:
  
  
  
  
  

: - 08: , (")

abend, abnormal end, abnormal termination - 08: , (")
abort [v] - 08: , (")
aborted connection - 08: , (")
acceptance test - 08: , (")
access category - 08: , (")
access control - 08: , (")
access control list, access list, ACL - 08: , (")
access level - 08: , (")
access period - 08: , (")
access permission - 08: , (")
access right - 08: , (")
access type - 08: , (")
accountability - 08: , (")
active threat - 08: , (")
active wiretapping - 08: , (")
administrative security, procedural security - 08: , (")
aggregation - 08: , (")
analytical attack, cryptanalytical attack - 08: , (")
antivirus program, vaccine program - - 08: , (")
antivirus software- [-; ]
".
- 08: , (")
archive file - 08: , (")
archive [v] - 08: , (")
archived file - 08: , (")
asymmetric cryptography - 08: , (")
attack - 08: , (")
audit trail - 08: , (")
audit-review file - 08: , (")
authentication exchange - 08: , (")
authentication information - 08: , (")
authentication, identity authentication , - 08: , (")
authentication, identity authentication , - 08: , (")
authorization - 08: , (")
availability - 08: , (")
back door, backdoor [n.] [ ]
".
- 08: , (")
backup file - 08: , (")
backup procedure - 08: , (")
backward recovery - 08: , (")
bacterium - 08: , (")
bad sectoring - 08: , (")
batch-header document - 08: , (")
bench-mark test, bench-mark = ,
- 08: , (")
bench-mark test, bench-mark = ,
- 08: , (")
between-the-lines entry - - 08: , (")
biometric - 08: , (")
breach - 08: , (")
brute-force attack - 08: , (")
call=back, dial=back
"
- 08: , (")
capability - 08: , (")
capability list - 08: , (")
certification - 08: , (")
chain letter - 08: , (")
check character - 08: , (")
check data - 08: , (")
check digit - 08: , (")
check key - 08: , (")
check problem - 08: , (")
checking code - 08: , (")
checksum - 08: , (")
chosen-plaintext attack - 08: , (")
ciphertext - 08: , (")
ciphertext-only attack - 08: , (")
clearing - 08: , (")
closed-security environment - 08: , (")
code obfuscation [ , .]
".
- 08: , (")
cold site, shell site - 08: , (")
communications security, COMSEC - 08: , (")
compartmentalization - 08: , (")
completness check - 08: , (")
compromise - 08: , (")
compromising emanation - 08: , (")
computer abuse - 08: , (")
computer crime - 08: , (")
computer fraud - 08: , (")
computer intrusion [ ]
".
- 08: , (")
computer security, COMPUSEC - 08: , (")
computer system fault tolerance, computer system resilience - 08: , (")
computer-intrusion detection [ , ]
".
- 08: , (")
computer-system audit - 08: , (")
confidentiality - 08: , (")
contamination - 08: , (")
contingency plan, disaster recovery plan - 08: , (")
contingency procedure - 08: , (")
controlled access system, CAS - 08: , (")
copy protection - 08: , (")
countermeasure - 08: , (")
covert channel - 08: , (")
credentials - 08: , (")
crossfooting - 08: , (")
cryptanalysis - 08: , (")
cryptographic system, ciphersystem, cryptosystem - 08: , (")
cryptography , - 08: , (")
cryptography , - 08: , (")
cyberwar " [ ; ( )]
".
- 08: , (")
cyberwarfare " [ ; , "]
".
- 08: , (")
cyclic redundancy check, CRC - 08: , (")
data authentication - 08: , (")
data corruption - 08: , (")
data integrity - 08: , (")
data processing system security - 08: , (")
data protection - 08: , (")
data quality - 08: , (")
data reconstitution - 08: , (")
data reconstruction - 08: , (")
data restoration - 08: , (")
data security - 08: , (")
data validation - 08: , (")
decryption, decipherment - 08: , (")
denial of service - 08: , (")
digital envelope - 08: , (")
digital signature - 08: , (")
disclosure - 08: , (")
eavesdropping - 08: , (")
echo check - 08: , (")
encryption, encipherment - 08: , (")
entrapment - 08: , (")
error recovery - 08: , (")
error-correcting code
: .
- 08: , (")
error-detecting code, self-checking code
: .
- 08: , (")
exhaustive attack - 08: , (")
expiration check, retention period check - 08: , (")
exposure - 08: , (")
extra sector - 08: , (")
extra track - 08: , (")
failsafe, fail-safe - 08: , (")
failsoft - 08: , (")
failure access - 08: , (")
fake sector - 08: , (")
fatal error - 08: , (")
fault threshold - 08: , (")
fault-rate threshold - 08: , (")
file clean=up - 08: , (")
file protection - 08: , (")
flaw, loophole - 08: , (")
flooding - 08: , (")
format check - 08: , (")
forward recovery - 08: , (")
guard - 08: , (")
hash total - 08: , (")
hot site - 08: , (")
identity token - 08: , (")
identity validation - 08: , (")
information system security - 08: , (")
irreversible encryption, irreversible encipherment - - 08: , (")
journal, log - 08: , (")
key - 08: , (")
key matching - 08: , (")
keystroke verification - 08: , (")
known-plaintext attack - 08: , (")
limit check - 08: , (")
linkage, fusion - 08: , (")
logic bomb - 08: , (")
logical access control - 08: , (")
longitudinal parity check - 08: , (")
loss - 08: , (")
maintenance hook - 08: , (")
malicious hardware [ ]
".
- 08: , (")
malicious logic , - 08: , (")
malicious logic , - 08: , (")
manipulation detection code - 08: , (")
manipulation detection, modification detection - 08: , (")
masquerade - 08: , (")
message authentication - 08: , (")
message authentication code - - 08: , (")
minimum privilege - 08: , (")
modulo-n check, residue check -n - 08: , (")
multilevel device - - 08: , (")
mutual suspicion - 08: , (")
need-to-know - 08: , (")
network weaving - 08: , (")
notarization , - 08: , (")
notarization , - 08: , (")
object, - 08: , (")
object, - 08: , (")
offset track - 08: , (")
one-way encryption - - 08: , (")
open-security environment - 08: , (")
overflow check - 08: , (")
padlocking - 08: , (")
parity bit - 08: , (")
parity check - 08: , (")
passive threat - 08: , (")
passive wiretapping - 08: , (")
password - 08: , (")
penetration - 08: , (")
penetration testing - 08: , (")
physical access control - 08: , (")
piggyback entry - 08: , (")
plaintext, cleartext - 08: , (")
prerecorded data medium - 08: , (")
privacy - 08: , (")
privacy protection - 08: , (")
private key - 08: , (")
public key - 08: , (")
public key cryptography - 08: , (")
range check - 08: , (")
read access - 08: , (")
reasonableness check - 08: , (")
redundancy check - 08: , (")
repudiation - 08: , (")
residual data - 08: , (")
risk - 08: , (")
risk acceptance - 08: , (")
risk analysis - 08: , (")
risk assessment - 08: , (")
sanitizing - 08: , (")
scavenge [v] - 08: , (")
secret key - 08: , (")
sector alignment - 08: , (")
security audit - 08: , (")
security category - 08: , (")
security classification - 08: , (")
security clearance, clearance - 08: , (")
security filter - 08: , (")
security level - 08: , (")
security policy - 08: , (")
sensitive information - 08: , (")
sensitivity - 08: , (")
separation of duties
: .
- 08: , (")
sequence check - 08: , (")
single-level device - - 08: , (")
software piracy - 08: , (")
spiral track - 08: , (")
spoof [v] - 08: , (")
subject - 08: , (")
substitution - 08: , (")
sum check, summation check - 08: , (")
supersector- - 08: , (")
symmetric cryptography - 08: , (")
system integrity - 08: , (")
tailgate [v] - 08: , (")
test, - 08: , (")
test, - 08: , (")
test data - 08: , (")
threat - 08: , (")
threat analysis - 08: , (")
ticket - 08: , (")
time bomb [ : ] - 08: , (")
traffic analysis - 08: , (")
traffic padding - 08: , (")
transposition - 08: , (")
transverse parity check - 08: , (")
trapdoor - 08: , (")
Trojan horse - 08: , (")
trusted computer system - 08: , (")
unrecoverable error - 08: , (")
user ID, user identification - 08: , (")
user profile
".
- 08: , (")
verification - 08: , (")
virus, - 08: , (")
virus, - 08: , (")
virus signature , - 08: , (")
virus signature , - 08: , (")
vulnerability - 08: , (")
weak bit - 08: , (")
wide track - 08: , (")
wiretapping - 08: , (")
worm - 08: , (")
write access - 08: , (")