| TERMINOLOGY | ||
|---|---|---|
| data remanence | degaussing | PGP |
| Trojan horse | sniffer | CERT |
| cold site | hot site | dump |
| tar | discretinary access control | ACL |
| access control matrix | audit capability | digital signatures |
| authentication | nonrepudiation | DES |
| RSA | Diffie-Hellman | IDEA |
| hash | X.509 | Certificate Authority |
| Kerberos | Verisign | electronic postmark |
| SATAN | DMI | SNMP |
| MIB | HP OpenView | Solstice Domain Manager |
| proxy server | CIAC | |
| RAS | VLAN | VPN |
| data sniffing | data tampering | DoS attack |
| packet filtering | IPSEC | SKIP |
| DMZ | smart cards | dongle (HASP) |
| disk duplexing | disk mirroring | disk striping |
| RAID | S-HTTP | SSL |
| Cookies | virus | worm |
| Trojan horse | time bomb | logic bomb |
| polymorphic virus | stealth virus | macro virus |
| Brute Force | SYN | IPv6 |
| IPSec | ||