User:NeelDurugkar/Books/security

From Wikipedia, the free encyclopedia


Computer security
Computer worm
Malware
Computer virus
Trojan horse (computing)
Backdoor (computing)
Rootkit
Antivirus software
Botnet
Denial-of-service attack
Firewall (computing)
Spyware
Hacker (computer security)
Exploit (computer security)
Vulnerability (computing)
Social engineering (security)
Threat (computer)
Phishing
Password
Keystroke logging
Network security
Information security
Authentication
Spamming
Attack (computing)
Penetration test
Spoofing attack
Man-in-the-middle attack
Public-key cryptography
Access control
Authorization
Login
Principle of least privilege
Privilege escalation
Buffer overflow
Intrusion detection system
Transport Layer Security
Software bug
Encryption
National Institute of Standards and Technology
Cryptography
Confidentiality
Digital signature
Cryptographic hash function
Public key infrastructure
Pretty Good Privacy
Key (cryptography)
Certificate authority
Public key certificate
Symmetric-key algorithm
Internet Engineering Task Force
HTTP Secure
Non-repudiation
Multi-factor authentication
Data security
Information security management system
Personal identification number
X.509
RSA (cryptosystem)
Ciphertext
Brute-force attack
Advanced Encryption Standard
Cryptanalysis
SHA-1
Cipher
Cryptosystem
Key size
Block cipher
Data Encryption Standard
One-time pad
National Security Agency
Secure Shell
Web of trust
Message authentication code
Digital Signature Algorithm
Key management
Diffie–Hellman key exchange
Chosen-plaintext attack
MD5
SHA-2
Stream cipher
Virtual private network
Hash function
Federal Information Processing Standards
Biometrics
Institute of Electrical and Electronics Engineers
Cryptographic protocol
Kerberos (protocol)
IPsec
Data integrity
Hash-based message authentication code
Integrity
Metasploit Project
Triple DES
Block cipher mode of operation
Intrusion prevention system
Initialization vector
One-way compression function
Cryptographically secure pseudorandom number generator
One-way function
Cryptographic primitive
Padding (cryptography)
Known-plaintext attack
International Organization for Standardization
Salt (cryptography)
Single sign-on
International Data Encryption Algorithm
Disk encryption
Birthday attack
Zombie (computer science)
Replay attack
Chosen-ciphertext attack
S/MIME
Advanced Encryption Standard process
Block size (cryptography)
RSA Security
Security
Fingerprint
Countermeasure (computer)
Avalanche effect
Ransomware
Side channel attack
Access control list
Email spam
Key exchange
Identity theft
Information assurance
Security token
Shared secret
Trusted third party
Extended Validation Certificate
SHA-3
Mutual authentication
CAPTCHA
Verisign
Packet analyzer
Security engineering
Request for Comments
Pseudorandom number generator
Substitution cipher
Information technology security audit
Differential cryptanalysis
Related-key attack
Feistel cipher
Security controls
Passphrase
Secure channel
Deep packet inspection
One-time password
Zero-day attack
CERT Coordination Center
Cross-site scripting
Preimage attack
Collision attack
Vulnerability scanner
ElGamal encryption
Revocation list
Pseudorandomness
Randomness
Permutation
Security bug
Adversary (cryptography)
Code (cryptography)
Checksum
Secure Remote Password protocol
Key-agreement protocol
Key escrow
Keystream
Eavesdropping
Internet Key Exchange
Adaptive chosen-ciphertext attack
Linear cryptanalysis
Key stretching
Port scanner
Identity management
CBC-MAC
Key schedule
ASCII
Uncontrolled format string
OWASP
Availability
Morris worm
Honeypot (computing)
McAfee
Password cracking
Security service (telecommunication)
Password strength
Zeus (Trojan horse)
Capability-based security
Password-authenticated key agreement
Forward secrecy
Code injection
Steganography
W3af
Cyberwarfare
Common Vulnerabilities and Exposures
Digital signature forgery
Collision resistance
ARP spoofing
Trapdoor function
International Cryptology Conference
Quantum cryptography
Transposition cipher
Key server (cryptographic)
Random number generation
Wi-Fi Protected Access
Length extension attack
Wired Equivalent Privacy
Classical cipher
Authenticated encryption
Privilege (computing)
SQL injection