Wednesday, March 6, 2013

Computer network security list


A

ACARM-ng

Administrative domain

AEGIS SecureConnect

Aladdin Knowledge Systems

Alert Logic

AlgoSec

Altor Networks

Anomaly-based intrusion detection system

Anti-pharming

Anti-phishing software

Anti-worm

Application-level gateway

ARP spoofing

ArpON

Asprox botnet

Attack (computing)

Attack tree

Authentication server

B

Bagle (computer worm)

Barracuda Networks

BartVPN

Bastion host

Black hole (networking)

Blacker (security)

BNC (software)

Botnet

BredoLab botnet

Bro (software)

Browser security

Byzantine Foothold

C

Captive portal

Capture the flag

Center for Internet Security

Check Point

Check Point GO

Check Point VPN-1

Christmas tree packet

CimTrak

Cisco Global Exploiter

Cisco PIX

Cisco Security Agent

Cisco Systems VPN Client

Clarified Networks

Clear channel assessment attack

Client Puzzle Protocol

Cloudvpn

Codenomicon

Columbitech

Computer security

Context-based access control

ContraVirus

Core Security Technologies

Countermeasure (computer)

Cracking of wireless networks

Credant Technologies

CronLab

Cryptek

Cutwail botnet

CVSS

Cyber security and countermeasure

CyberCIEGE

Cyberoam

D

Dark Internet

Data breach

DDoS mitigation

Deep content inspection

Deep packet inspection
Defense in depth (computing)
Denial-of-service attack
Device fingerprint
DHIPDS
Differentiated security
Digital Postmarks
Digital security
Distributed firewall
DMZ (computing)
DNS hijacking
DNS rebinding
DNS spoofing
DNSChanger
Donbot botnet
Dual-homed

E

Egress filtering
End node problem
Entrust
ESafe
Evil bit
Extensible Threat Management (XTM)
Extranet

F

Fail2ban
Fake AP
Festi botnet
Finjan
Firewalk (computing)
Firewall (computing)
Firewall pinhole
Firewalls and Internet Security
Fortinet
Forward-confirmed reverse DNS

G

General Dynamics C4 Systems
Generalized TTL security mechanism
Global Internet Freedom Consortium
Golden Frog (company)
Google Safe Browsing
Greynet
Grum botnet
Guided tour puzzle protocol
Gumblar

H

Hole punching
Honeyd
HoneyMonkey
Honeynet Project
Honeypot (computing)
Honeytoken
Host Identity Protocol

I

ICMP hole punching
Identity driven networking
IEC 62351
IEEE 802.1X
IF-MAP
Imperva
Ingress filtering
Institute for Applied Network Security
Integrated Windows Authentication
Inter-protocol exploitation
Internet censorship
Internet censorship circumvention
Internet security
Internet Storm Center
InterWorking Labs
IntruShield

K

KAME project
Kaspersky Anti-Virus
Kelihos botnet
Kerberos (protocol)
Kerio Control
Key distribution center
Knowledge-based authentication
Galina Kofman
Kraken botnet

L

Labris Teknoloji
Lancope
Talk:Lancope/Temp
Lethic botnet
List of cyber attack threat trends
Lorcon
Lumeta Corporation

M

MAC flooding
Mako Networks
Managed security service
Managed VoIP Service
Mariposa botnet
Mastering the Internet
Mega-D botnet
Messaging security
Metasploit Project
Metulji botnet
Microsoft SmartScreen
Middlebox
Miredo
Mobile virtual private network
Monoculture (computer science)
Mu Dynamics
MySecureCyberspace

N

NAT traversal
National Cyber Range
National Strategy for Trusted Identities in Cyberspace
NeoAccel
Netbox Blue
Netsniff-ng
NetStumbler
Network Access Control
Network Admission Control
Network Based Application Recognition
Network encryption cracking
Network intelligence
Network security policy
Network Security Toolkit
Nfront security
NIST RBAC model
Nitol botnet
NTLM
Null session

No comments:

Post a Comment