Category:Terms
Terms
Terms, definitions, glossary entries, etc.
Pages in category "Terms"
The following 200 pages are in this category, out of 1,757 total.
(previous page) (next page)A
- Abstract Syntax Notation One
- Acceptable Risk
- Acceptance
- Access
- Access Control
- Access Control List
- Access Control Mechanism
- Access Level
- Access List
- Access Profile
- Access Type
- Accountability
- Accounting Legend Code
- Accounting Number
- Accreditation
- Accreditation Boundary
- Accreditation Package
- Accrediting Authority
- Acquisition
- Acquisition Initiator
- Acquisition Technical Evaluation
- Acquisition, Development, and Installation Controls
- Activation Data
- Active Content
- Active Tag
- ActiveX
- Activities
- Add-On Security
- Address Resolution Protocol
- Addressable
- Adequate Security
- Administrative Access
- Administrative Account
- Administrative Safeguards
- Advanced Encryption Standard
- Advisory
- Affiliated Covered Entities
- After Action Report
- Agency
- Agency CA
- Agent
- Aggregation
- Alert
- Algorithm Originator Usage Period
- Algorithm Security Lifetime
- Alternate COMSEC Custodian
- Alternative Work Site
- Analysis
- Analytic Systems
- Anomaly-Based Detection
- Anti-Forensic
- Anti-Jam
- Anti-Spoof
- Antispyware Software
- Antivirus Software
- Applicant
- Application
- Application Content Filtering
- Application Identifier
- Application Level Gateway
- Application Session
- Application-Based Intrusion Detection and Prevention System
- Approval to Operate
- Approved
- Archive
- Assessment Findings
- Assessment Method
- Assessment Object
- Assessment Objective
- Assessment Procedure
- Asset
- Association
- Assurance
- Assurance Case
- Assurance level
- Assurance message
- Assurance of (Private Key) Possession
- Assurance of Domain Parameter Validity
- Assurance of Possession
- Assurance of Public Key Validity
- Assurance of Validity
- Assurance Signature
- Assurance time
- Assured Software
- Asymmetric Key Algorithm
- ATP
- Attack
- Attack Sensing and Warning
- Attribute
- Attribute Authority
- Attribute Based Access Control
- Audit
- Audit Data
- Audit Trail
- Authenticatable Entity
- Authenticate
- Authenticated RFID
- Authentication
- Authentication Chain
- Authentication Code
- Authentication Key
- Authentication Mechanism
- Authentication System
- Authenticator
- Authenticity
- Authoritative RRSet
- Authority
- Authorization
- Authorize Processing
- Authorized Vendor
- Authorized Vendor Program
- Authorizing Official
- Authorizing Official Designated Representative
- Automated Information System Security
- Automated Information System Security Program
- Automated Security Monitoring
- Automatic Remote Rekeying
- Availability
- Availability Protection
- Awareness
- Awareness, Training, and Education
- Awareness, Training, and Education Controls
B
- Back Channel
- Back Door
- Backdoor
- Backscatter Channel
- Backup
- Banner
- Baseline Security
- Baselining
- Bastion Host
- Behavioral Outcome
- Benign
- Benign Environment
- BER-TLV Data Object
- Best And Final Offer
- Bidder
- Binding
- Biometric
- Biometrics
- Bit
- Bit Error Rate
- Bit Stream Imaging
- BLACK
- Black Box Testing
- Blacklist
- Blended Attack
- Blinding
- Block
- Block Cipher Algorithm
- Bluetooth
- Body
- Boot Sector Virus
- Boot-Sector Viruses
- Bot
- Boundary
- Boundary Protection
- Boundary Protection Device
- Boundary Router
- Brevity List
- Broadband
- Brokered Trust
- Browsing
- Brute Force Password Attack
- Buffer Overflow
- Buffer Overflow Attack
- Bulk Encryption
- Business Associate
- Business Continuity Plan
- Business Impact Analysis
- Business Recovery/Resumption Plan
- Byte
C
- CA Facility
- Cable Modem
- Call Back
- Call Processor
- Candidate Checklist
- Canister
- Capital Planning and Investment Control
- Card
- Card Application
- Card Interface Device
- Card Reader
- Cascading
- Category
- CC
- CCI Assembly
- CCI Component
- CCI Equipment
- CD
- CD-R
- CD-RW
- CDRL
- Central Office Of Record
- Central Oversight Authority
- CERT/CC
- Certificate
- Certificate Management
- Certificate Management Authority
- Certificate Policy