JavaScriptMessages

APECAsia Pacific Economic Cooperation

.English.Español.tiếng Việt.По-русски.한국어.日本語.简体中文版HomeNewsRss FeedsSiteMap
  • Academics
    • Tools
      • Tool Downloads (Pg. 1)
      • Tool Downloads (Pg. 2)
      • Tool Downloads (Pg. 3)
      • Tool Downloads (Pg. 4)
  • Curriculum
    • CNSS Standards
    • Ethics and Law
    • K-12 Material
    • NSA Centers of Excellence
    • Teaching Materials
      • 4012 Presentation
      • Course Modules
        • Module 1
          • 01. (I) Corporate Resource
          • 02. (II) Basic Problems
          • 03. (III) Ethical Issues
          • 04. (IV) Studies
          • Teaching Considerations
        • Module 2
          • 01. (I) Ethics
          • 02. (II) Environment
          • 03. (III) Physical
          • 04. (IV) Data
          • 05. (V) Security Training
          • Teaching Considerations
        • Module 3
          • 01. (I) Planning
          • 02. (II) Organizational Policies & Procedures
          • 03. (III) Ethics and Professionalism
          • 04. (IV) Personnel Security
          • 05. (V) Physical Security
          • 06. (VI) System Security
          • 07. (VII) Threats & Vulnerabilities
          • 08. (VIII) Data Security & Recovery
          • 09. (IX) Control and Audit
          • 10. (X) Costs and Benefits
          • Teaching Considerations
        • Module 4
          • 01. (I) Underlying Problem
          • 02. (II) Laws as Tools for Information Security
          • 03. (III) Laws and Legislation as Legal Options to
          • Teaching Considerations
        • Module 5
          • 01. (I) Overview
          • 02. (II) System Sensitivity
          • 03. (III) Security Requirements
          • 04. (IV) Levels of Security
          • 05. (V) Data Life Cycles
          • 06. (VI) Sample Protection Plan
          • Teaching Considerations
        • Module 6
          • 01. (I) Overview
          • 02. (II) Threats
          • 03. (III) Countermeasures
          • 04. (IV) Tradeoffs-Costs & Benefits
          • 05. (V) Network Design
          • Teaching Considerations
        • Module 7
          • 01. (I) Overview
          • 02. (II) Development of Security Program
          • 03. (III) Risk Analysis
          • 04. (IV) Contingency Planning
          • 05. (V) Legal Issues for Managers
          • 06. (VI) System Validation & Verification (Accredi
          • 07. (VII) Information Systems Audit
          • 08. (VIII) Computer Security Check List
          • Teaching Considerations
        • Module 8
      • Course Modules Website
      • Course Videos
      • IA Videos
        • Videos (Pg. 1)
        • Videos (Pg. 2)
        • Videos (Pg. 3)
        • Videos (Pg. 4)
        • Videos (Pg. 5)
        • Videos (Pg. 6)
        • Videos (Pg. 7)
  • External Links
    • Academic Sites
    • Government Sites
    • Independent Organizations
    • Industry Sites
  • General Interest
    • Common Criteria
    • IA Activities
    • Professional Certification
    • Seminal Works
      • Seminal Papers
  • Glossary
  • Publications
    • Government Documents
      • Gov Docs (Pg. 1)
      • Gov Docs (Pg. 2)
      • Gov Docs (Pg. 3)
      • Gov Docs (Pg. 4)
      • Gov Docs (Pg. 5)
      • Gov Docs (Pg. 6)
    • IA Posters
      • IA Posters (Pg. 1)
      • IA Posters (Pg. 2)
      • IA Posters (Pg. 3)
      • IA Posters (Pg. 4)
      • IA Posters (Pg. 5)
      • IA Posters (Pg. 6)
    • Industry Documents
    • NIATEC Publications
    • Older Papers
    • Publisher Databases
Login

Glossary

Filter:
# A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Return to List
K
KAK
KB
KBAF
KBE
KDC
KE
KEK
Kerberos
Kerberos authentication service
Kerberos server
Key distribution center
Key escrow
Key exchange
Key features
Key length
Key ring
Key-Hashed Message Authentication Code (HMAC)
Keystroke capture program
Keystroke recognition
KG
Kiddie script
Kill
Killer Poke
Kilo
KIPS
KISS Principle
Kit
Klone
Kludge
Kluge
Kluge Around
Kluge Up
KMASE
KMC
KMID
KMODC
KMP
KMPDU
KMS
KMSA
KMUA
Knights Of The Lambda Calculus
Know How
Knowledge Base
Known vulnerability
Knuth
KP
KPK
Kremvax
KSOS
KVG
KVM/370
Kyrka
KAK
  • See Key-Auto-Key.

IRI, Pocatello, Idaho | NIATEC | Version: 2.2.1.4 | | 6 Mar 2019