Security terminology

This topic includes common security terms and links to their definitions in the IBM® i glossary.

A   B    C    D   E    F   G   H    I   J  K   L   M    N   O    P   Q    R    S    T   U    V    W   X   Y   Z   

A
address poisoning
audit journal
authentication
B
C
certificate authority (CA)
cipher
ciphertext
cracker
cryptography
D
data confidentiality
data integrity
data origin authentication
denial-of-service attack
digital certificate
Digital Certificate Manager (DCM)
digital signature
distinguished name
Domain Name System (DNS)
E
echo
encryption
Enterprise Identity Mapping (EIM)
extranet
extrusion
F
firewall
fraggle attack
fragment
G
H
hacker
hypertext link
Hypertext Markup Language (HTML)
Hypertext Transfer Protocol (HTTP)
I
ICMP redirect message
ICMP scan
inbound intrusion
Internet
Internet client
Internet Control Message Protocol (ICMP)
Internet host
Internet Key Exchange (IKE)
Internet name
Internet server
Internet service provider (ISP)
intranet
intrusion detection system
intrusion prevention system (IPS)
IP address (Internet Protocol address)
IP datagram
IP filter
IP Security Architecture (IPSec)
J
K
keystore
L
M
malformed packet
N
network address translation (NAT)
nonrepudiation
O
outbound raw attack
P
packet
perpetual echo
ping-of-death attack
port scan
proxy server
production stack
public key infrastructure (PKI)
Q
quality of service (QoS)
R
replay protection
restricted IP option
restricted IP protocol
S
Secure Sockets Layer (SSL)
service stack
single sign-on (SSO)
smurf attack
sniffing
Sockets Secure (SOCKS)
spoofed source address
spoofing
SYN flood
T
TCP ACK storm
TCP/IP stack
throttle
traffic regulation anomaly
Transmission Control Protocol/Internet Protocol (TCP/IP)
Trojan horse
U
User Datagram Protocol (UDP)
V
virtual private network (VPN)
W
Web browser
World Wide Web (WWW, Web)
X
Y
Z