Line
Control Zone
Control-C
Controllable Isolation
Controlled
Controlled Access
Controlled Access Area
Controlled Access Protection
Controlled Accessibility
Controlled Area
Controlled BLACK Equipment Area(s) (CBEA)
Controlled COMSEC Item
Controlled Cryptographic Item
Controlled Cryptographic Item (CCI)
Controlled Cryptographic Item (CCI) Assembly
Controlled Cryptographic Item (CCI) Component
Controlled Cryptographic Item (CCI) Equipment
Controlled Information
Controlled Security Mode
Controlled Sharing
Controlled Space
Controller
Controlling
Controlling Authority
Controlling Paperwork Burden On The Public
Control-O
Control-Q
Control-S
Conversational Mode
Conversational Service
Conway's Law
Cookbook
Cooked Mode
Cookie
Cookie File
Cookie Jar
COOP
Cooperative Key
Cooperative Key Generation
Cooperative Remote
Cooperative Remote Rekeying
Coordination With Related Disciplines
Copper
Copy Protected
Copy Protection
Copyleft
Copyright Protection And Licensing
COR
Core
Core Cancer
Core Dump
Core Leak
Core Storage
Core Wars
Corporate security policy statement
Corrective Actions
Correctness
Correctness Proof
Correlated Emanations
Cost
Cost Accounting
Cost Benefit Analysis
Cost Distribution
Cost Of Major Failures
Cost of repair
Cost Recovery
Cost/Benefit Analysis
Cost/Time Contamination
Cost/Time Interruption
Cost-Analysis
Cost-Benefit Analysis
Costing Function
Cost-Risk Analysis
COTS
Cots Software
Counterfeit Access Device And Computer Fraud Act
Counterintelligence
Countermeasure
Countermeasures
Coupling
Cover
Cover And Deception
Covert Channel
Covert Channels
Covert Storage
Covert Storage Channel
Covert Storage Channels
Covert Timing
Covert Timing Channel
CP/M
CPC
CPCI
Cpi
CPS
CPU
CPU Registers
CPU Wars
Crack Root
Cracker
Cracking
Crafted
Crank
Crash
Crash And Burn
Cray
Cray Instability
Crayola
Crayola Books
CRB
CRC
Creationism
Credentials
Credit card number theft
Creep
Creeping Elegance
Creeping Featurism
Creeping Featuritis
CRIB
Criminal Prosecution
Criteria
Critical Information
Critical Mass
Critical Processing
Critical Resources
Critical Severity
Critical Systems
Critical Technology
Criticality
CRL (Certificate revocation list)
CRLCMP
CRLF
CRO
Cross Assembler
Cross-Post
Cross-Talk
CRP
Cruft
Crunch
CRWG
Cryppie
Crypt/Crypto
Cryptanalysis
Cryptanalyst
Crypto
Crypto Key
Crypto-Alarm
Crypto-Algorithm
Cryptoanalysis
Crypto-Ancillary
Crypto-Ancillary Equipment
Cryptochannel
Crypto-Equipment
Cryptographic
Cryptographic Authentication
Cryptographic Checkvalue
Cryptographic Component
Cryptographic Equipment
Cryptographic Information
Cryptographic Initialization
Cryptographic Key
Cryptographic Logic
Cryptographic Randomization
Cryptographic System
Cryptographic Techniques
Cryptography
Crypto-Ignition Key
Cryptologic
Cryptology
Cryptomaterial
Cryptonet
Crypto-Operation
Cryptoperiod
Cryptosecurity
Cryptosynchronization
Cryptosystem
Cryptosystem Assessment
Cryptosystem Evaluation
Cryptosystem Review
Cryptosystem Survey
Cryptovariable
CSA
CSC
CSC Bulletin
CSCI
CSC-STD-001-83
CSC-STD-002-85
CSC-STD-0030-85
CSC-STD-004-85
CSE
CSETWG
CSIRTs
CSM
CSO
CSO (chief security officer)
CSPP
CSRD
CSS
CSSO
CSSP
CSTVRP
CSWG
CTAK
CTSS
CTTA
CTY
Cube
CUP
Custodian
Custodian Of Data
Customer
Customer fraud
Customer IT Security Needs
Customer Premises
Customer Service Orientation
Cut A Tape
CVA
CVRP
CWC
Cybercrime Treaty of 2001
Cyberspace
Cyberterror
Cyberwar
Cycle
Cycle (for Overwriting Memory, Disk, Etc. )
Cycle Crunch
Cycle Drought
Cycle Server
Cyclic Redundancy Check
Cypherpunk
D
D&V
D. C. Power Lab
D-A
DAA
DAC
DAC/D1
DAC/D2
DAC/D3
Daemon
Daemon Book
DAMA
Dangling Pointer
Dangling Threat
Dangling Vulnerability
Dark-Side Hacker
Data
Data Abstraction
Data Access Control
Data Arrangement
Data Attribute
Data Authentication Algorithm
Data Bank
Data Base
Data Base Management System
Data Burst
Data Bus
Data Communication
Data Communication Control Character
Data Communication Control Procedure
Data Communications Equipment
Data Compaction
Data Compression
Data Concentrator
Data Contamination
Data Corruption
Data Dictionary
Data Diddling
Data Directory
Data Element
Data Encrypting Key
Data Encryption
Data Encryption Standard
Data Encryption Standard (DES)
Data Flow Control
Data Integrity
Data Intelligence
Data Interface Capability
Data Item
Data Level
Data Link
Data Link Control
Data Link Escape Character
Data Link Layer
Data Mode
Data Origin
Data Origin Authentication
Data Owner
Data Processing
Data Processing Center Security
Data Processing Fund
Data Protection Directive
Data Protection Engineering
Data Related Emanations
Data Scavenging
Data Scrambler
Data Security
Data Service Unit
Data Set
Data Sink
Data Source
Data Station
Data Stream
Data Terminal Equipment
Data Transfer Rate
Data Transfer Request Signal
Data Transfer Time
Data Transmission
Data Transmission Circuit
Data Volatility
Database
Database Integrity
Database Management System
Database replication
Data-Dependent Protection
Datagram
DATAINT
Datamation
Date And Time Of Event
Dating Format
DAU
Day Mode
DBMS
DC
DC Erasure
DCA
DCID
DCP
DCS
DCS1000
DCSP
Dd
DD:D1
DD:D2
DDD
DDN
DDoS (Distributed DoS)
DDS
DDT
Dead
Dead Code
DEADBEEF
Deadlock
Deadly Embrace
Deallocation
Death Code
Death Square
Death Star
Debug
DEC
DEC Wars
Decapsulation
Decay
Deception
Deception Means
Decertification
Decipher
Decipherment
Decision criterion
Deckle
Declassification
Declassification (of Magnetic Storage Media)
Declassification Of AIS Storage Media
Declassification Of Magnetic Storage Media
Declassification/Downgrade Of Media
Decode
Decrypt
Decryption
Decryption key
Decryption method
DED
Dedicated Line
Dedicated Mode
Dedicated Security Mode
Deep Hack Mode
Deep Magic
Deep Space
Default
Default Classification
Defence Industry Information
Defenestration
Defense Advanced Research Projects Agency (DARPA)
Defense Data Network
Defense in depth
Defined As
Definition
Definition Of Security Features
Degauss
Degausser
Degausser Products List (DPL)
Degree Of Trust
Dehose
Delegated Development
Delegated Development Program
Delegation Of Authority
Deleted Bit
Deleted Block
Deletion Of Accounts
Delint
Delivered Block
Delivered Overhead Bit
Delivered Overhead Block
Delivery Confirmation
Delta
Demarcation Point
Demented
Demigod
Demilitarized zone (DMZ)
Demo
Demo Mode
Demon
Demon Dialer
Denial Of Service
Denial Time
Denial-of-service (DoS)
Deny
Deny All
Department Of Commerce
Department Of Defence
Department Of State
Depeditate
Deployable Computer System
Deployment
Deprecated
De-Rezz
Derf
DES
Descriptive Top Level Specification
Descriptive Top-Level
Descriptive Top-Level Specification
Design Analysis Phase
Design Controlled
Design Controlled Spare Part
Design Controlled Spare Pary
Design Documentation
Design Flaws
Design Objective
Design Radius
Design Reviews
Design Verification
Designated Approving
Designated Approving Authority
Designated Development Activity
Desk Check
Destination unreachable
Destruction
Detectable Actions
Detection
Detection System
Detective Controls
Development (Life Cycle)
Development server
Devil Book
Devo
DF
Diagnostic Program
Dial Back
Dial Number Indicator
Dialog
Dial-Up
Dial-Up Diagnostic
Dial-Up Security
DIB
Dibit
Dictionary attacks
Dictionary Flame
DID
Diddle
Die
Die Horribly
Diff
Differential backup
Diffie-Hellman key agreement
Digit
Digit Time Slot
Digital
Digital Alphabet
Digital certificate
Digital Combining
Digital Computer
Digital Data
Digital Error
Digital Facsimile Equipment
Digital Filter
Digital Modulation
Digital Signal
Digital Signature
Digital watermarking
Digital/Analog Technology
Digital-To-Analog Converter
Digitize
Digitizer
Digraphic Processing
Dike
Ding
Dink
Dinosaur
Dinosaur Pen
Dinosaurs Mating
DIP
Direct Access
Direct Address
Direct Memory Access
Direct Memory Access Controllers
Direct Memory Access Devices
Direct Shipment
Direct Support
Direction Finding
Directionalization
Director Of The Office Of Management And Budget
Directory traversal attack
Dirtball
Dirty Power
Disaster
Disaster Plan
Disaster Recovery
Disaster Recovery Plan Testing
Disaster Recovery Planning
Disaster Recovery Plans
Disclaimer
Disclosure
Disclosure Of Sensitive Data
Disconnect
Disconnection
Discordianism
Discounted cash flow analysis
Discovery process
Discretionary Access
Discretionary Access Control
Discretionary Access Control Mechanism
Discretionary Protection
Discretionary Security Protection
Disengagement Attempt
Disgruntled Employees
DISJ
Disk Farm
Disk Pack
Disk Sectors
Diskette
Diskless Workstations
Display Device
Display Hack
Disposition Of Classified Information
Disposition Of Media And Data
Dissemination
Dissemination Control
Dissemination Controls
Dissemination Of Information
Dissociated Press
DIST
Distributed AIS
Distributed Computer System
Distributed DoS (DDoS)
Distributed firewall architecture
Distributed IDS
Distributed Processing
Distributed Systems Security
Distribution
Distribution Statement
Distribution System
Disusered
DLE
DLED
DMA
DMZ (demilitarized zone)
DO
Do Protocol
Doc
Doco
Document
Document format standards
Document Labeling
Document transfer standards
Documentation
Documentation Policies
DOD
DoD 5200. 28-M
DoD 5200. 28-STD
DoD 5200. 28-STD, 1985
DoD 5200. 28-STD.
DoD Directive 5200. 28
DoD Directive 5200. 28 Automated Information System Security.
DoD Directive 5215. 1
DoD Information Analysis Center
DoD TCSEC
DOD Technology Transfer
DoD Trusted Computer
DoD Trusted Computer System Evaluation Criteria
DoD Trusted Computer System Evaluation Criteria (TCSEC)
DODD
Dodgy
DOE
Dogcow
Dogpile
Dogwash
Domain
Domain controller
Domainist
Dominate
Dominate Security Level
Dominated By
Dominates
DON
Dongle
Dongle-Disk
Don't Do That, Then!
Donuts
Doorstop
DOS
DoS (denial-of-service)
Dot File
Double Bucky
Double DECkers
Doubled Sig
Down
Download
Downtime
DP
DPB
Dper
DPL
Dragon
Dragon Book
Drain
DRECNET
Drive-by hacking
Driver
Droid
Drool-Proof Paper
Drop
Drop Accountability
Drop And Insert
Drop On The Floor
Drop-Ins
Drop-Off/Add-On Protection
Drop-Outs
Drugged
Drum
Drunk Mouse Syndrome
Dry Line
DS
DSN
DSU
DSVT
DT&E
DTD
DTE
DTIRP
DTLS
DTS
DUA
Dual Control
Dual Homing
Dual In-Line Package Switch
Due Care
Due diligence
Duff's Device
Dumb Terminal
Dumbed Down
Dummy Group
Dump
Dumpster Diving
Dup Killer
Dup Loop
Dusty Deck
DWIM
Dynamic port numbers
Dynamic webpages
Dynamically Adaptive Routing
Dynner
E
E Model
EAM
EAP
Earth Ground
Earthquake
Easter Egg
Easter Egging
Eavesdropping
EBCDIC
ECC (Elliptic Curve Cryptosystem)
ECCM
Echelon
Echo
Echo reply
ECM
E-commerce
Economic Assessment
Economic Intelligence
ECPL
EDAC
EDESPL
Edgar
EDM
Education, Training And Awareness
EEFI
EEI
EEPROM
EFD
Efficiency
EFS (Encrypting File System)
EFT
EFTO
EGADS
Egress filtering
EIA Interface
EIF
Eight-Hundred Service
Eighty-Column Mind
EKMS
El Camino Bignum
Elder Days
Electrochemical Recording
Electrographic Recording
Electromagnetic Countermeasures
Electromagnetic Emanations
Electromagnetic Interference
Electronic Communications Privacy Act of 1986 (ECPA)
Electronic Data Interchange
Electronic Emission Security
Electronic Funds Transfer
Electronic Intelligence
Electronic Key Management System
Electronic Mail
Electronic Message System
Electronic Monitoring
Electronic Records Management
Electronic Seals
Electronic Security
Electronic Security Assessment
Electronic Signature
Electronic Sources Of Security Information
Electronic Surveillance
Electronic Switching System
Electronically
Electronically Generated Key
Electronic-Mail Privacy
Electronic-Mail Security
Electronics Intelligence
Electronics Security
Electro-Optical Intelligence
ELECTRO-OPTINT
Electrosensitive Recording
Electrostatic Recording
Electrothermal Recording
Elegant
Element
Elephantine
Elevating privileges
Elevator Controller
ELINT
Elite
ELIZA Effect
Elliptic Curve Cryptosystem (ECC)
ELSEC
Elvish
EMACS
Email
E-Mail
Emanation
Emanation Security
Emanations
Emanations Security
Embedded Computer
Embedded Computers
Embedded Cryptographic
Embedded Cryptographic System
Embedded Cryptography
Embedded System
Emergency
Emergency Destruction
Emergency Destruction Procedures
Emergency Plan
Emission Security
Emissions Security
Emoticon
Empire
Employee workplace monitoring
EMS
EMSEC
Emulate
Emulator
En-Bloc Signaling
Encapsulating Security Payload (ESP)
Encapsulation
Encipher
Encipherment
Encode
Encoder
Encoding
Encoding Law
Encrypt
Encrypting File System (EFS)
Encryption
Encryption Algorithm
Encryption Codes
Encryption Control Protocol
Encryption key
Encryption method
End System
End User
End User Computing Security
End-Item Accounting
End-Of-Message Function
End-Of-Selection Character
End-Of-Text Character
End-Of-Transmission Character
End-Of-Transmission-Block Character
Endorsed DES
Endorsed DES Equipment
Endorsed For Unclassified
Endorsed For Unclassified Cryptographic Item
Endorsed Tools List
Endorsement
End-To-End
End-To-End Encipherment
End-To-End Encryption
End-To-End Security
Engine
Engineering Development Model
English
Enhanced Generic Routing Encapsulation (GRE)
Enhanced Hierarchical Development Methodology
Enhancement
ENQ
Enrollment
Entangled bits
Entrapment
Entry
Environment
Environmental Controls
Environmental/Natural Threats
EOF
EOL
EOT
EOU
Ephemeral port numbers
EPL
Epoch
EPROM
Epsilon
Epsilon Squared
Equipment Radiation Tempest Zone
Equipment Under Test
Era
Eradication
Erase
Erasure
Eric Conspiracy
Eris
Erotics
Error
Error 33
Error advisement
Error Budget
Error Logs
Error Rate Deprecated Term
Error Ratio
Error-Correcting Code
Error-Correcting System
Error-Detecting Code
Error-Detecting System
Error-Detecting-And-Feedback System
ERTZ
ES
Escalation
Escort(s)
ESP (Encapsulating Security Payload)
Espionage
ESS
Essential Elements Of Friendly Information
Essential Elements Of Friendly Information (EERI)
Essential Elements Of Information
Essential Secrecy
Essentially Rating
ETAP
ETB
Ethical hacking
Ethics
ETL
ETPL
ETX
EUCI
Eut Exerciser Equipment
EV
Evaluated Products
Evaluated Products List
Evaluation
Evaluation Techniques (Evaluation)
Evaluator
Event
Event correlation
Event Cost
Event Value
Event Viewer
Event-Reporting Systems
Evidence Acceptability
Evidence Collection And Preservation
Evil
Evil And Rude
Exa
Examining The Entrails
Exception handling
EXCH
Exchange
Exclusion Area
EXE
Exec
Executable files
Execute
Execute Access Mode
Executing Ring
Execution Of The Budget
Executive Order No. 12046 Of March 27, 1978
Executive Order No. 12472 Or April 3, 1984
Executive State
Exemption
Exercise Key
Exhaustive Attack
Exhaustive search
Expected Lifetime
Expenditure
Expert Security/Audit Tools
Expert Systems
Expired Password
Exploit
Exploitable Channel
Exploitation
Exploratory Development
Exploratory Development Model
Export Controls
Exposure
Extensible Authentication Protocol (EAP)
External auditing tools
External DNS server
External Label
External Memory
External Protected Distribution System
External Security Audit
Extortion
Extra Bit
Extra Block
Extraction Resistance
Eyeball Search
F
Face scanning
Face Time
Facilities
Facilities Planning
Facility
Facility Management
Facsimile
Facsimile Converter
Facsimile Recorder
Facsimile Transmission
Factor
Fail
Fail Safe
Fail Soft
Fail-Safe Operation
Failure
Failure Access
Failure Control
Fair Credit Billing Act of 1974 (amended 1986)
Fall Over
Fall Through
False acceptance rate (FAR)
False alarm
False negative
False positive
False rejection rate (FRR[AuQ2][AuQ2])
Fan
Fandango On Core
FAQ
FAQ List
FAQL
FAR (false acceptance rate)
Faradize
Farkled
Farming
Fat Electrons
Fault
Fault Tolerance
Faulty
FAX
Fax Security
FCA
Fd Leak
FDDI
FDDI-2
FDIU
FDM
Fear And Loathing
Feature
Feature Creature
Feature Key
Feature Shock
Featurectomy
Features
FEC
Federal
Federal Agency
Federal Computer Criminals
Federal Computer System
Federal Data Processing Centers
Federal Information Processing Standards
Federal Managers Financial Integrity Act
Federal Property And Administrative Service Act
Federal Property And Administrative Services Act Of 1949
Federal Records Act
Federal Register
Federal Telecommunications Fund
Federal Trade Commission (FTC)
Federal Wiretap Act
Feep
Feeper
Feeping Creature
Feeping Creaturism
Fence
Fencepost Error
Fepped Out
FER
Fetch Protection
Fiber Distributed Data Interface
Fiber Optics
Fiber Pigtail
FidoNet
Field
Field Circus
Field Servoid
Fielded Equipment
FIFO
File
File Attach
File Authentication Code
File integrity checkers
File Management System
File Protection
File Request
File Security
File Signature
File Transfer Protocol
File Transfer, Access, And Management
File-infector viruses
Fill
Fill Device
Film At 11
Filter
Filtered Power
FIN
Finagle's Law
Final Evaluation Report
Financial Management Information
Financial Management System
Fine
Finger
Finger Trouble
Finger-Pointing Syndrome
Fingerprint recognition
Fingerprint Signal
Fingerprinting
Finn
FIPS
FIPS PUB
FIPS PUB 39
Fire Prevention And Protection
Firebottle
Firefighting
FIREFLY
Firehose Syndrome
Firewall
Firewall appliances
Firewall architecture
Firewall Code
Firewall Machine
FireWall-1
Firmware
Firmware Security
Firmy
First-In First-Out
FISA (Foreign Intelligence Surveillance Act)
FISH Queue
FISINT
FITNR
Five-Year Plan
Fix
Fixed COMSEC Facility
Fixed Storage
FIXME
Flag
Flag Day
Flag Sequence
Flaky
Flame
Flame On
Flame War
Flamer
Flap
Flash viruses
Flat
Flat-ASCII
Flat-File
Flatten
Flavor
Flavorful
Flaw
Flaw Hypothesis
Flaw Hypothesis Methodology
Flexible Disk
Flippy
Flood
Flooding DoS attacks
Floppy Disk
Flow Control
Flow Control Procedure
Flow Diagram
Flowchart
Flower Key
Flush
Flux
Flypage
Flyspeck 3
Flytrap
FOAF
FOCI
FOI
FOIA
Fold Case
Followup
Follow-up report
Fontology
Foonly
Footprint
For Free
For Official Use Only (FOUO) Data
For The Rest Of Us
For Values Of
Fora
Foreground
Foreign Government Information
Foreign Intelligence Service
Foreign Intelligence Surveillance Act (FISA)
Forensics
Fork Bomb
Forked
Formal Access
Formal Access Approval
Formal Cryptographic Access (FCA)
Formal Development Methodology (FDM)
Formal Methods For Security Design
Formal Proof
Formal Security Policy
Formal Security Policy Model
Formal Top-Level
Formal Top-Level Specification
Formal Verification
Format
Formerly Restricted Data
Formulary
Fortrash
Fortuitous Conduction
Fortuitous Conductor
Fortune Cookie
Forum
Forward Error Correction
Fossil
FOT&E
FOUO
Four-Color Glossies
Fourth Amendment
Four-way close
FQR
FQT
Fragile
Fragment offset
Fragmentation
Frame
Fraud
Fraud Or Abuse
Fraud, Waste And Abuse
FRD
Frednet
FreeBSD
Freedom Of Information Act
Freeware
Freeze
Frequency
Frequency Hopping
Frequency Of Major Failure
Fried
Friendly
Frink
Friode
Fritterware
Frob
Frobnicate
Frobnitz
Front End
Front-End Processing
Front-End Processor
Front-End Security
Front-End Security Filter
Frotz
Frotzed
Frowney
FRR (false rejection rate)
Fry
FSD
FSRS
FSTS
FTAM
FTC (Federal Trade Commission)
FTLS
F-T-P
FTS
FUBAR
FUD Wars
Fudge Factor
Fuel Up
Full backup
Full Bit Emanation
Full Financial Disclosure
Full Maintenance
Full Monty, The
Full protocol decoding
Functional Testing
Funds
Funky
Funny Money
Fuzz
Fuzzball
G
G
Gabriel
Gag
GAO
Garbage Collect
Garble
Gas
Gaseous
Gate
Gateway
Gating
Gauss
Gawble
GC
GCOS
GECOS
Gedanken
Geef
Geek Code
Geek Out
Gen
Gender Mender
General Public Virus
GET
G-File
GLBA (Gramm-Leach-Bliley Act)
GNU
GNU Style'*
GPL
GPO
GPS
GPV
Gramm-Leach-Bliley Act (GLBA)
Granularity of access
Great Renaming
Great Runes
Great Worm, The
Great-Wall
Green Book
Green Bytes
Green Card
Green Lightning
Green Machine
Green's Theorem
Grep
Grey hat hackers
Grilf
Grind
Grind Crank
Gripenet
Gritch
Grok
Gronk
Gronk Out
Gronked
Grounding
Group ID (GID)
Group Identification
Group policy object (GPO)
Group Userid
Grovel
Grunge
GSA
GTS
Guard
Gubbish
Guest
Guidance For Applying The DoD TCSEC In Specific Environments
Guidance For Conducting Matching Programs
Guide To Writing The Security Features Users Guide For Trusted Systems
Guidelines
Guidelines For Formal Verification Systems
Guidelines For Trusted Facility Management
Guidelines For Writing Trusted Facility Manuals
Guiltware
Gumby
Gun
Gunch
Gurfle
Guru
Guru Meditation
Gweep
GWEN
Gypsy
Gypsy Verification Environment
H
H
Ha Ha Only Serious
Hack
Hack Attack
Hack Mode
Hack On
Hack Together
Hack Up
Hack Value
Hacked Off
Hacked Up
Hacker
Hacker code of ethics
Hacker Ethic, The
Hacker vulnerability testing tools
Hackers (and Unauthorized Users)
Hacking
Hacking root
Hacking Run
Hacking X For Y
Hackintosh
Hackish
Hackishness
Hackitude
Hacktivism
Hair
Hairball
Hairy
HAKMEM
Hakspek
Half-Duplex Operation
Halftone
Halftone Characteristic
hallenge-Handshake Authentication Protocol (CHAP)
Hammer
Hamming Code
Hamming Distance
Hamming Weight
Hamster
Hand Cruft
Hand geometry scanning
Hand-Hacking
Handle
Handled
Handled By
Handler
Handling Caveats
Handling Restrictions
Hand-Roll
Handshaking
Handshaking Procedure
Handshaking Procedures
Hand-shaking stages
Handwave
Hang
Hanlon's Razor
Happily
Haque
Hard Boot
Hard Copy
Hard Copy Key
Hardcoded
Harden
Hardening
Hardware
Hardware Asset Management
Hardware Handshaking
Hardware Isolation Mechanisms
Hardware Protection Mechanisms
Hardware Security
Hardwarily
Hardwire
Hardwired
Hardwired Key
Has The X Nature
Hash
Hash Bucket
Hash Collision
Hash Total
Hashed Message Authentication Code
Hashing
Hashword
Hat
Hazard
HCF
HD
HDLC
HDM
Header
Header checksum
Header destruction
Header length
Head-On Collision
Heads Down
Health Information Portability and Accountability Act (HIPAA[AuQ3][AuQ3])
Heartbeat
Heatseeker
Heavy Metal
Heavy Wizardry
Heavyweight
Heisenbug
Hello, Sailor!
Hello, Wall!
Hello, World
Hertz
Heuristic
Hex
Hexadecimal
Hexadecimal directory traversal attack
Hexit
HF
HHOK
HHOS
Hidden Flag
Hidden Sections
Hierarchical
Hierarchical Computer Network
Hierarchical Development Methodology (HDM)
Hierarchically Synchronized Network
High Bit
High Moby
High Order Language
High Risk Environment
High-Level Control
High-Level Data Link Control
High-Level Language
Highly
Hing
HIPAA (Health Information Portability and Accountability Act)
Hirsute
History Of Information Security
HLL
HMAC
HMAC (key-Hashed Message Authentication Code)
Hobbit
Hog
HOIS
HOIST
HOL
Hole
Holy Wars
Home Box
Home Machine
Home page
Homeland Security Act of 2002
Hook
Hop
Hose
Hosed
Host
Host assessment tools
Host Computer
Host firewall
Host IDS
Host part
Host To Front-End
Host To Front-End Protocol
Hostile Code
Hostile Cognizant Agent
Hostile Intelligence Sources
Hostile Threat Environment
Hosting companies
Hot site
Hot Spot
Hot-Standby
House Wizard
Housekeeping Procedures
HP-SUX
HSM
HTML (Hypertext Markup Language)
HTML body parts
HTTP (Hypertext Transfer Protocol)
HTTP proxy server
Https
Huff
Human Intelligence
Human Interface Functions
Human Source
Human Threats
HUMINT
Humma
Humor, Hacker
Hung
Hungry Puppy
Hungus
HUS
HUSK
Hybrid attacks
Hybrid Computer
Hybrid TCP/IP-OSI architecture
Hyperspace
Hypertext Markup Language (HTML)
Hypertext Transfer Protocol (HTTP)
Hysterical Reasons
Hz
I
I Didn't Change Anything!
I See No X Here
I&A
I&A/D1
I&A/D2
I/0 Devices
I/0 Handlers
I/0 Manager
I/O
I/O Controller
IAC
IBAC
IBM Discount
ICBM Address
Ice
ICMP (Internet Control Message Protocol)
ICMP code
ICMP control messages
ICMP destination unreachable
ICMP echo
ICMP redirect
ICMP source quench
ICMP time exceeded
ICMP type
ICU
IDEA
Idempotent
Identification
Identification And Authentication
Identity badge
Identity card
Identity management
Identity theft
Identity Token
Identity Validation
Identity-Based
Identity-Based Security Policy
IDN
IDS
IEMATS
IETF (Internet Engineering Task Force)
If You Want X, You Know Where To Find It.
Ifdef Out
IFF
IFFN
II
IIRK
IIS
IKE
Ill-Behaved
ILS
IM
Imagery
Imagery Intelligence
Imagery Interpretation
IMAP (Internet Message Access Protocol)
IMHO
IMINT
Imitative Communications
Imitative Communications Deception
Imminent Death Of The Net Predicted!
IMP
Impact Area 1
Impact Delay Interval
Impact Percent
Impacted Assets
Impersonating
Impersonation
Implant
Implementation (Life Cycle)
Implementation Verification
Imposter
Impulsive Emanation
IN
In the clear
In The Extreme
IN/1
IN/1+
IN/2
Ina Jo
Ina Jo (formal Development Methodology)
Inadvertent
Inadvertent Disclosure
Inc
Incantation
Incident
Incident analysis
Incident Response
Incident severity
Include
Include War
Incomplete Parameter
Incomplete Parameter Checking
Incremental backup
Indent Style
Index
Indicator
Individual
Individual Accountability
Industrial Espionage
Industrial Security
Inetd
Inetd.config
INF
Infant Mortality
Infection
Inference
Inference Engine
Infinite
Infinite Loop
Infinite-Monkey Theorem
Infinity
Infix
Infocom
Information
Information And Indicator Sources
Information Availability
Information Bit
Information Categorization
Information Channel
Information Classification
Information Collection
Information Collection And Sharing
Information Confidentiality
Information Control
Information Criticality
Information Feedback
Information Field
Information Flow
Information Flow Analysis
Information Flow Control
Information Integrity
Information Label
Information Ownership
Information Perishability
Information Processing
Information Processing Center
Information Ratio
Information Resource Management
Information Resource Owner/Custodian
Information Resources Management
Information Security
Information Security Policy
Information Sensitivity
Information Source
Information States
Information System
Information System Abuse
Information System Security
Information System Security Officer
Information Systems
Information Systems Security
Information Systems Security Officer
Information Systems Security Product
Information Systems Security Products And Services Catalogue
Information Technology
Information Technology Facility
Information Technology Installation
Information Transfer
Information Valuation
Information warfare
Information-Transfer Phase
Information-Transfer Transaction
INFOSEC
Ingress filtering
Initial authentication stage
Initial Cost
Initial negotiation
Initial Product Assessment Report
Initial State
Initialize
Initiation
Input
Input Data
Input/output Device
Input-Output Channel
Input-Output Controller
Insanely Great
Inspectable Space
Installation
Instant messaging (IM)
Instruction
Instruction Processor
Instrumentation Signals Intelligence
Insurance
Integrated Digital Network
Integrated log
Integrated Services Digital Network
Integrated Station
Integrated System
Integrated Voice Data Terminal
Integrity
Integrity Check Value
INTEGRITY:D1
INTEGRITY:D2
Intellectual property
Intellectual Property Rights
Intelligence
Intelligence Collection
Intelligence Cycle
Intelligence Estimate
Intelligence Information
Intelligence Life
Intelligence Processing
Intelligence Production
Intelligence System
Intelligent Network
Intelligent Peripheral
Intelligent Terminal
Intention
Intentional
Interactive Computing
Interactive Data Transaction
Interagency Sharing Of Information Technology Facilities
INTERCAL
Interdiction
Interesting
Interface
Interim Approval
Interim Approval To Operate
Interior doors
Internal auditing
Internal Control Documentation
Internal Control Report
Internal Control Review
Internal Control System
Internal Controls
Internal Controls And Security
Internal firewall
Internal Label
Internal Memory
Internal Protected Distribution System
Internal Security Audit
Internal Security Controls
Internal Storage
International Espionage
International Organization for Standardization (ISO)
International Security Considerations
International Standards Organization
International Telecommunications Union–Telecommunications Standards Sector (ITU-T)
Internet
Internet Address
Internet Control Message Protocol (ICMP)
Internet Engineering Task Force (IETF)
Internet Information Server (IIS)
Internet Key Exchange (IKE)
Internet layer
Internet Message Access Protocol (IMAP)
Internet Official Protocol Standards
Internet Private Line
Internet Private Line Interface
Internet Protocol
Internet Protocol (IP)
Internet Security
Internet Server Application Programming Interface (ISAPI)
Internet use policy
Internet Worm
Internets
Internetwork Connection
Internetwork Operating System (IOS)
Internetworking
Interoperability
Interoperability Standard
Interoperation
Interorganizational systems
Interpret
Interprocess Communication (IPC)
Interrogation
Interrupt
Interrupt Handlers
Interrupt List, The
Interrupted Isochronous Transmission
Interruption
Interrupts And Traps
Interrupts Locked Out
Intranet
Introduction To Certification And Accredidation
Intrusion Detection
Intrusion detection system (IDS)
Intrusion Deterrents
INTSEC
Investigation
Investigation Of Security Breaches
Investigation(s)
Investigative Authorities
IOC
IOS (Internetwork Operating System)
IOSS
IOT&E
IP
IP (Internet Protocol)
IP address hiding
IP address spoofing
IP security (IPsec)
IPAR
IPC
IPC Files
IPM
IPsec (IP security)
IPsec gatekeeper
IPsec header
IPSO
IRC
Iris scanning
IRK
IRM
Iron
Iron Age
Iron Box
Ironmonger
IS
IS Program Budgeting
IS Security Program Planning
ISAPI
ISDN
ISINT
ISM
ISO
Isochronous
Isochronous Burst Transmission
Isolation
Isolation And Mediation
Isolation Of User Programs
ISRD
ISS
ISSO
IT
IT Asset Valuation
IT auditing
IT infrastructure
ITAR
Items Of Intrinsic Military Utility
ITF
ITM
ITS
ITU-T (International Telecommunications Union–Telecommunications Standards Sector)
IV&V
IVDT
IWBNI
J
J. Random
J. Random Hacker
Jack In
Jaggies
Jamming
Java
Javascript
JCL
JEDR
JFCL
Jiffy
Journaling
JTIDS
JTRB
K
KAK
KB
KBAF
KBE
KDC
KE
KEK
Kerberos
Kerberos authentication service
Kerberos server
Key distribution center
Key escrow
Key exchange
Key features
Key length
Key ring
Key-Hashed Message Authentication Code (HMAC)
Keystroke capture program
Keystroke recognition
KG
Kiddie script
Kill
Killer Poke
Kilo
KIPS
KISS Principle
Kit
Klone
Kludge
Kluge
Kluge Around
Kluge Up
KMASE
KMC
KMID
KMODC
KMP
KMPDU
KMS
KMSA
KMUA
Knights Of The Lambda Calculus
Know How
Knowledge Base
Known vulnerability
Knuth
KP
KPK
Kremvax
KSOS
KVG
KVM/370
Kyrka
L
L2TP
Label
Labeled Security Protection
Labeling
Lace Card
Lamer
LAN
LAN (Local Area Network)
LAN Manager
LAND attack
Land Mobile Service
Land Mobile Station
Land Station
Landscape Mode
Language
Language Lawyer
Language Processor
Languages Of Choice
LANMAN
Laptop Computer
Larval Stage
Lase
Laser
Laser Chicken
Laser Intelligence
Lasherism
LASINT
Last-In, First-Out
LATA
Latent fingerprint
Lattice
Lattice Model
Laundromat
Law Enforcement Interfaces
Laws, Regulations, And Other Public Policies
Layer 2 Tunneling Protocol (L2TP)
LDB
LEAD
Leaf Site
Leak
Leaky Heap
Leapfrog Attack
Learning aids
Leased-Line Networks
Least Privilege
Leech
Legacy security technology
Legal
Legal And Liability Issues
Legalese
Legitimate User
LER
LERP
Lessons Learned
Let The Smoke Out
Letterbomb
Level
Level I/II/III
Level Of Trust
Lexer
Lexiphage
Liberty Alliance
Life
Life Cycle
Life Cycle Security
Life Cycle System Security Planning
Life Is Hard
Life-Cycle
Life-Cycle Security
LIFO
Light Pipe
Lightweight
Like Kicking Dead Whales Down The Beach
Like Nailing Jelly To A Tree
Likelihood of a threat
LIMDIS
LIMFACS
Limited Access
Limited Access Area
Limited Access Security Mode
Limited ADP Access Security Mode
Limited Area
Limited Exclusion Area
Limited Maintenance
Limited Protection
Line
Line Authentication
Line Conduction
Line Conductors
Line Eater, The
Line Load Control
Line Noise
Line Of Sight
Line Starve
Linear Analog Synchronization
Linear Predictive Coding
Linear Programming
Linearithmic
Link
Link Control Protocol
Link Encryption
Link Farm
Link Layer
Link Level
Link Protocol
Linkage
Link-By-Link Encipherment
Link-By-Link Encryption
Link-Dead
Lint
Linux
LINUX distribution
Lion Food
Lions Book
LISP
List Oriented
List-Based Access Controls
List-Oriented
Literature Intelligence
Literature, The
Lithium Lick
LITINT
Little-Endian
Live
Live Data
Live Free Or Die!
Live testing
Livelock
Liveware
LKG
LLC
LLNL
LMD
LME
LMI
Lobotomy
Local Area Network
Local Area Network (LAN)
Local Area Network Security
Local Exchange Loop
Local Nationals
Local Users and Groups
Locals, The
LOCK
Lock down
Lock-And-Key Protection System
Locked And Loaded
Locked Up
Lockout
Log
Log entry
Logging
Logic bomb
Logical
Logical Access Control
Logical Circuit
Logical Completeness
Logical Completeness Measure
Logical Link Control Sublayer
Logical Signaling Channel
Logical Topology
Login
Login History
Login password
Login/log In
Log-Off
Logoff/log Off
Logon
Log-On
Logon/log On
Logs And Journals
Long Title
Long-Haul Communication
Long-Range Plan
Loop
Loop Through
Loop-Back
Loophole
Loose Bytes
Lord High Fixer
LOS
Lose
Lose Lose
Loser
Losing
Loss
Lossage
Lost Call
Lost In The Noise
Lost In The Underflow
Lots Of MIPS But No I/O
Low Power
Low Probability Of
Low Probability Of Detection
Low Probability Of Intercept
Low Water Mark
Low-Bandwidth
LP
LPC
LPD
LPI
LPT
LRIP
Ls
LSI
LTHE
Lubarsky's Law Of Cybernetic Entomology
Lunatic Fringe
Lurker
Luser
M
M
MAC
MAC (Media Access Control)
Macdink
Machinable
Machine Cryptosystem
Machine Instruction
Machine Language
Machine Learning
Machine Word
Machine-Oriented Language
Machine-Readable Medium
Machoflops
Macintoy
Macintrash
Macro
Macrology
Macros
Macrotape
Maggotbox
Magic
Magic Cookie
Magic Number
Magic Smoke
Magnetic Card
Magnetic Core Storage
Magnetic Disk
Magnetic Disk Unit
Magnetic Drum
Magnetic Drum Unit
Magnetic Field
Magnetic Field Intensity
Magnetic Flux
Magnetic Flux Density
Magnetic Media
Magnetic Oxide
Magnetic Remanence
Magnetic Saturation
Magnetic stripe card
Magnetic Tape
Magnetic Tapes
Mail host
Mail server
Mail server antivirus program
Mail Storm
Mailbomb
Mailbox
Mailing List
Main firewall
Main Loop
Mainframe
Maintainability
Maintenance
Maintenance Hook
Maintenance Key
Maintenance Of Configuration Documentation
Maintenance Procedures, Contract Employee
Maintenance Procedures, Local Employee
MAJCOM
MAJCOM C4 Systems Security Office
MAJCOM Computer System Security Manager
MAJCOM Computer System Security Manager (MCSSM)
Major incidents
Major Information System
Malicious Code
Malicious links
Malicious Logic
Malicious payload
Malicious software (Malware)
Malware (malicious software)
MAN
MAN (Metropolitan Area Network)
Managed security service provider (MSSP)
Management
Management Control Process
Management Information System
Management Of The Security Function
Manchester Encoding
Mandatory
Mandatory Access
Mandatory Access Control
Mandatory Access Control (MAC)
Mandatory Access Controls
Mandatory default algorithms
Mandatory Modification
Mandatory Protection
Mandatory vacations
Mandelbug
Manged
Mangle
Mangler
Mango
Man-in-the-middle attack
Manipulation Detection
Manipulative
Manipulative Communications Deception
Manual Cryptosystem
Manual Remote
Manual Remote Rekeying
Manularity
MAPLESS
Marbles
Marginal
Marginal Hacks
Marginally
Mark
Marketroid
Marking
Marking Of Media
Marking Of Sensitive Information
Marking Pulse
Marking Signal
Mars
Martian
M-Ary Code
MASINT
Mask
Masquerade
Masquerading
Massage
Master Crypto-Ignition Key
Master key
Master Station
Match index
Matching Programs
Material
Material Symbol
Math-Out
Matrix
MATSYM
Maximum Access Time
Maximum Maytag Mode
Mbogo, Dr. Fred
MBSA
MCCB
MCCR
MCSSM
MCTL
MD5
MD5 CHAP
MDC
Measure Of Effectiveness
Measurement And Signature Intelligence
Meatware
Media
Media Access Control (MAC)
Media Convergence
Mediation
Medium
Medium Access Control Sublayer
Meeces
MEECN
Meg
Mega
Megapenny
MEGO
Meltdown, Network
Member server
Meme
Meme Plague
Memetics
Memory
Memory (Non-Volatile)
Memory (Random)
Memory (Sequential)
Memory (Volatile)
Memory Address Translation Unit
Memory Bounds
Memory Bounds Checking
Memory Leak
Memory Mapping
Memory Page Cache
Memory Smash
Menu
Menuitis
MEP
MER
Message
Message Alignment Indicator
Message Authentication
Message Authentication Code
Message Authentication Codes
Message Broadcast
Message digest
Message Distribution Center
Message Externals
Message Format
Message Handling Systems
Message Indicator
Message integrity
Message Register Leads
Mess-Dos
Meta Bit
Metadata
Metal Particle Tape
Metamorphic viruses
Metasyntactic Variable
Method
Metric
Metrics
Metropolitan Area Network (MAN)
Metropolitan Area Network MAN
MFTL
Mgt
MHS
MHz
MI
MIB
Mickey
Mickey Mouse Program
Micro
Microcode
Microcomputer
Microengine
Microfloppies
Microfortnight
Microinstruction
MicroLenat
Microprocessor
Microprogram
MicroReid
Microsequencer
Microsoft Baseline Security Analyzer (MBSA)
Microsoft Challenge-Handshake Authentication Protocol (MS-CHAP)
Microsoft Management Console (MMC)
Microsoft Point-to-Point Encryption (MPPE)
Microtape
Microwave mw
Microwave/Wireless Communications Security
Middle-Endian
MIJI
Militarily Critical Technology
MilliLampson
MIL-STD
MIME filtering
Mimicking
Minicomputer
Minifloppies
Minimal Protection
Minimizing security burdens
Minor Change
Minor Change To A System Of Records
Minor incidents
MINTERM
MIPR
MIPS
Misbug
Misfeature
Missed'em-Five
Missile Address
Mission-Critical
Mission-Essential Unclassified Information
Miswart
MLS
MMC (Microsoft Management Console)
MOA
Mobile COMSEC Facility
Mobile content
Mobile Workstation Security
Moby
Mockingbird
Mod
Mode
Mode Bit
Mode Of Operation
Modem
Modes Of Operation
Modification
Modularity
Modulo
MOE
Molly-Guard
Mongolian Hordes Technique
Monitor
Monitor Signal
Monitoring
Monitoring (e. g. , Data, Line)
Monkey Up
Monkey, Scratch
Monochromatic
Monographic Processing
Monolithic TCB
Monstrosity
Monty
Moof
Moore's Law
Moose Cal
MOP
More fragments
Moria
MOU
Mouse
Mouse Ahead
Mouse Around
Mouse Belt
Mouse Droppings
Mouse Elbow
Mouso
MPPE (Microsoft Point-to-Point Encryption)
MRK
MRT
MS-DOS
MSE
MTBF
MTR
MTT
Mu
MUD
Muddie
Mudhead
Multichannel Information
Multician
Multics
Multilevel
Multi-Level
Multilevel Device
Multilevel Mode
Multilevel Mode Or Multilevel Security Mode
Multilevel Processing
Multilevel Secure
Multilevel Security
Multilevel Security Mode
Multilevel Systems
Multiple Access
Multiple Access Rights Terminal
Multiple Call
Multiplexing
Multiprocessing
Multiprocessor
Multiprogramming
Multi-pronged attacks
Multi-Satellite Link
Multitask
Multitasking
Multi-User Hosts
Multiuser Mode Of Operation
Multi-User Mode Of Operation
Multi-User Security Mode
Multi-User Security Mode Of Operation
Mumblage
Munch
Munching
Munching Squares
Munchkin
Mundane
Mung
Munge
Murphy's Law
Music
Mutter
Mutual Suspicion
Mutual Synchronization
Mutually Suspicious
Mutually Synchronized Network
MUX
Mw
N
N
Na∩ve adj.
NACAM
NACSEM
NACSI
NACSIM
Nadger
Nagware
Nailed To The Wall adj.
Nailing Jelly vi.
Naive User
NAK
Nak Attack
Nano
Nano- pref.
Nanoacre
Nanobot
Nanocomputer
Nanofortnight n.
Nanotechnology
NAR
NARA
Narrative Traffic
Narrowband Modem
Nasal Demons
Nastygram
NAT (network address translation)
Nathan Hale
National Communications System
National Computer Security Assessment Program
National Computer Security Center
National Coordinating Center (NCC)
National Electric Code(r)
National Information Infrastructure
National Information Infrastructure Protection Act of 1996
National Security
National Security /or Emergency Preparedness Telecommunications
National Security And Emergency Telecommunications
National Security Decision Directive
National Security Decision Directive 145
National Security Decision Directive 145 (NSDD 145)
National Security Information
National Security Systems
National Telecommunications And Information System Security Advisory/Information
NATO
Nature
NBH
NCA
NCC
NCCD
NCS
NCSC
NCSC Bulletin
NCSC-TG-001
NCSC-TG-002
NCSC-TG-003
NCSC-TG-004
NCSC-TG-006
NCSC-TG-007
NCSC-TG-008
NCSC-TG-009
NCSC-TG-010
NCSC-TG-011
NCSC-TG-013
NCSC-TG-014
NCSC-TG-015
NCSC-TG-016
NCSC-TG-017
NCSC-TG-018
NCSC-TG-019
NCSC-TG-021
NCSC-TG-022
NCSC-TG-023
NCSC-TG-024
NCSC-TG-025
NCSC-TG-026
NCSC-TG-027
NCSC-TG-028
NCSC-TG-029
NCSC-TG-030
Neat Hack
Neats Vs. Scruffies
NEC
Necessary Bandwidth
Need To Know
Need-To-Know Controls
Need-To-Know Violation
Neep-Neep
Negative-Acknowledge Character
N-Entity
Neophilia
Net
Net Control Station
Net Operation
Net. God
Net. Personality
Net. Police
NetBIOS
NetBOLLIX
Netburp
Nethack
Netiquette
Netlag n.
Netnews
Netrock
NETS
Netsplit
Netstat
Netter
Network
Network address translation (NAT)
Network Architecture
Network Busy Hour
Network Communications Protocols
Network Connectivity
Network Control System
Network Firewalls
Network Front End
Network IDSs (NIDSs)
Network Interface
Network Interface Device
Network Interface Unit (NIU)
Network Layer
Network login key
Network Manager
Network mask
Network Meltdown
Network Monitoring
Network monitoring tools
Network part
Network Reference
Network Reference Monitor
Network Security
Network Security Manager (NSM)
Network Security Officer
Network Security Software
Network Switching
Network System
Network Terminal Number
Network Time Protocol (NTP)
Network Topology
Network Trusted
Network Trusted Computing Base (NTCB)
Network Utility
Network Weaving
Network, The
New Testament
Newbie
Newgroup Wars
Newline
News
Newsfroup
Newsgroup
N-Function
Nibble
Nick
NID
NIDS
Night Mode
Nightmare File System
NII
NIL
Nimda
Ninety-Ninety Rule
NISAC
NIST
NIU
NKSR
NM
No Addtional Requirements
No Contract
No opt
Noddy
Node
NOFORN
Noise
No-Lone Zone
NOMEX Underwear
Nominal Bit Stuffing Rate
Nominal Semidestructor
Nonce
Noncentralized Operation
Noncooperative
Noncooperative Remote Rekeying
Non-Discretionary Security
Nonferrous Shielding
Non-Inference Model
Non-Kernel Security-Related Software (NKSR)
Nonlinear
Non-Maskable Interrupt
Non-Optimal Solution
Nonprocedural Language
Non-Processing Input And Output Devices
Non-Removable Storage Media
Nonrepudiation
Non-Repudiation
Non-Return-To-Zero Code
Non-Return-To-Zero, Change-On-Ones
Non-Secret Encryption
Nonsynchronous Network
Nonsynchronous System
Nontrivial
Nontunable
Nonvolatile Memory
Non-Volatile Memory
No-Op
Not Ready For Prime Time
Notarization
Notebook Computer
Notes
Notices
Notwork
NP
Nroff
NRZ
NRZ1
NSA
NSA Line Eater n.
NSAD
NSA's Ratings Maintenance Phase
NSD
NSDD
NSDD 145
NSEP
NSI
NSM
NSO
NSP
NSRP
NSTAC
NSTISSAM
NSTISSC
NSTISSD
NSTISSI
NSTISSP
NT LAN Manager (NTLM)
NTCB
NTI
NTIA
NTIS
NTISS
NTISSAM
NTISSC
NTISSD
NTISSI
NTISSP
NTLM (NT LAN Manager)
NTM
NTN
NTSC Standard
N-Tuple
Nude
Nuke
Null
Number-Crunching
Numbers
NUXI Problem
NXX
Nybble
Nyetwork
O
O&M
OADR
Ob
Obfuscated C Contest
Obi-Wan Error
Object
Object Labeling
Object Reuse
Object Sharing
Objectionable-C
Obscure
Observables
OCR
Octal Forty
Octet
Odd Parity
Odd-Even Check
OEM
Oersted
Off The Trolley
Off-By-One Error
Office Of Information And Regulatory Affairs
Office Of Personnel Management
Official Use Only (OUO)
Offline
Offline Crypto-Operation
Off-Line Crypto-Operation
Off-Line Cryptosystem
Off-Site Security (Information, Processing)
Off-The-Shelf Item
Ogg /og/ v. [CMU]
-Oid*
Old Fart n.
Old Testament n.
OMB
OMB A-130
OMB CIR
OMB CIRC
OMB Circular A-127
ONA
One-Banana Problem n.
One-Line Fix n.
One-Liner Wars
One-Part Code
One-Time
One-Time Cryptosystem
One-Time Pad (OTP)
One-time password
One-Time Passwords
One-Time Tape (OTT)
One-Way Function
Ongoing communication
Online Crypto-Operation
On-Line Crypto-Operation
On-Line Cryptosystem
Ooblick
Op /op/ n.
OPCODE
Open DeathTrap n.
Open n.
Open Security
Open Security Environment
Open Source Information
Open Sources
Open Storage
Open Switch
Open System
Open Systems Interconnect Model OSI
Open Systems Interconnection
Open Systems Interconnection - Protocol Specifications
Open Systems Interconnection - Service Definitions
Open Systems Interconnection - Systems Management
Open Systems Interconnection Architecture
Open Systems Interconnection Protocol Specifications
Open Systems Interconnection Service Definitions
Open Systems Interconnection Systems Management
Open Systems Interconnection--Reference Model (OSI-RM)
Open Systems Security
OpenBSD
OpenPGP
Operand
Operating System
Operating System Integrity
Operating system lockdown
Operating system monitor
Operating System Security Features
Operating Systems
Operation
Operational Data
Operational Data Security
Operational Key
Operational Procedures Review
Operational Security Indicators
Operational Site Security Manual
Operational Waiver
Operations Code (OPCODE)
Operations Security (OPSEC)
Operations Security Appraisal
Operations Security Assessment
Operations Security Indicators
Operations Security Measures
Operations Security Monitoring
Operations Security Planning Guidance
Operations Security Process
Operations Security Survey
Operations Security Vulnerability
Operations Security Working Group
Operator
Operator Of A Federal Computer System
OPI
OPM
OPNAVINST
OPNAVINST 5239. 1A
OPSEC
OPT
Opt in
Opt out
Optical Character Reader
Optical Character Recognition
Optical Diff
Optical Grep
Optical Intelligence
Optical/Imaging Systems Security
Optimism
OPTINT
Optional Modification
Options
OR
OR/D2
Orange Book
Orange Book Terminology
ORCON
ORD
Organization C4 Systems Security Office
Organizational
Organizational Culture
Organizational Maintenance
Organizational Placement Of The IS/IT Security Function
Oriental Food
Orientation
Originating User
Orphan
Orphaned I-Node
Orthogonal adj. [from mathematics]
OS
OS/2
OSI
OSI (Reference Model of Open Systems Interconnection)
OSINT
OSU
OT&E
OTAD
OTAR
OTAT
OTOH
OTP
OTT
OUSDR&E
Outage
Outage Duration
Outage Probability
Outlook
Outlook Express
Out-Of-Band
Out-Of-Band Emission
Out-Of-Band Signaling
Output
Output-Only Devices
Outside Plant
Outsourced antivirus protection
Overall Security
Overflow
Overflow Bit n.
Overflow Pdl
Overhead Bit
Overhead Communications
Overrun n.
Oversight
Overt Channel
Overt Collection
Over-The-Air Key
Over-The-Air Key Distribution
Over-The-Air Key Transfer (OTAT)
Over-The-Air Rekeying (OTAR)
Overwrite
Overwrite Procedure
Overwriting
Owner
Owner Access Mode
Owner Of Data
P
P Model
P&D
P. O. D.
P3P
PA
PAA
PABX
Packet
Packet Assembler/disassembler
Packet Filtering
Packet Format
Packet inspection
Packet Switched Networks
Packet Switching
Packet Transfer Mode
Packet-Mode Terminal
Packet-Switched Data Transmission Service
Packet-Switching Network
PAD
Padded Cell
PAE
Page In
Page Out
Pain In The Net
Paired Disparity Code
PAL
Palladium
PAP
Paper-Net
Paperwork Reduction Act
Parallel Computer
Parallel Information Unit
Parallel Processing
Parallel Transmission
Parallel-To-Serial Converter
Param
Parameters
PARC
Parent Message
Parity
Parity Check
Parity Errors
Parkinson's Law Of Data
Parm
Parse
Partial Ordering
Partitioned Security Code
Partitioned Security Mode
Pascal
Pass
Pass Key
Pass phrase
Passive Attack
Passive fingerprinting
Passive Station
Passive Threat
Passive Wiretapping
Passphrase
Passport
Passwd
Password
Password Authentication Protocol (PAP)
Password Dialogue
Password Length Equation
Password Length Parameter
Password Management
Password Management Guideline
Password reset
Password Space
Password System
Password-cracking software
Pastie
PAT (Port address translation)
Patch
Patch Space
Patch test system
Path
Pathological
Patriot Act of 2001
Patterns
PAX
Payload
Payware
PBD
PBX
PC
PCA
PC-Ism
PCS
PCZ
PD
Pdl
PDN
PDP-10
PDP-20
PDR
PDS
PDU
Peek
Peer-Entity Authentication
Peer-To-Peer Security
Pen registers
Pencil And Paper
Penetration
Penetration Paths
Penetration Profile
Penetration Signature
Penetration Study
Penetration Testing
Peon
PERC
Per-Call Key
Perceived Threat
Percent of disruption
Percent-S
Perf
Perfect Programmer Syndrome
Performance
Performance Parameter
Peril
Periods Processing
Peripheral Device
Peripheral Devices
Peripheral Equipment
Perl
Permissions
Permit All
Permuter
Perpetrator
Person Of No Account
Personal Data
Personal Identification Number
Personal Identification Number (PIN)
Personal Identifier
Personal IDS
Personal Password
Personnel
Personnel Screening
Personnel Security
Personnel Security Policies And Guidance
PES
Pessimal
Pessimizing Compiler
Peta
PETSCII
PGP (Pretty Good Privacy)
Phage
Phase
Phase Of The Moon
Phase-Locked Loop
Phase-Wrapping
Phonetic Alphabet
Photosensitive Recording
Phracker
Phreak
Phreaker
Phreaking
Physical Compromise
Physical Control Space
Physical Control Space/physically Controlled Space (PCs)
Physical Layer
Physical link
Physical Memory Location Of The Instruction
Physical Seals
Physical Security
Pico
PID (Process ID)
Pig, Run Like A
Piggy Back
Piggy Back Entry
Piggyback
Piggybacking
Pilot Error
PIN (Personal Identification Number)
Ping
Ping (Packet INternet Groper)
Ping scanning
Ping-of-Death
Pink-Shirt Book
PIP
Piracy
Pistol
PIX
Pixel Sort
Pizza Box
Pizza, ANSI Standard
PKA
PKC
PKI (Public key infrastructure)
PKSD
PL
PL/1
PLA
Plaid Screen
Plain Text
Plain Text/plain-Text
Plain-ASCII
Plaintext
Plan File
Planning
Plan-protect-respond (PPR)
Platform for Privacy Preferences (P3P)
Platform-Specific Security
Platinum-Iridium
Playpen
Playte
Plingnet
Plokta
Plonk
Plotter
PLSDU
Plugh
Plumbing
PM
P-Mail
PMD
PMO
PMP
Pnambic
PNEK
PNET
Pod
Point Of Presence
Point-And-Drool Interface
Pointer Bug
Point-to-Point Protocol (PPP)
Point-to-Point Tunneling Protocol (PPTP)
Poisson Function
Poke
Policies
Policy
Policy Development
Policy Enforcement
Policy-based audits
Poll
Polygon Pusher
Polygraphic Processing
POM
Pop
POP (Post Office Protocol)
Pop-behind ads
POPJ
Port address translation (PAT)
Port numbers
Port scanning
Port spoofing
Port-switching application
Poser
Position Sensitivity
Positive Control
Positive Control Material
Post
Post Office Protocol (POP)
Postcardware
Posting
Postmaster
Postmortem analysis
PostScript
Post-Selection
Potential Threat
Pound On
Power Controls (e. G. , UPS, Emergency Power)
Power Cycle
Power Hit
Power Line Conduction
Power Line Modulation
Power users
Powerline Conduction
PPL
PPN
PPP (Point-to-Point Protocol)
PPS
PPTP (Point-to-Point Tunneling Protocol)
PPTP access concentrator
Practice Dangerous To Security
Practices
PRBAC
Precedence Lossage
Precision
Predicated Event
Preferred Products List (PPL)
Preliminary Technical Report
Prepend
Preproduction Model
Pre-Selection
Preserving evidence
President's Council On Integrity And Efficiency
Prestidigitization
Pretty Good Privacy (PGP)
Pretty Pictures
Prettyprint
Pretzel Key
Preventative Controls
Prevention
Preventive Maintenance
Price
Priesthood
Primary Distribution
Primary RED Conductor
Primary Station
Primary Substation
Prime authentication problem
Prime Time
Primitive
Principle of least permissions
Principle Of Least Privilege
Principles Of Control
Print Suppression
Print Suppression/print Suppress
Printing Discussion
Priority Interrupt
Priority Message
Privacy
Privacy Act
Privacy Act Guidelines
Privacy Act Of 1974
Privacy disclosure statements
Privacy Protection
Privacy System
Privacy Transformation
Private Automatic Branch Exchange
Private Automatic Exchange
Private Branch Exchange
Private Branch Exchange Security
Private Communication
Private Exchange
Private IP addresses
Private key
Private Key Cryptology
Private Line
Private network
Private Networks
Private port numbers
Privilege
Privilege Levels
Privilege Profile
Privileged Data
Privileged Instructions
Privileged Process
Privileges (Class, Nodes)
Privity
Probable cause
Probes
Procedural Security
Procedure-Oriented Language
Procedures
Process
Process Computer System
Process Control
Process Control Equipment
Process Control System
Process ID (PID)
Process Interface System
Process Isolation
Process Manager
Process Signaling
Processing
Processing performance
Processing Unit
Processor
Procurement
Procurement Lead Time
Product Questionnaire
Production Model
Production server
Professional Interfaces
Profile
Profiles
Proglet
Program
Program Origin
Programmable
Programmable Logic Array
Programmable Read-Only Memory
Programmer
Programmer's Cheer
Programming
Programming Fluid
Programming Language
Programming System
PROM
Promiscuous mode
Propaganda
Propagation
Propagation Of Risk
Propagation vector
Propeller Head
Propeller Key
Property
Property Protection Area
Property Star Property
PROPIN
Proprietary
Proprietary Data
Proprietary Information
PROSECUTION
Protect As Restricted Data
Protected
Protected Communications
Protected Distributed System
Protected Distribution System (PDS)
Protected Information
Protected Services
Protected Wireline Distribution System
Protection
Protection Bits
Protection Critical
Protection Equipment
Protection From Malicious Code
Protection Index
Protection Mechanisms
Protection Philosophy
Protection Ring
Protection-Critical Portions Of The TCB
Protection-Critical Portions Of Trusted Computing Base
Protective
Protective Features
Protective Measures
Protective Mechanism
Protective Packaging
Protective Technologies
Protective Technology
Protective Technology/Package Incident
Protocol
Protocol Data Unit
Protocol enforcement
Protocol field
Protocol stack monitors
Protocols
Prototype
Provably Secure Operating System
Provisioning
Provocative Maintenance
Prowler
Proxy
Proxy firewall
Ps
PSDU
Pseudo
Pseudo-Flaw
Pseudoprime
Pseudorandom Noise
Pseudorandom Number Sequence
Pseudosuit
PSL
PSN
PSOS
PSTN
Psychedelicware
Psyton
PTR
PTT
Public Cryptography
Public Data Network
Public Data Transmission Service
Public Domain
Public Domain Software
Public Key
Public Key Cryptography (PKC)
Public Key Encryption
Public key infrastructure (PKI)
Public Law 100-235
Public Policy
Public Switched Network (PSN)
Public Switched NS/EP Telecommunications Services
Public Switched Telephone Network
Public Utility Commission
PUC
Puff
Punched Card
Punt
Purge
Purging
Purging Magnetic Media
Purple Book
Purple Wire
Purpose And Scope
Push
PUT
PVC
PWA
PWDS
PX
Q
QA
Q-bit (quantum bit)
QC
QKD (quantum key distribution)
QOS
QOT&E
QT&E
Quad
QUADRANT
Quadruple Bucky
Qualitative threat analysis
Quality Assurance
Quality Control
Quality Of Service
Quantifiers
Quantization
Quantization Level
Quantum bit (Q-bit)
Quantum Bogodynamics
Quantum computing
Quantum key cracking
Quantum key distribution (QKD)
Quarter
Quartz Clock
Ques
Queue
Queue Traffic
Queueing
Queueing Delay
Quick-And-Dirty
Quine
Quote Chapter And Verse
Quotient
QWERTY
R
R Services
R&D
RAC
RACE
Radar Intelligence
Radiant Energy
Radiant Power
Radiated Signal
Radiation
RADINT
Radio
Radio Fingerprinting
RADIUS (Remote Authentication Dial-In User Service) Server
Rain Dance
Rainbow Series
RAM
Ramp
Random
Random Access Memory
Random Noise
Random Number
Random Numbers
Randomizer
Randomness
Rare Mode
RAS (remote access server)
Raster Blaster
Raster Burn
RAT
Rat Belt
Rating
Rating Maintenance Phase
Rating Maintenance Plan (RM-Plan, RM Plan)
Rating Maintenance Report (RMR)
Ratings Maintenance Phase (ramp)
Ratings Maintenance Plan
Rave
Rave On!
Raw Mode
Rc File
Rc Scripts
RC4
RCCI
RD
Read
Read Access
Read Down
Read Head
Read Up
Read/write Opening
Read/write Slot
Reading
README File
Read-Only Memory
Read-Only Storage
Read-Only User
Real
Real Estate
Real Hack
Real Operating System
Real Programmer
Real Soon Now
Real Time
Real User
Real World
Reality Check
Realization
Realization Cost
Realm
Real-time
Real-time backup
Real-Time Reaction
Reaper
Reasonability Checks
REASSURE
Re-authentication
Receive Only
Recertification
RechRef
Recognition
Recommended practices
Reconciliation
Record
Record Communication
Record Information
Record Medium
Record Sheet
Record Traffic
Recorded Copy
Recording
Recording Density
Recoverable Zone
Recovery
Recovery agent
Recovery Procedure
Recovery Procedures
Rectangle Slinger
Recursion
Recursive Acronym
RED
Red Book
RED Conductor
RED Designation
RED Equipment
RED Equipment Area
Red Key
RED Line
RED Signal
RED Signal Line
Red Wire
RED/BLACK Concept
Redirect
Redundancy
Redundancy Check
Redundant Code
Reference Model of Open Systems Interconnection (OSI)
Reference Monitor
Reference Monitor Concept
Reference Monitors
Reference Validation
Reference Validation Mechanism
Refresh
Regeneration
Regexp
Register
Register Dancing
Registered port numbers
Regrade
Rehearsal
Reimbursement
Reincarnation, Cycle Of
Reinvent The Wheel
Re-keying
REL
Release Prefix
Reliability
Reliability Testing
Reliable
Religion Of CHI
Religious Issues
Remanance
Remote Access
Remote Access Data Processing
Remote access server (RAS)
Remote access VPNs
Remote administration Trojans (RATs)
Remote Authentication Dial-In User Service (RADIUS) Server
Remote Batch Entry
Remote Batch Processing
Remote Call Forwarding
Remote Control Equipment
Remote Job Entry
Remote Rekeying
Remote Terminal Area
Remote Terminal Protection Devices
Remotely Accessed Resource-Sharing Computer System
Removable Disk Media
Removable Storage Media
Repair
Repair Action
Repertory Dialer
Replacement Cost
Replay attack
Replicator
Report
Represented Asset Value
Reproducibility
Repudiation
Request
Request Data Transfer
Request for comment (RFC)
Requirements Traceability
Resale Parameter
Rescind
Reserve Keying
Reserve Keying Material
Reserved Word
Reset (RST)
Resident Memory
Residual Risk
Residue
Resource
Resource Encapsulation
Resource Sharing
Resource-Sharing Computer System
Response
Response Frame
Response message
Response Time
Responsibilities
Responsibility
Restart
Restitution
Restore
Restricted Access
Restricted Area
Restricted Data
Restricted Service
Restriction
Retcon
Retention
RETI
Retinal scanning
Retrieval
Retrieval Function
Retrieval Service
Retrocomputing
Retro-Virus
Return address
Return From The Dead
Return on investment (ROI)
Reusable password
Revenue
Review And Approval
Revocation
RF
RFC
RFC (request for comment)
RFC [AuQ5][AuQ5]822
RFC 2822
RFE
RFP
Rib Site
Rice Box
Right Thing
Ring Back
Risk
Risk acceptance
Risk Acceptance Process
Risk Analysis
Risk And Magnitude Of The Harm
Risk Assessment
Risk Index
Risk Management
Risk reduction
Risk transference
RKV
RL
Rlogin
RM Plan
RM-Plan
RMR
RO
Roach
Robot
Robust
Rococo
Rogue
ROI (Return on investment)
Role-Based Access Controls
Roles
Roles And Responsibilities
ROM
Root
Root Mode
Rootkit
Rot13
Rotary Debugger
Rotation of duties
Round Tape
Route
Router NIDS
Routine
Routing Control
Roving wiretaps
RPM
RQT
RSA
Rsh
RSN
RST (Reset)
RTBM
RTFAQ
RTFB
RTFM
RTFS
RTI
RTM
RTS
Rude
Rule
Rule Of Least Privilege
Rule-Based Access Controls
Rule-Based Security Policy
Rules-Based Access Controls
Run
Run mode
RunAs
Runes
Runic
Run-Length Encoding
Rusty Iron
Rusty Memory
Rusty Wire
RWX
S
S
S Interface
S&T
S/MIME (Secure MIME)
S/N Ratio
SA (Security association)
Sabotage
Sacred
Safe harbor
Safeguard
Safeguarding
Safeguarding Statement
Safeguards
Safety
Sagan
SAIL
SAISS
Salami Technique
Salescritter
Salt
Salt Mines
Salt Substrate
Same-Day Service
Samizdat
Sample Key
SAMS
Samurai
Sandbender
Sandbox
Sanitization
Sanitize
Sanitizing
Sanity Check
SAO
SAP
SARK
Satellite Communications Security
Saturday-Night Special
SAV
Say
Scag
Scanner
Scanning
Scanning attacks
Scanning Line
Scanning Line Frequency
Scanning Line Length
Scanning Pitch
Scanning Rate
Scanning Spot
Scanno
Scavenging
Scenario
Scenario Analysis
SCG
Schematic
Schroedinbug
SCI
Science-Fiction Fandom
Scientific And Technical Information
Scientific And Technical Intelligence
SCIF
SCOMP
Scope of an asset
SCP
Scram Switch
Scratch
Scratch Monkey
Scratch Pad Store
Scream And Die
Screaming Tty
Screen saver password
Screening firewall
Screening router
Scribble
Script kiddie
Scripting language
Scripts
Scrog
Scrool
Scrozzle
Scrubbing
Scruffies
SCSI
ScumOS
SDLC
SDNRIU
SDNS
SDR
Search-And-Destroy Mode
SEC (Securities and Exchange Commission)
SecDef
Second
Secondary Channel
Secondary Damage
Secondary Distribution
Secondary RED Conductor
Secondary Station
Second-System Effect
Secretary Of Commerce
Secretary Of Defense
Secretary Of State
Section 1030
Sector
Secure Communications
Secure Communications Processor
Secure Configuration Management
Secure MIME (S/MIME)
Secure Operating System
Secure Path
Secure Shell (SSH)
Secure Sockets Layer (SSL)
Secure State
Secure Subsystem
Secure System Operations
Secure Telecommunications And Information Handling Equipment
Secure Telephone Unit
Secure Working Area
Securities and Exchange Commission (SEC)
Security
Security Administrator
Security Advisory/information Memorandum
Security And Privacy Advisory Board
Security Architecture
Security Area
Security association (SA)
Security Audit
Security Audit Trail
Security audits
Security awareness
Security Awareness And Training
Security baseline
Security breach
Security center
Security Classification Guide
Security Cost Benefit Analysis
Security Countermeasures
Security Criteria
Security Critical
Security Critical Mechanisms
Security department
Security Design Review
Security Directives
Security Domains
Security Education
Security Engineering
Security Environment
Security Evaluation
Security Fault Analysis
Security Features
Security Features Users' Guide
Security Filter
Security Flaw
Security Flow Analysis
Security Functional Testing
Security Incident
Security Inspection
Security Inspections
Security Interest
Security Kernel
Security Label
Security Level
Security Measures
Security Mechanisms
Security Mode
Security Module
Security Officer
Security Officers
Security Parameters
Security patches
Security Perimeter
Security policies
Security Policy
Security Policy Model
Security Product Integration
Security Product Testing/Evaluation
Security Products
Security Range
Security Relevant Event
Security Relevant Portion
Security Requirements
Security Requirements Baseline
Security Requirements For Automatic Information Systems (AISs)
Security Reviews
Security Safeguards
Security Service
Security Specification
Security Specifications
Security Staffing Requirements
Security Test And
Security Test And Evaluation
Security Testing
Security Threat
Security Through Obscurity
Security Training
Security Violation
Security Violations Reporting Process
Security-Enhanced LINUX
Security-Relevant Event
Security-Relevant Functions
Seed Key
Seek
Seek Time
Seepage
Segfault
Segment
Segmentation Fault
Segmented Encoding Law
Segments
Segregation
Selective Field Protection
Self-Authentication
Self-Certification
Self-defense training
Sender
Sendmail
Sensitive
Sensitive Application
Sensitive Business Data
Sensitive But Unclassified
Sensitive Compartmented Information
Sensitive Compartmented Information Facility
Sensitive Compartmented Intelligence
Sensitive Data
Sensitive Defence Information
Sensitive Defense Information
Sensitive Information
Sensitive Nuclear Material Production Information
Sensitive personal information
Sensitive Software
Sensitive System
Sensitive Unclassified Information
Sensitivity
Sensitivity And Criticality
Sensitivity And Criticality Assessment
Sensitivity Assessment
Sensitivity Label
Sensitivity Level
Sensor
Sentinel
Separation Of Duties
Separation Of Privilege
Separation of responsibilities
Sequence
Sequence number
Sequential Access
Sequential Logic Element
Sequential processing
Serial
Serial Access
Serial Digital Computer
Serial Transmission
Serializer
Serial-To-Parallel Converter
Server
Server room
Server-side programming
Service
Service Feature
Service Interruption Hazard
Service Set Identifier (SSID)
Service ticket
Services
Services and Applications
Session
Session hijacking
Session key
Session Layer
Session Security Level
Set
Seven-Bit Byte
Severity
Sexadecimal
Sextet
S-F
SFA
SFUG
SFUG:D1
SFUG:D2
SHA-1
Shadow password file
Shambolic Link
Shar File
Shared password
Shared secret
Shareware
Sharing
Sharing Of Software
Shelfware
Shell
Shielded Enclosure
Shielded Enclosures
Shift Left (or Right) Logical
Shift Register
Shim
Short Card
Short Range Plan
Short Title
Shotgun Debugging
Shoulder Surfing
Shovelware
Showstopper
Shredding tools
Shriek
Shub-Internet
SI
Side effect
Sidecar
Sieve
SIG
Sig Block
Sig Quote
Sig Virus
SIGINT
Signal
Signal Intelligence
Signal Security
Signals Intelligence
Signals Security
Signal-To-Noise Ratio
Signature
Signature recognition
Significant Change
Significant Computer Security Incident
Significant Condition
Significant Digit
Significant Instant
Significant Modification
Significant Risk Of Telecommunications Exploitation
SIGNIN
Signing
SIGNON
SIGSEC
SIGSEC Signals Analysis
Silicon
Silly Walk
Silo
Silver Book
Simple Buffering
Simple Mail Transfer Protocol (SMTP)
Simple Scanning
Simple Security
Simple Security Condition
Simple Security Property
Simplex Operation
Simulate
Since Time T Equals Minus Infinity
Single Integrated Operational Plan-Extremely Sensitive Information (SIOP-ESI)
Single Point Keying
Single points of vulnerability
Single Sign-On
Single sign-on (SSO)
Single-Level Device
Single-message break-in
Single-User Hosts
SIOP-ESI
SISS
Site
Site sharing
Sitename
Site-to-site VPNs
Six-Bit Byte
Skrog
Skulker
Slab
Slack
Slap On The Side
Slash
Sleep
Slim
Slop
Slopsucker
Slot
Slurp
Smart
Smart Card
Smart Terminal
Smartcards/Token Authentication
Smash Case
Smash The Stack
Smiley
SMM
SMO
Smoke
Smoke And Mirrors
Smoke Test
Smoking Clover
SMOP
SMTP (Simple Mail Transfer Protocol)
SMTP relay proxy server
SMU
Smurf
SNAFU Principle
Snail
Snail-Mail
Snap
Snap-in
Snarf
Snarf & Barf
Snarf Down
Snark
Sneaker
Sneakernet
Sniff
Sniffer
Snivitz
SO
Social Engineering
Social Science Number
Socket
SOCKS
Soft Boot
Soft Copy
Soft Sectoring
Softcopy
Softlifting
Software
Software Architecture Study
Software Asset Management
Software Bloat
Software Development Methodologies
Software Engineering
Software Interface Functions
Software Laser
Software Licensing
Software Piracy
Software Rot
Software Security
Software System Test
Software System Test And Evaluation Process
Softwarily
Softy
SOH
SOHO
SOIC
Solaris
Solid-State Scanning
Some Random X
SON
Sorcerer's Apprentice Mode
SORD
Sort
SOS
Source
Source Code
Source Of All Good Bits
Source quench
Source User
SOW
Space
Space Systems Security
Space-Cadet Keyboard
SPACEWAR
Spaghetti Code
Spaghetti Inheritance
Spam
Spam filtering
Spare
Special Access Program(s) (SAP)
Special Markings
Special Mission
Special Mission Modification
Special permissions
Special Purpose Computer
Special-Case
Specification
Speech Privacy
Speed Calling
Speed Dialing
Speedometer
Spell
Spelling Flame
Spelling Table
Spiffy
Spike
Spill Forward
Spin
SPK
Spl
Splash Screen
Splat
Split Knowledge
SPO
Spod
Spoiler
Sponge
Sponsor Of Data
Spoofing
Spool
Spool File
Spooling
Spread Spectrum
Spread Spectrum Analysis
SPS
Spy
Spyware
Squirrelcide
Squirrelcided. Stack
SRI
SRP
SRR
SSE
SSH (Secure Shell)
SSID
SSL (Secure Sockets Layer)
SSMP
SSO
SSO (single sign-on)
SSR
ST&E
ST&E Tools And Equipment
Stack entry
Stack Puke
Staging server
Stand Alone Security Mode
Stand Alone Security Mode Of Operation
Stand Alone, Shared Automated Information System
Stand Alone, Single-User Automated Information System
Stand-alone NIDS
Stand-Alone Systems And Remote Terminals
Stand-Alone, Shared System
Stand-Alone, Single-User System
Standard
Standard Measurement Point
Standard permissions
Standards
Standards architecture
Standards Of Conduct
STAPLE
STAR
Star (*) Property
Star Network
Star Out
Star Property
Star Property (* Property)
Star Topology
START
Start-Stop Character
Start-Stop Modulation
Start-Stop System
Start-Stop Transmission
Start-Stop TTY Distortion
Start-Up KEK
State
State Delta Verification System
State table
State Variable
Stateful firewall
Stateful inspection
Statement
Statement Of Need
Statement Of Work
Static packet filtering
Static webpages
Station
Statistical analysis
STD
Steam-Powered
Steganography
STI
Stiffy
Stir-Fried Random
Stomp On
Stone Age
Stone Knives And Bearskins
Stop Element
Stop Signal
Stoppage
Stop-Record Signal
Storage
Storage Area Controls
Storage Cell
Storage Element
Storage Media Protection And Control
Storage Object
Storage Register
Storage Resource
Store
Store-And-Forward
Stored-Program Computer
Stream encryption
Streamer
Streaming Tape Drive
Streaming Tape Recording
Strided
String
Stroke
Strong keys
Structured Programming
Structured Protection
Strudel
STS
STU
Stubroutine
Studly
Studlycaps
Stuffing
Stunning
Stunt Box
Stupids
Stupid-Sort
Sturgeon's Law
STX
Su (switch user)
SUB
Subassembly
Subcommittee On Automated Information Systems Security (SAISS)
Subcommittee On Automated Information Sytemse Security (SAISS)
Subcommittee On Compromising Emanations
Subcommittee On Telecommunications Security
Subject
Subject Security Level
Subject Sensitivity Level
Subject's Security Level
Subnet
Subnet mask
Subnet part
Subroutine
Subscriber Sets And End Terminal Equipments
Subset-Domain
Subsystem
Successful Block Delivery
Successful Block Transfer
Successful Disengagement
Sucking Mud
Suit
Suitably Small
Sum Check
Summation Check
Sunspots
Sun-Stools
Super account
Super Source Quench
Superencryption
Supergroup
Superprogrammer
Supersession
Supershell
Superuser
Supervisor
Supervisor State
Supervisory Control
Supervisory Program
Supervisory Routine
Supervisory Signals
Supplicant
Supplies
Support
Suppression
Suppression Measure
Surf
Surreptitious scanning
Surveillance
Survivability
Survivable Operation
Susceptibility
Suzie COBOL
SVRR
Swab
Swap
Swap Space
Swapped In
Swapped Out
Switch NIDS
Switchboard
Swizzle
Syllabary
Syllable
Symbolic Language
Symbolic Logic
Symmetric key encryption
SYN
SYN Flooding DoS attacks
SYN/ACK
Sync
Synchronism
Synchronization
Synchronization Bit
Synchronization Code
Synchronization Flags
Synchronized Network
Synchronous
Synchronous Communication
Synchronous Crypto-Operation
Synchronous Data Link Control
Synchronous Data Network
Synchronous Idle Character
Synchronous Network
Synchronous TDM
Synchronous Transfer Mode
Synchronous Transmission
Syntactic Salt
Syntactic Sugar
Syntax
Sys admin
SYSADM
Sysadmin
Sysape
Sys-Frog
SYSGEN
Syslog
Sysop
System
System Administration
System Administrator
System Analysis
System Architecture
System Design
System Development
System Development Methodologies
System Documentation
System Environment
System Generation
System High
System High Mode
System High Mode Or System High Security Mode
System High Security Mode
System Indicator
System Integration
System Integrity
System Integrity Procedures
System Life Cycle
System Loading
System Low
System Manager
System Mangler
System Of Records
System Operational Threshold
System Operator
System Overhead Information
System Programmer
System Report
System Security
System Security Architecture Study
System Security Engineering
System Security Evaluation
System Security Management Plan
System Security Map
System Security Officer
System Software
System Software Controls
System Support
System Test Time
System Testing And Evaluation Process
System Tests
System Users
Systematic monitoring
System-High Mode
Systems administration
Systems administrator
Systems Analysis
Systems Design
Systems penetration
Systems Security Steering Group
SysVile
T
T&E
TA
TACTED
TACTERM
Tactical Communication System
TAG
Tail Recursion
Tailing
TAISS
Talk Mode
Talker System
Tamper-Indicative Seal
Tampering
Tanked
TANSTAAFL
Tap
Tape Mixer
Tapes
Tar
Tar And Feather
Target
Targeted attacks
Target-of-opportunity attacks
Tasking
TASO
Taste
Tayste
TCB
TCB Subset
TCD
TCP (Transmission Control Protocol)
TCP port scanning
TCP segment
TCP/IP standards
TCP/IP-OSI architecture
TCS
TCSEC
TCSEC/ITSEC/Common Criteria
TCU
TD
TD:D1
TD:D2
TDBI
TDM
TDMA
Tea, ISO Standard Cup Of
Teardrop
Technical Attack
Technical Data
Technical Document
Technical Information
Technical Penetration
Technical Point Of Contact
Technical Rationale Behind Csc-Std-003-85: Computer Security Requirements
Technical Review
Technical Review Board
Technical Security
Technical Security Guidance
Technical Security Hazard
Technical Security Material
Technical Surveillance Countermeasures
Technical Vulnerability
Technological Attack
Technological Threats
Technology
Technology Trade-Offs
Technology Trends
Techspeak. Square Tape
TECO
TED
Tee
TEI
TEK
Telecommunication
Telecommunication Architecture
Telecommunication Facilities
Telecommunication Service
Telecommunication System
Telecommunication System Operator
Telecommunications
Telecommunications And Automated Information Systems Security
Telecommunications closet
Telecommunications Security
Telecommunications System
Teleconference
Telegram
Telegraph
Telegraphy
Telemetry
Telemetry Intelligence
Telephone Exchange
Telephony
Teleprinter
Teleprocessing
Teleprocessing Security
Telerat
Teleservice
Teletex
Teletext
Teletypewriter (TTY)
Teletypewriter Control Unit
Teletypewriter Exchange Service
Television
TELINT
TELNET
TEMP
TEMPEST
TEMPEST Channel
TEMPEST Encoding
TEMPEST Test
TEMPEST Zone
Template
Temporal Key Integrity Protocol (TKIP)
Tense
Tentacle
Tenured Graduate Student
TEP
Tera
Teraflop Club
Terminak
Terminal
Terminal Adapter
Terminal Area Security Officer
Terminal Brain Death
Terminal ID
Terminal Identification
Terminal Illness
Terminal Junkie
Terminals
Terminology
Terpri
Terrorism
Test
Test And Validation
Test Condition
Test Data
Test Detection System
Test Documentation
Test Key
Test Message
Test Plan
Test Point
Test Procedure
Test Program
TEST:D1
TEST:D2
Testing server
TeX:
Text
Text Editor
TFM
TFM:D1
TFM:D2
TFS
TFTP (Trivial File Transfer Protocol)
TGT (ticket granting ticket)
Theft
Theft Of Data
Theology
Theory
Thinko
Third-Party Evaluation
Thrash
Thread
Threat
Threat Agent
Threat Analysis
Threat Assessment
Threat enumeration
Threat Event
Threat Monitoring
Threat Realization Cost
Threat severity
Threat Viability Threshold
Threat, Postulated
Three-Bit Byte
Three-Finger Salute
Three-way open
Threshold
Throughput
Thumb
Thunk
Tick
Ticket granting ticket (TGT)
Ticket-Granting Service
Ticket-Oriented
Tickle A Bug
Tick-List Features
Tiger Team
Time
Time Bomb
Time Bomb/time-Bomb
Time Compliance Date
Time exceeded
Time Marker
Time Of Occurrence
Time Sink
Time Slot
Time stamp
Time Standard
Time T
Time Tick
Time-Bomb
Time-Dependent Password
Time-Division Multiple Access
Time-Division Multiplexing
Time-Division Switching
Time-Out
Time-Sharing
Times-Or-Divided-By
Time-to-live (TTL)
Tinkerbell Program
TIOCC
Tip Of The Ice-Cube
Tired Iron
Title 18
Title 47
Tits On A Keyboard
TKIP (Temporal Key Integrity Protocol)
TLA
TLS
TLS (Transport Layer Security)
TMC
TMRC
TMRCie
TNI
TNIEG
Toad
Toast
Toaster
Toeprint
Toggle
Token
Token Passing
Token-Bus Network
Token-Ring Network
Tolerance
Tool
Toolsmith
Topic Drift
Topic Group
Top-Level Specification
Topology
TOPS-10:
TOPS-20:
Torn-Tape Relay
Total length
Touch-Sensitive
Tourist
Tourist Information
Touristic
Toy
Toy Language
Toy Problem
Toy Program
TPC
TPI
TPOC
TPWG
Trace Packet
Trace Program
Traceroute
Tracert
Track
Track Density
Tracking Error
Tracking Mode
Tracking Phase
Trade Secret
Trade secrets
Traditional COMSEC Program
Traffic
Traffic Analysis
Traffic Capacity
Traffic Encryption Key
Traffic F Low Security
Traffic Flow Confidentiality
Traffic Flow Information
Traffic Flow Security
Traffic Padding
Traffic-Flow Security
Trailer
Training
Training Key
Trampoline
Tranquility
Tranquillity
Transceiver
Transducer
TRANSEC
Transfer
Transfer Characteristics
Transfer Function
Transfer Mode
Transfer Rate
Translating Program
Translation table
Translator
Transliterate
Transmission
Transmission Block
Transmission Control Protocol (TCP)
Transmission Frame
Transmission Security
Transmission Security Key
Transparent Interface
Transparent protection
Transponder
Transport Layer
Transport Layer Security (TLS)
Transport mode
Transportability
Transportable Station
Transportation Of Media
Transposition
Trap
Trap and trace
Trap Door
Trash
Trawl
TRB
Tree Search
Tree Structure
Tree Topology
Tree-Killer
Treeware
Tri-homed
Triple DES (3DES)
Triplet
Tripwire
Trit
TRI-TAC
TRI-TAC Equipment
Trivial
Trivial File Transfer Protocol (TFTP)
Troff:
Troglodyte
Troglodyte Mode
Trojan Horse
Trojan horse backdoor program
Troll
Tron
TRR
True party
True-Hacker
Truncation
Truncation Error
Trunk
Trunk Encryption Device (TED)
Trunk Group
Trust
Trusted Computer System
Trusted Computer System Evaluation Criteria
Trusted Computer System Evaluation Criteria (Orange Book)
Trusted Computing Base
Trusted Courier
Trusted Database Interpretation
Trusted Database Management System Interpretation Of The Tcsec
Trusted Distribution
Trusted Element
Trusted Facility Management
Trusted Facility Manual
Trusted Functionality
Trusted Identification Forwarding
Trusted Network
Trusted Network Interface
Trusted Network Interpreation
Trusted Network Interpretation (Red Book)
Trusted Network Interpretation Environments Guideline
Trusted Path
Trusted Process
Trusted Product Evaluation Program
Trusted Product Evaluation Questionnaire
Trusted Product Evaluations
Trusted Products
Trusted Software
Trusted Subject
Trusted System
Trusted Unix Working Group
Trusted Users
Trustworthy Element
Truth Table
TSCM
TSEC
TSEC Nomenclature
TSK
TTBT
TTL (time-to-live)
TTLS
Tty
TTY/TDD
Tube
Tube Time
Tunable
Tunafish
Tune
Tuning
Tunnel mode
Tunneled TLS (TTLS)
Tunneling
Turbo Nerd
Turing Machine
Turing Tar-Pit
Turist
Turnaround Time
Turnkey
TV
TV monitor
Tweak
Tweeter
TWENEX:
Twiddle
Twilight Zone
Twink
Twirling Baton
Twit
Two Person Integrity
Two Pi
Two windows attack
Two-factor authentication
Twonkie
Two-Out-Of-Five Code
Two-Part Code
Two-Person Control
Two-Person Integrity
Two-Way Encryption
TWX
Type 1 Magnetic Media
Type 1 Product
Type 2 Magnetic Media
Type 2 Product
Type 3 Algorithm
Type 4 Algorithm
Type Accreditation
Type Of Event
U
U
U. S. Controlled Facility
U. S. -Controlled Facility
U. S. Controlled Space
U. S. -Controlled Space
U. S. Nongovernmental Source
U. S. Person
UA
UBD
UDP datagram
UDP port scanning
UID (User ID)
UIRK
UIS
UK
Umask
UN*X
Unapproved Software
Unauthorized Disclosure
Unauthorized Disclosure Of Information
Unauthorized Modification
Unauthorized User
Unavailability
Unbundling
Uncertainty Calculus
Unclassified
Unclassified Controlled Nuclear Information
Unclassified Information
Unclassified Telecommunications Security
Uncontrolled Access Area
Undefined External Reference
Under The Hood
Underlap
Undesired Signal Data Emanations
Undocumented Feature
UNICODE directory traversal attack
Uniform Encoding
Uniformed security personnel
Uninteresting
Unit Element
Unit Interval
UNIX
UNIX Brain Damage
UNIX Conspiracy
UNIX Weenie
UNIX:
Unixism
Unnecessary services
Unnumbered Command
Unnumbered Response
Unprivileged User
Unprotect
Unprotected
Unreliable
Unsuccessful Call
Unswizzle
Untrusted Applications
Untrusted Element
Untrusted network
Untrusted Process
Unwind The Stack
Unwind-Protect
Up
Up-Converter
Update
Updating
Upgrade
Upgrade Parameter
Uplink
Upload
UPP
Upthread
Uptime
Urchin
URL
URL filtering
Usable Line Length
Usage
Use policy
Useful Line
Usenet
User
User Datagram Protocol (UDP)
User ID
User ID (UID)
User Identification
User Information
User Information Bit
User Information Block
User Partnership Program
User Profile
User/process Interface
User-Obsequious
USG UNIX
Utility Program
Utility Routine
UTSL
UUCPNET
UV
V
V Model
V7
Vaccines
Vadding
Valid Password
Valid period
Validation
Validation (Testing)
Value of protection
Value Of The Represented
Value-Added Networks
Vanilla
Vannevar
Vaporware
Var
Variable Length Buffer
Variant
VAX
VAXectomy
VAXen
Vaxherd
Vaxism
Vaxocentrism
VBscript
Vdiff
VDT
Veeblefester
Vendor diversity
Vendor Security Analyst
Ventilator Card
Venus Flytrap
Verbage
Verbiage
Verifiable Identification Forwarding
Verification
Verification And Validation Process
Verified Design
Verifier
Version 7
Vgrep
Vi
Victimization software
Video Display Terminal
Video Display Unit
Video recorder
Video Signal
Videotex
Videotext
View
Viewdata
Violation
Violations
Virgin
Virtual
Virtual Call
Virtual Call Capability
Virtual Call Facility
Virtual Carrier Frequency
Virtual Circuit
Virtual Circuit Capability
Virtual Connection
Virtual Friday
Virtual Memory
Virtual Network
Virtual Password
Virtual private network (VPN)
Virtual Reality
Virtual Shredder
Virtual Storage
Virus
Visionary
VMS
Vocoder
Voice
Voice Communications Security
Voice Mail Security
Voice recognition
Voice-Net
Volatile Memory
Volatility
Volume
Voluntary tunneling
Voodoo Programming
VPN (virtual private network)
VR
VSA
VST
VTT
Vulcan Nerve Pinch
Vulnerability
Vulnerability Analysis
Vulnerability Assessment
Vulnerability assessment tools
Vulnerability reporters
Vulnerability testing
Vulnerability testing contract
Vulture Capitalist
W
Wabbit
WAITS
Waiver
Walk
Walk Off The End Of
Walking Drives
Walkthroughs
Wall
Wall Follower
Wall Time
Wallpaper
WAN
WAN (Wide Area Network)
Wango
Wannabee
War Dialer
War driving
Ware*
Warez
War-fighting doctrine
Warlording
Warm Boot
Warrant
Warranties
Wart
Wash Software
Washing Machine
Water MIPS
WATS
Wave A Dead Chicken
Weak keys
Weapon Data
Weasel
Web bug
Web service
Web-based e-mail
Webservice
Website defacement
Wedged
Wedgie
Wedgitude
Weeble
Weeds
Weenie
Weenix
Well-Behaved
Well-Connected
Well-known port numbers
WEP (Wired equivalent privacy)
Wet Line
Wetware
Whack
Whacker
Whales
Whalesong
What's A Spline?
Wheel
Wheel Bit
Wheel Wars
White Book
White hat hackers
White Noise
Whitesmiths Style'*
Whois
WIBNI
Wide Area Network
Wide Area Network (WAN)
Wide Area Network Security
Wide Area Networks
Wide Area Telephone Service
Widget n.
Wi-Fi
Wiggles
WIMP Environment
Win
Win Big vi.
Win Win
Winchestern
Window
Window Shopping
Window SysIWYG
Windoze /win'dohz/
Winged Comments
Winkey
Winner
Wired
Wired equivalent privacy (WEP)
Wirehead /wi:r'hed/
Wireless Fidelity Alliance
Wireless LAN (WLAN)
Wireless NIC
Wireless Protected Access (WPA)
Wiretap warrant
Wiretapping
Wirewater
Wish List
Within Delta Of
Within Epsilon Of
Witness Interviewing/Interrogation
Wizard
Wizard Book
Wizard Mode
Wizardly
WLAN (Wireless LAN)
WNINTEL
Wok-On-The-Wall
Word
Word Length
Word Processing
Work Factor
Work Space
Work Station
Workaround
Work-around
Working As Designed
Workstations Security
World
World Wide Web (WWW)
Worm
Wormhole
Worms
Wound Around The Axle
WPA
Wrap Around
Write
Write Access
Write Cycle Time
Write Down
Write Head
Write Protection Label
Write Up
Write-Only Code
Write-Only Language
Write-Only Memory
Write-Protect Tab
Wrong Thing
Wugga Wugga
Wumpus
WWMCCS
WWW (World Wide Web)
WWW root
WYSIAYG
WYSIWYG
X
X
X.509
X-Dimension Of Recorded Spot
X-Dimension Of Scanning Spot
XDM
XDM/X Model
Xerographic Recording
XEROX PARC
XOFF
XON
Xor
Xref
XXX
Xyzzy
Y
Y
YABA
YAFIYGI
YAUN
Y-Dimension Of Recorded Spot
Y-Dimension Of Scanning Spot
Yellow Book
Yellow Wire
Yet Another
YKYBHTLW
YMMV
Your Mileage May Vary
Yu-Shiang Whole Fish
Z
Z
Z Time
Zap
Zapped
Zen
Zero
Zero Suppression
Zero-Bit Insertion
Zero-Content
Zerofill
Zeroize
Zeroth
Zigamorph
Zip
Zipperhead
Zombie
Zone Of Control/Zoning
Zorch
Zork
Zorkmid
Zulu Time
Seek Time
The time required for the access arm of a direct-access storage device to be positioned on the appropriate track. (FP) (ISO) See positioning time.