| A | B |
| CIA | Confidentiality, Integrity, and Availability (CIA) are security concepts that cover various aspects of computer and networking safety, including, but not limited to, encryption, authentication, firewalls, and reliability. |
| AAA | Authentication, Authorization, and Accounting (AAA) are security concepts that assist users in accessing network resources by the act of proving identity. |
| Hacktivist | Hacktivism or hactivism (a portmanteau of hack and activism) is the use of computers and computer networks to promote political ends, chiefly free speech, human rights, and information ethics. |
| Social Engineering | In the context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information. A type of confidence trick for the purpose of information gathering, fraud, or system access, it differs from a traditional "con" in that it is often one of many steps in a more complex fraud scheme. |
| Enumeration | Is a computing activity in which usernames and info on groups, shares, and services of networked computers are retrieved. It should not be confused with network mapping, which only retrieves information about which servers are connected to a specific network and what operating system run on them. |
| PAP | Works like a standard login procedure; the remote system authenticates itself to the using a static user name and password combination. Password authentication protocol |
| CHAP | Challenge Handshake Authentication Protocol (CHAP) is a widely supported authentication method in which a representation of the user's password, rather than the password itself, is sent during the authentication process. |
| WEP | Wired Equivalent Privacy (WEP) is a deprecated algorithm to secure IEEE 802.11 wireless networks, and is generally considered to be unsecure. |
| WPA | Used to replace WEP, this wireless protocol |
| RADIUS | Remote Authentication Dial-In User Service (RADIUS) is a networking protocol that provides centralized Authentication, Authorization, and Accounting (AAA) management for computers to connect and use a network service. |
| LDAP | A software protocol for enabling anyone to locate organizations, individuals, and other resources such as files and devices in a network, whether on the public Internet or on a corporate intranet. Lightweight Directory Access Protocol |
| PKI | Public Key Infrastucture (PKI) is method which provides a certificate distribution and management framework. |
| Kerberos | Developed at MIT, this is a secure method for authenticating a request for a service in a computer network. The name is taken from Greek mythology for the three headed dog who guarded the gates of Hades. |
| Active Directory | Is a directory service that Microsoft developed for Windows domain networks and is included in most Windows Server operating systems as a set of processes and services. |
| Group Policies | A hierarchical infrastructure that allows a network administrator in charge of Microsoft's Active Directory to implement specific configurations for users and computers. It can also be used to define user, security and networking policies at the machine level. |
| CAs | In the Microsoft .NET framework, is Microsoft's solution to prevent untrusted code from performing privileged actions. When the CLR loads an assembly it will obtain evidence for the assembly and use this to identify the code group that the assembly belongs to. |
| Cryptography | The study of encryption. Cryptography uses codes to encrypt data so that only users with the key to the encryption are allowed to have access to data. |
| Authentication | The process used to validate credentials, and thereby prove the identity of a user. |
| Auditing | The tracking of actions of users and systems. |