Skip to main content

Computer Security Concepts

Click on the links below for plain English definitions of computer security terms.

[a]  [b]  [c]  [d]  [e]  [f]  [g]  [h]  [i]  [j]  [k]  [l]  [m]  [n]  [o]  [p]  [q]  [r]  [s]  [t]  [u]  [v]  [w]  [x]  [y]  [z] 
Access
Access Change Authorization Workflow
Access Channel
Access Control
Access Management
Access Management System
Access Logs
Account
Account Update
Accountability
Active Server Pages
Administrator
Agent
Alias
Application Level Firewall
Assisted Password Reset
Asymmetric Encryption
Audit Trail
Authentication
Authentication Factor
Authentication Management
Authentication Profile
Authentication Server
Authenticator
Authorization
Authorization Rule
Authorizer
Automated Provisioning
Automatic Retry
Availability
Biometric Authentication
Bottom-up Role Mining
Blocking Record
Breach of Confidentiality
Business Role
By-example Role Mining
Central User Administration
Centrally Managed PKI Key
Certificate
Certificate Authority
Change Authorization
Cipher
Ciphertext
Client-Side Secure Kiosk Account
Common Carrier
Common Gateway Interface
Complexity Requirements
Confidentiality
Connector
Content Filter
Cookies
Credentials
Credential Providers
Cryptographic Authentication
Cryptographic Certificate
Deactivation
Decryption
Delegated User Administration
Denial of Service
Directory
Directory Cleanup
Directory Migration
Directory Synchronization
Disabled Account
DNS
Encrypted Communcation
Encrypted Storage
Encryption
Encryption Key
Enterprise Single Sign-On (E-SSO)
Exception (as it relates to RBAC)
Exponential Back-Off
Fault Tolerance
File System
Firewall
Ftp
Graphical Identification and Authentication (GINA)
Global User ID
Group
Hardware Token
Hash
Help Desk Analyst
Host Security Scanner
Host System
HTTP
HTTPS
Identity Data
Identity and Access Management (IdM)
Identity and Access Management Server
Identity and Access Management Software
Identity and Access Management System
Identity Management and Access Governance
Infrastructure Role
Insider
Integrity
Intruder
Intruder Lockout
IP
IPX
IP Masquerading
IP Spoofing
Java
Java Script
Key Distribution
Key Management
LDAP
Legal Information
Local Agents
Login
Login Account
Login Credentials
Login Session
Logout
Loss of Integrity
Mail Relay
Target System
Message Digest
Meta Directory
Meta Role
Model Account
Nested Role
NetBEUI
NetWare
NetWare Bindery
NetWare NDS
Network Address Translation
Network File System
Network Security Scanner
Non-Repudiation
One-Time Password (OTP)
Operating System
Orphan Account
Outsider
Owner
Packet Level Firewall
Packet Sniffer
Password
Password Change
Password Expiry
Password Propagation
Password Reset
Password Synchronization
Penetration Test
Personal Information
Physically Distributed PKI Key
Plaintext
Platform
Plugin Architecture
Plugin Point
Plugin Program
Policy
Policy Based Access Control
PPP
Predicted Privilege
Predicted Resource
Prerequisite Rule
Pretty Good Privacy
Principals
Privacy Enhanced Mail
Private Key
Private Transmission
Privilege
Privilege Model
Provisioning
Public Key
Public Key Infrastructure (PKI)
Radius
Recipient
Remote Access Server
Remote Agents
Request Router
Requester
Resource Disposition
Resource Exclusion Rule (Separation of Duties Policies)
Resource Owner
Resource
Role
Role Based Access Control (RBAC)
Role Mining
Role Owner
Root
Rule
Rules Based Access Control
SCP
Secure Kiosk Account (SKA)
Security
Security Administrator
Security Exploit
Security Policy
Security Risk
Security Scanner
Self Reset
Self-Service
Self-Service Password Reset
Session Hijacking
Signature
Single Sign-On
Site Blocking
Smart Card
SMTP
SNMP
Spam
Spam Filter
SPX
SSH
SSL
Standard User ID
Stream Cipher
Sub-Host
Supervisor
Symmetric Encryption
System Administrator
TACACS
Target System
TCP
Telnet
Template Account
Termination
Ticket
Token
Top-down Role Mining
Transparent Password Synchronization
Trust
Two-Factor Authentication
UDP
Unix
User
User Access
User Group
User ID
User ID Reconciliation
User Selection Rule
Virtual Private Network
Virus
Virus Scanner
Virus Wall
War Dialer
Web-Based Password Synchronization
Web Access Management System (WebAM)
Web Single Sign-On (WebSSO)
Windows NT
World Wide Web
WWW Proxy
X.400
X.500
X.509

Read More:

page top page top