- Access Control - בקרת גישה
- Access Control List (ACL) - רשימת בקרת גישה
- Access Control Service - שירות בקרת גישה
- Account Harvesting - איסוף חשבונות
- ACK Piggybacking
- Active Content - תוכן פעיל
- Activity Monitors - בקרי פעילות
- Address Resolution Protocol (ARP)
- Advanced Encryption Standard (AES)
- Algorithm - אלגוריטם
- Asymmetric Cryptography - הצפנה אסימטרית
- Asymmetric Warfare - תקיפה אסימטרית
- Auditing
- Authentication - אימות הזדהות
- Authenticity - מקוריות
- Authorization - אוטורזציה
- Availability - זמינות
- Backdoor - דלת אחורית
- Bandwidth - תעבורה
- Banner
- Bastion Host
- Bit - ביט
- Block Cipher - צופן בלוקים
- Boot Record Infector - מזהם רשומות טעינה
- Botnet
- Bridge
- Broadcast
- Broadcast Address
- Brute Force
- Buffer Overflow
- Business Continuity Plan (BCP)
- Business Impact Analysis (BIA)
- Byte
- Cache
- Cache Cramming
- Cache Poisoning
- Certificate-Based Authentication
- Checksum
- Cipher
- Ciphertext
- Client
- Cloud Computing
- Collision
- Common Gateway Interface (CGI)
- Competitive Intelligence
- Computer Emergency Response Team (CERT)
- Computer Network
- Confidentiality
- Cookie
- Crimeware
- Cron
- Cryptanalysis
- Cyclic Redundancy Check (CRC)
- Daemon
- Data Custodian
- Data Encryption Standard (DES)
- Day Zero
- Decryption
- Defense In-Depth
- Demilitarized Zone (DMZ)
- Denial of Service (DOS)
- Dictionary Attack
- Digital Certificate
- Digital Signature
- Digital Signature Algorithm (DSA)
- Disassembly
- Disaster Recovery Plan (DRP)
- Domain
- Domain Hijacking
- Domain Name System (DNS)
- Echo Reply
- Echo Request
- Encapsulation
- Encryption
- Exterior Gateway Protocol (EGP)
- File Transfer Protocol (FTP)
- Flooding
- Forest
- Fork Bomb
- Form-Based Authentication
- Forward Lookup
- Forward Proxy
- Gateway
- gethostbyname
- Hardening
- Hash Functions
- Header
- Honeymonkey
- Honey pot
- Hops
- Host
- Host-Based ID
- HTTP Proxy
- HTTPS
- Hub
- Hybrid Attack
- Hybrid Encryption
- Hyperlink
- Hypertext Markup Language (HTML)
- Hypertext Transfer Protocol (HTTP)
- Incremental Backups
- Input Validation Attacks
- Integrity
- Internet
- Internet Control Message Protocol (ICMP)
- Internet Message Access Protocol (IMAP)
- Internet Protocol (IP)
- Internet Protocol Security (IPsec)
- Interrupt
- Intrusion Detection System
- IP Address
- IP Flood
- IP Spoofing
- Jump Bag
- Kernel
- Lightweight Directory Access Protocol (LDAP)
- Logic bombs
- Loopback Address
- MAC Address
- Malware
- md5
- Monoculture
- Multi-Cast
- NAT
- Netmask
- Octet
- One-Way Encryption
- Packet
- Password Cracking
- Patch
- Payload
- Phishing
- Ping of Death
- Polymorphism
- Port
- Promiscuous Mode
- Ransomware
- Reconnaissance
- Registry
- Reverse Engineering
- Reverse Lookup
- Root
- Rootkit
- Routing Loop
- Secure Shell (SSH)
- Secure Sockets Layer (SSL)
- Session
- Session Hijacking
- Shell
- Signature
- Sniffing
- Social Engineering
- Socket
- Spoof
- SQL Injection
- Stack Mashing
- Applet
- Browser
- Data Aggregation
- Data Mining
- Decapsulation
- Defacement
- Fast Flux
- Firewall
- Full Duplex
- gethostbyaddr
- Least Privilege
- Switch
- Tamper
- TCP Full Open Scan
- TCP Half Open Scan
- TCP/IP
- TELNET
- three way handshake
- Time to Live
- Transmission Control Protocol (TCP)
- Transport Layer Security (TLS)
- Trojan Horse
- User Datagram Protocol (UDP)
- Virtual Private Network (VPN)