IT Terms tagged with 'Information Assurance'
- Abstract Syntax Notation One (ASN.1)
- Access Code
- Accreditation
- Administrative Domain (AD)
- ARccOS
- Attack
- Audio Home Recording Act (AHRA)
- Auto-Partitioning
- Automatic Identification (Auto ID)
- Bates Number
- Betamax Standard (Beta)
- Biometrics
- Bluesnarfing
- Carnivore
- Chief Information Security Officer (CISO)
- Cloud Security Alliance (CSA)
- Common Criteria for Information Technology Security Evaluation (CC)
- Common Vulnerabilities and Exposures (CVE)
- Communications Security (COMSEC)
- Compliance
- Computer Fraud and Abuse Act (CFAA)
- Computer Network Defense (CND)
- Computer Network Exploitation (CNE)
- Computer Network Operations (CNO)
- Confidentiality
- Contamination
- Contingency Plan
- Controlled Cryptographic Item (CCI)
- Controlled Unclassified Information (CUI)
- Cyber Pearl Harbor
- Cyberlaw
- Data Security
- Defense In Depth
- Defense Information Systems Agency (DISA)
- Demilitarized Zone (DMZ)
- Digital Identity
- Digital Rights
- Digital Rights Management (DRM)
- Digital Watermark
- Digital Watermarking
- DOD Information Assurance Certification and Accreditation Process (DIACAP)
- DOD Information Technology Security Certification and Accreditation Process (DITSCAP)
- DRM-Free
- Electronically Stored Information (ESI)
- European Union Copyright Directive (EUCD)
- Event-Stream Processing (ESP)
- Exploit
- Federal Intrusion Detection Network (FIDNET)
- FileMaker Pro
- Financial Modernization Act of 1999
- Gramm-Leach-Bliley Act (GLB Act or GLBA)
- High-Bandwidth Digital Content Protection (HDCP)
- Host-Based Intrusion Detection System (HIDS)
- Host-Based Intrusion Prevention System (HIPS)
- Impostor
- Information Assurance (IA)
- Information Technology Infrastructure Library (ITIL)
- Information Warfare
- Initialization Vector
- Integrity
- Interconnection Agreement
- Internet Crime
- Kevin Mitnick
- Key Escrow
- LulzSec (Lulsec)
- Masquerade Attack
- Multipartite Virus
- National Information Assurance Partnership (NIAP)
- Netbus
- Network-based Intrusion Detection System (NIDS)
- Parity Check
- Password Authentication Protocol (PAP)
- Password Cracking
- Personal Identification Number (PIN)
- Polymorphic Virus
- Presidential Policy Directive (PPD-8)
- Quality Assurance (QA)
- Remote Access Trojan (RAT)
- Render Right
- Reputation-Based Security
- Right Holder
- Risk Analysis
- Role-Based Access Control (RBAC)
- Rootkit
- Sandboxing
- Secure Sockets Layer (SSL)
- Security Breach
- Security Policy
- Security Requirements Traceability Matrix (SRTM)
- Sensitive Compartmented Information (SCI)
- Sensitive Information
- Session Hijacking
- Subsidiary Rights
- SURBL
- Threat
- Trust Anchor
- Tunneling
- Universal Description Discovery and Integration (UDDI)
- Virtual Firewall
- Vulnerability
- Warm Server
- Wired Equivalent Privacy (WEP)
- Wireless Local Area Network Security (WLAN Security)
- Zend Optimizer