Security terminology
This topic includes common security terms and links to their definitions in the IBM® i glossary.
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
- A
- address poisoning
- audit journal
- authentication
- B
- C
- certificate authority (CA)
- cipher
- ciphertext
- cracker
- cryptography
- D
- data confidentiality
- data integrity
- data origin authentication
- denial-of-service attack
- digital certificate
- Digital Certificate Manager (DCM)
- digital signature
- distinguished name
- Domain Name System (DNS)
- E
- echo
- encryption
- Enterprise Identity Mapping (EIM)
- extranet
- extrusion
- F
- firewall
- fraggle attack
- fragment
- G
- H
- hacker
- hypertext link
- Hypertext Markup Language (HTML)
- Hypertext Transfer Protocol (HTTP)
- I
- ICMP redirect message
- ICMP scan
- inbound intrusion
- Internet
- Internet client
- Internet Control Message Protocol (ICMP)
- Internet host
- Internet Key Exchange (IKE)
- Internet name
- Internet server
- Internet service provider (ISP)
- intranet
- intrusion detection system
- intrusion prevention system (IPS)
- IP address (Internet Protocol address)
- IP datagram
- IP filter
- IP Security Architecture (IPSec)
- J
- K
- keystore
- L
- M
- malformed packet
- N
- network address translation (NAT)
- nonrepudiation
- O
- outbound raw attack
- P
- packet
- perpetual echo
- ping-of-death attack
- port scan
- proxy server
- production stack
- public key infrastructure (PKI)
- Q
- quality of service (QoS)
- R
- replay protection
- restricted IP option
- restricted IP protocol
- S
- Secure Sockets Layer (SSL)
- service stack
- single sign-on (SSO)
- smurf attack
- sniffing
- Sockets Secure (SOCKS)
- spoofed source address
- spoofing
- SYN flood
- T
- TCP ACK storm
- TCP/IP stack
- throttle
- traffic regulation anomaly
- Transmission Control Protocol/Internet Protocol (TCP/IP)
- Trojan horse
- U
- User Datagram Protocol (UDP)
- V
- virtual private network (VPN)
- W
- Web browser
- World Wide Web (WWW, Web)
- X
- Y
- Z