JavaScriptMessages
APEC
Asia Pacific Economic Cooperation
.English
.Español
.tiếng Việt
.По-русски
.한국어
.日本語
.简体中文版
Home
News
Rss Feeds
SiteMap
Academics
Tools
Tool Downloads (Pg. 1)
Tool Downloads (Pg. 2)
Tool Downloads (Pg. 3)
Tool Downloads (Pg. 4)
Curriculum
CNSS Standards
Ethics and Law
K-12 Material
NSA Centers of Excellence
Teaching Materials
4012 Presentation
Course Modules
Module 1
01. (I) Corporate Resource
02. (II) Basic Problems
03. (III) Ethical Issues
04. (IV) Studies
Teaching Considerations
Module 2
01. (I) Ethics
02. (II) Environment
03. (III) Physical
04. (IV) Data
05. (V) Security Training
Teaching Considerations
Module 3
01. (I) Planning
02. (II) Organizational Policies & Procedures
03. (III) Ethics and Professionalism
04. (IV) Personnel Security
05. (V) Physical Security
06. (VI) System Security
07. (VII) Threats & Vulnerabilities
08. (VIII) Data Security & Recovery
09. (IX) Control and Audit
10. (X) Costs and Benefits
Teaching Considerations
Module 4
01. (I) Underlying Problem
02. (II) Laws as Tools for Information Security
03. (III) Laws and Legislation as Legal Options to
Teaching Considerations
Module 5
01. (I) Overview
02. (II) System Sensitivity
03. (III) Security Requirements
04. (IV) Levels of Security
05. (V) Data Life Cycles
06. (VI) Sample Protection Plan
Teaching Considerations
Module 6
01. (I) Overview
02. (II) Threats
03. (III) Countermeasures
04. (IV) Tradeoffs-Costs & Benefits
05. (V) Network Design
Teaching Considerations
Module 7
01. (I) Overview
02. (II) Development of Security Program
03. (III) Risk Analysis
04. (IV) Contingency Planning
05. (V) Legal Issues for Managers
06. (VI) System Validation & Verification (Accredi
07. (VII) Information Systems Audit
08. (VIII) Computer Security Check List
Teaching Considerations
Module 8
Course Modules Website
Course Videos
IA Videos
Videos (Pg. 1)
Videos (Pg. 2)
Videos (Pg. 3)
Videos (Pg. 4)
Videos (Pg. 5)
Videos (Pg. 6)
Videos (Pg. 7)
External Links
Academic Sites
Government Sites
Independent Organizations
Industry Sites
General Interest
Common Criteria
IA Activities
Professional Certification
Seminal Works
Seminal Papers
Glossary
Publications
Government Documents
Gov Docs (Pg. 1)
Gov Docs (Pg. 2)
Gov Docs (Pg. 3)
Gov Docs (Pg. 4)
Gov Docs (Pg. 5)
Gov Docs (Pg. 6)
IA Posters
IA Posters (Pg. 1)
IA Posters (Pg. 2)
IA Posters (Pg. 3)
IA Posters (Pg. 4)
IA Posters (Pg. 5)
IA Posters (Pg. 6)
Industry Documents
NIATEC Publications
Older Papers
Publisher Databases
Login
Glossary
Filter:
#
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
All
Return to List
E
E Model
EAM
EAP
Earth Ground
Earthquake
Easter Egg
Easter Egging
Eavesdropping
EBCDIC
ECC (Elliptic Curve Cryptosystem)
ECCM
Echelon
Echo
Echo reply
ECM
E-commerce
Economic Assessment
Economic Intelligence
ECPL
EDAC
EDESPL
Edgar
EDM
Education, Training And Awareness
EEFI
EEI
EEPROM
EFD
Efficiency
EFS (Encrypting File System)
EFT
EFTO
EGADS
Egress filtering
EIA Interface
EIF
Eight-Hundred Service
Eighty-Column Mind
EKMS
El Camino Bignum
Elder Days
Electrochemical Recording
Electrographic Recording
Electromagnetic Countermeasures
Electromagnetic Emanations
Electromagnetic Interference
Electronic Communications Privacy Act of 1986 (ECPA)
Electronic Data Interchange
Electronic Emission Security
Electronic Funds Transfer
Electronic Intelligence
Electronic Key Management System
Electronic Mail
Electronic Message System
Electronic Monitoring
Electronic Records Management
Electronic Seals
Electronic Security
Electronic Security Assessment
Electronic Signature
Electronic Sources Of Security Information
Electronic Surveillance
Electronic Switching System
Electronically
Electronically Generated Key
Electronic-Mail Privacy
Electronic-Mail Security
Electronics Intelligence
Electronics Security
Electro-Optical Intelligence
ELECTRO-OPTINT
Electrosensitive Recording
Electrostatic Recording
Electrothermal Recording
Elegant
Element
Elephantine
Elevating privileges
Elevator Controller
ELINT
Elite
ELIZA Effect
Elliptic Curve Cryptosystem (ECC)
ELSEC
Elvish
EMACS
Email
E-Mail
Emanation
Emanation Security
Emanations
Emanations Security
Embedded Computer
Embedded Computers
Embedded Cryptographic
Embedded Cryptographic System
Embedded Cryptography
Embedded System
Emergency
Emergency Destruction
Emergency Destruction Procedures
Emergency Plan
Emission Security
Emissions Security
Emoticon
Empire
Employee workplace monitoring
EMS
EMSEC
Emulate
Emulator
En-Bloc Signaling
Encapsulating Security Payload (ESP)
Encapsulation
Encipher
Encipherment
Encode
Encoder
Encoding
Encoding Law
Encrypt
Encrypting File System (EFS)
Encryption
Encryption Algorithm
Encryption Codes
Encryption Control Protocol
Encryption key
Encryption method
End System
End User
End User Computing Security
End-Item Accounting
End-Of-Message Function
End-Of-Selection Character
End-Of-Text Character
End-Of-Transmission Character
End-Of-Transmission-Block Character
Endorsed DES
Endorsed DES Equipment
Endorsed For Unclassified
Endorsed For Unclassified Cryptographic Item
Endorsed Tools List
Endorsement
End-To-End
End-To-End Encipherment
End-To-End Encryption
End-To-End Security
Engine
Engineering Development Model
English
Enhanced Generic Routing Encapsulation (GRE)
Enhanced Hierarchical Development Methodology
Enhancement
ENQ
Enrollment
Entangled bits
Entrapment
Entry
Environment
Environmental Controls
Environmental/Natural Threats
EOF
EOL
EOT
EOU
Ephemeral port numbers
EPL
Epoch
EPROM
Epsilon
Epsilon Squared
Equipment Radiation Tempest Zone
Equipment Under Test
Era
Eradication
Erase
Erasure
Eric Conspiracy
Eris
Erotics
Error
Error 33
Error advisement
Error Budget
Error Logs
Error Rate Deprecated Term
Error Ratio
Error-Correcting Code
Error-Correcting System
Error-Detecting Code
Error-Detecting System
Error-Detecting-And-Feedback System
ERTZ
ES
Escalation
Escort(s)
ESP (Encapsulating Security Payload)
Espionage
ESS
Essential Elements Of Friendly Information
Essential Elements Of Friendly Information (EERI)
Essential Elements Of Information
Essential Secrecy
Essentially Rating
ETAP
ETB
Ethical hacking
Ethics
ETL
ETPL
ETX
EUCI
Eut Exerciser Equipment
EV
Evaluated Products
Evaluated Products List
Evaluation
Evaluation Techniques (Evaluation)
Evaluator
Event
Event correlation
Event Cost
Event Value
Event Viewer
Event-Reporting Systems
Evidence Acceptability
Evidence Collection And Preservation
Evil
Evil And Rude
Exa
Examining The Entrails
Exception handling
EXCH
Exchange
Exclusion Area
EXE
Exec
Executable files
Execute
Execute Access Mode
Executing Ring
Execution Of The Budget
Executive Order No. 12046 Of March 27, 1978
Executive Order No. 12472 Or April 3, 1984
Executive State
Exemption
Exercise Key
Exhaustive Attack
Exhaustive search
Expected Lifetime
Expenditure
Expert Security/Audit Tools
Expert Systems
Expired Password
Exploit
Exploitable Channel
Exploitation
Exploratory Development
Exploratory Development Model
Export Controls
Exposure
Extensible Authentication Protocol (EAP)
External auditing tools
External DNS server
External Label
External Memory
External Protected Distribution System
External Security Audit
Extortion
Extra Bit
Extra Block
Extraction Resistance
Eyeball Search
Elder Days
n. The heroic age of hackerdom (roughly, pre-1980); the era of the PDP-10, TECO, ITS, and the ARPANET. This term has been rather consciously adopted from J. R. R. Tolkien's fantasy epic "The Lord of the Rings". Compare Iron Age; see also elvish and Great Worm, the.