Menu
Home
Explore
People
Places
Arts
History
Plants & Animals
Science
Life & Culture
Technology
Reference.org
Sign In
Technology
Computing and information technology
Computer security
Computer security
Authentication
The act of proving an assertion, often the identity of a computer system user
Block cipher
Type of cipher
Botnet
Collection of compromised internet-connected devices controlled by a third party
Brute-force attack
Cryptanalytic method for unauthorized users to access data
Caesar cipher
Simple and widely known encryption technique
Cipher
Algorithm for encrypting and decrypting information
Computer security
Protection of computer systems from information disclosure, theft or damage
Computer virus
Computer program that modifies other programs to replicate itself and spread
Computer worm
Standalone malware computer program that replicates itself in order to spread to other computers
Copy protection
Protection of software, films, music, other media
Cryptanalysis
Study of analyzing information systems in order to discover their hidden aspects
Cryptography
Practice and study of secure communication techniques
Cybercrime
Crime involving a computer and a network
Denial-of-service attack
Cyber attack disrupting service by overloading the provider of the service
Diffie–Hellman key exchange
Method of exchanging cryptographic keys
Digital rights management
Technology to control access to copyrighted works and prevent unauthorized copying
Digital signature
Mathematical scheme for verifying the authenticity of digital documents
Encryption
Process of converting plaintext to ciphertext
Enigma machine
German cipher machine
Firewall (computing)
Software or hardware-based network security system
Key (cryptography)
Piece of information in cryptography
Keystroke logging
Action of recording the keys struck on a keyboard
Malware
A portmanteau for malicious software
Multi-factor authentication
Method of computer access control
Obfuscation (software)
Deliberate creation of difficult-to-understand code
One-time pad
Encryption technique
Password
Text used for user authentication to prove identity
Phishing
Act of attempting to acquire sensitive information by posing as a trustworthy entity
Public-key cryptography
Cryptographic system with public and private keys
Ransomware
Malicious software used in ransom demands
RSA cryptosystem
Algorithm for public-key cryptography
Security bug
Type of software bug
Security through obscurity
Reliance on design or implementation secrecy for security
Security token
Device used to access electronically restricted resource
Spyware
Malware that collects and transmits user information without their knowledge
Steganography
Hiding messages in other messages
Symmetric-key algorithm
Algorithm
Transport Layer Security
Cryptographic protocols for securing data in transit
Trojan horse (computing)
Type of malware
Zero-day vulnerability
Unfixed software vulnerability
Zombie (computing)
Network connected computer that has been compromised and is used for malicious task without the owner being aware of it