Glossary · MweTerm

L1 — flat list of every term with classification chips collapsed.

Sort
Filtercosmetic affordance — live filters Phase 2
2738 terms
TermTypeDefinitionClassificationsUpdated
Acceptable interruption windowMWEcandidateMay 12, 2026
Acceptable use policyMWEcandidateMay 12, 2026
Acceptance CriteriaMWEcandidateMay 12, 2026
access attemptMWEcandidateMay 12, 2026
access codeMWEcandidateMay 9, 2026
access controlMWEcandidateMay 9, 2026
Access control listMWEcandidateMay 9, 2026
access control mechanismMWEcandidateMay 9, 2026
Access Control programMWEcandidateMay 9, 2026
Access Control ServiceMWEcandidateMay 9, 2026
Access ListMWEcandidateMay 9, 2026
access logMWEcandidateMay 12, 2026
Access Management AccessMWEcandidateMay 12, 2026
Access MatrixMWEcandidateMay 12, 2026
Access pathMWEcandidateMay 9, 2026
Access PointMWEcandidateMay 12, 2026
Access ProfileMWEcandidateMay 9, 2026
access revocation programMWEcandidateMay 12, 2026
access rightMWEcandidateMay 12, 2026
Access TypeMWEcandidateMay 12, 2026
account forMWEcandidateMay 9, 2026
account forMWEverifiedMay 11, 2026
Account HarvestingMWEcandidateMay 12, 2026
account typeMWEcandidateMay 12, 2026
Account-To-Account Payment (A2A)MWEcandidateMay 12, 2026
Accounting Legend CodeMWEcandidateMay 9, 2026
Accounting NumberMWEcandidateMay 9, 2026
Accreditation PackageMWEcandidateMay 9, 2026
Accrediting AuthorityMWEcandidateMay 12, 2026
ACK PiggybackingMWEcandidateMay 9, 2026
Acquirer FeeMWEcandidateMay 9, 2026
Acquiring Bank and AcquirerMWEcandidateMay 9, 2026
act outMWEverifiedMay 11, 2026
action itemMWEcandidateMay 12, 2026
action planMWEcandidateMay 12, 2026
actionable intelligenceMWEcandidateMay 12, 2026
Activation DataMWEcandidateMay 9, 2026
active attackMWEcandidateMay 9, 2026
active contentMWEcandidateMay 12, 2026
Active LearningMWEcandidateMay 13, 2026
Active Learning AgentMWEcandidateMay 13, 2026
Active Security TestingMWEcandidateMay 12, 2026
Activity MonitorsMWEcandidateMay 9, 2026
activity reportingMWEcandidateMay 9, 2026
Ad Hoc NetworkMWEcandidateMay 9, 2026
Adaptive Dynamic ProgrammingMWEcandidateMay 13, 2026
Adaptive LearningMWEcandidateMay 13, 2026
Add-on SecurityMWEcandidateMay 9, 2026
Address Resolution ProtocolMWEcandidateMay 12, 2026
Address Verification Service (AVS)MWEcandidateMay 9, 2026
Adequate SecurityMWEcandidateMay 12, 2026
Administrative AccountMWEcandidateMay 12, 2026
administrative responsibilityMWEcandidateMay 9, 2026
Administrative SafeguardsMWEcandidateMay 9, 2026
Administrator privilegesMWEcandidateMay 9, 2026
Advanced Encryption StandardMWEcandidateMay 9, 2026
Advanced Key ProcessorMWEcandidateMay 9, 2026
Advanced persistent threatMWEcandidateMay 9, 2026
advanced searchMWEverifiedMay 11, 2026
Adversarial ExampleMWEcandidateMay 13, 2026
Adverse Action NoticeMWEcandidateMay 13, 2026
Adverse Impact RatioMWEcandidateMay 13, 2026
affected partyMWEcandidateMay 9, 2026
Agency Certification AuthorityMWEcandidateMay 9, 2026
Agent BankMWEcandidateMay 9, 2026
Aggregate Short PositionMWEcandidateMay 9, 2026
Aggregate Short Position LimitMWEcandidateMay 12, 2026
Ai PrinciplesMWEcandidateMay 13, 2026
air gapMWEcandidateMay 11, 2026
Air-gapped environmentMWEcandidateMay 9, 2026
alert parameterMWEcandidateMay 9, 2026
Alert situationMWEcandidateMay 9, 2026
Algorithmic AversionMWEcandidateMay 13, 2026
All Source IntelligenceMWEcandidateMay 9, 2026
Alternate COMSEC CustodianMWEcandidateMay 9, 2026
Alternate facilitiesMWEcandidateMay 9, 2026
Alternate processMWEcandidateMay 12, 2026
Alternate Site Test / ExerciseMWEcandidateMay 9, 2026
Alternate Work SiteMWEcandidateMay 12, 2026
analyze candidate architecturesMWEverifiedMay 11, 2026
anomalous activityMWEcandidateMay 9, 2026
anomalous transactionMWEcandidateMay 9, 2026
Anomaly-Based DetectionMWEcandidateMay 9, 2026
antimalware softwareMWEcandidateMay 9, 2026
antispyware softwareMWEcandidateMay 9, 2026
Antivirus softwareMWEcandidateMay 9, 2026
antivirus update levelMWEcandidateMay 12, 2026
antivirus update processMWEcandidateMay 12, 2026
Antivirus/anti-malware softwareMWEcandidateMay 9, 2026
applicable requirementMWEcandidateMay 12, 2026
application controlMWEcandidateMay 12, 2026
application developmentMWEcandidateMay 9, 2026
Application layerMWEcandidateMay 9, 2026
Application systemMWEcandidateMay 9, 2026
application whitelistingMWEcandidateMay 12, 2026
appropriate personnelMWEcandidateMay 12, 2026
Approval to OperateMWEcandidateMay 9, 2026
Approved Mode of OperationMWEcandidateMay 12, 2026
Approved Security FunctionMWEcandidateMay 9, 2026
Artificial Intelligence (ai) SystemMWEcandidateMay 13, 2026
Artificial Intelligence LearningMWEcandidateMay 13, 2026
Artificial Narrow Intelligence (ani)MWEcandidateMay 13, 2026
Artificial Neural NetworksMWEcandidateMay 13, 2026
assessed riskMWEcandidateMay 12, 2026
Assessment FindingsMWEcandidateMay 9, 2026
Assessment MethodMWEcandidateMay 9, 2026
Assessment ObjectMWEcandidateMay 12, 2026
Assessment ObjectiveMWEcandidateMay 12, 2026
Assessment ProcedureMWEcandidateMay 9, 2026
Asset IdentificationMWEcandidateMay 12, 2026
asset inventoryMWEcandidateMay 12, 2026
asset physical securityMWEcandidateMay 9, 2026
Asset Reporting FormatMWEcandidateMay 9, 2026
asset vulnerabilityMWEcandidateMay 9, 2026
Assurance CaseMWEcandidateMay 12, 2026
Assured Information SharingMWEcandidateMay 9, 2026
Assured SoftwareMWEcandidateMay 9, 2026
Asymmetric CryptographyMWEcandidateMay 9, 2026
Asymmetric keyMWEcandidateMay 12, 2026
Asymmetric WarfareMWEcandidateMay 12, 2026
Asynchronous data replicationMWEcandidateMay 12, 2026
Asynchronous transfer modeMWEcandidateMay 9, 2026
Attack mechanismMWEcandidateMay 9, 2026
attack methodMWEcandidateMay 9, 2026
attack pathMWEcandidateMay 12, 2026
attack patternMWEcandidateMay 12, 2026
Attack Sensing and WarningMWEcandidateMay 9, 2026
attack signatureMWEcandidateMay 12, 2026
attack surfaceMWEcandidateMay 9, 2026
Attack vectorMWEcandidateMay 12, 2026
Attribute AuthorityMWEcandidateMay 9, 2026
Attribute-Based Access ControlMWEcandidateMay 9, 2026
Attribute-Based AuthorizationMWEcandidateMay 9, 2026
audit activityMWEcandidateMay 9, 2026
Audit charterMWEcandidateMay 12, 2026
audit committeeMWEcandidateMay 9, 2026
audit criterionMWEcandidateMay 12, 2026
audit cycleMWEcandidateMay 9, 2026
Audit DataMWEcandidateMay 12, 2026
audit findingMWEcandidateMay 12, 2026
Audit functionMWEcandidateMay 9, 2026
audit logMWEcandidateMay 13, 2026
Audit Log eventMWEcandidateMay 9, 2026
audit manualMWEcandidateMay 9, 2026
Audit planMWEcandidateMay 12, 2026
audit policyMWEcandidateMay 9, 2026
audit procedureMWEcandidateMay 9, 2026
Audit programMWEcandidateMay 9, 2026
audit recordMWEcandidateMay 9, 2026
Audit Reduction ToolsMWEcandidateMay 12, 2026
audit reportMWEcandidateMay 12, 2026
audit resourceMWEcandidateMay 12, 2026
Audit ReviewMWEcandidateMay 12, 2026
audit scheduleMWEcandidateMay 12, 2026
audit scopeMWEcandidateMay 12, 2026
audit staffMWEcandidateMay 12, 2026
audit standardMWEcandidateMay 12, 2026
Audit trailMWEcandidateMay 12, 2026
audit universeMWEcandidateMay 12, 2026
audit vendorMWEcandidateMay 12, 2026
Audit Work PaperMWEcandidateMay 12, 2026
Authentication CodeMWEcandidateMay 12, 2026
authentication controlMWEcandidateMay 9, 2026
authentication mechanismMWEcandidateMay 9, 2026
authentication methodMWEcandidateMay 12, 2026
Authentication ModeMWEcandidateMay 9, 2026
Authentication PeriodMWEcandidateMay 12, 2026
authentication procedureMWEcandidateMay 9, 2026
Authentication ProtocolMWEcandidateMay 12, 2026
Authentication TagMWEcandidateMay 12, 2026
Authentication TokenMWEcandidateMay 9, 2026
Authorization (ACH)MWEcandidateMay 9, 2026
Authorization BoundaryMWEcandidateMay 9, 2026
authorization recordMWEcandidateMay 9, 2026
Authorization to operateMWEcandidateMay 9, 2026
authorize and documentMWEcandidateMay 11, 2026
authorized accessMWEcandidateMay 9, 2026
authorized deviceMWEcandidateMay 12, 2026
authorized personMWEcandidateMay 12, 2026
authorized personnelMWEcandidateMay 9, 2026
authorized userMWEcandidateMay 9, 2026
Authorized VendorMWEcandidateMay 12, 2026
Authorized Vendor ProgramMWEcandidateMay 9, 2026
Authorizing OfficialMWEcandidateMay 9, 2026
Automated Clearing House (ACH)MWEcandidateMay 9, 2026
automated clearing house activityMWEcandidateMay 9, 2026
automated clearing house captureMWEcandidateMay 9, 2026
Automated ControlsMWEcandidateMay 12, 2026
Automated Key TransportMWEcandidateMay 12, 2026
Automated Password GeneratorMWEcandidateMay 9, 2026
Automated Security MonitoringMWEcandidateMay 9, 2026
Automated Teller Machine (ATM)MWEcandidateMay 9, 2026
Automatic Remote RekeyingMWEcandidateMay 9, 2026
Automation BiasMWEcandidateMay 13, 2026
Autonomous SystemMWEcandidateMay 9, 2026
Autonomous VehicleMWEcandidateMay 13, 2026
availability requirementMWEcandidateMay 9, 2026
Back Office Conversion (BOC)MWEcandidateMay 9, 2026
back upMWEverifiedMay 11, 2026
Back-up GenerationsMWEcandidateMay 12, 2026
Backtracking ResistanceMWEcandidateMay 9, 2026
Bank Secrecy ActMWEcandidateMay 12, 2026
Bankcard CompaniesMWEcandidateMay 12, 2026
Banner GrabbingMWEcandidateMay 9, 2026
baseline configurationMWEcandidateMay 12, 2026
Baseline SecurityMWEcandidateMay 12, 2026
Basic AuthenticationMWEcandidateMay 9, 2026
Basic TestingMWEcandidateMay 9, 2026
Bastion HostMWEcandidateMay 12, 2026
Batch ProcessingMWEcandidateMay 9, 2026
Batched AutomationMWEcandidateMay 13, 2026
be accurateMWEcandidateMay 11, 2026
be adequateMWEcandidateMay 11, 2026
be appropriateMWEcandidateMay 9, 2026
be at restMWEcandidateMay 11, 2026
be availableMWEcandidateMay 11, 2026
be completeMWEcandidateMay 11, 2026
be consistentMWEcandidateMay 11, 2026
be currentMWEcandidateMay 11, 2026
be impracticalMWEcandidateMay 9, 2026
be inMWEcandidateMay 11, 2026
be in effectMWEcandidateMay 11, 2026
be insufficientMWEcandidateMay 11, 2026
be responsibleMWEcandidateMay 9, 2026
be sufficientMWEcandidateMay 11, 2026
behavior monitoringMWEcandidateMay 9, 2026
Behavioral OutcomeMWEcandidateMay 9, 2026
Benign EnvironmentMWEcandidateMay 9, 2026
Berkeley Internet Name DomainMWEcandidateMay 9, 2026
best practiceMWEcandidateMay 9, 2026
Bias Mitigation AlgorithmMWEcandidateMay 13, 2026
Bias TestingMWEcandidateMay 13, 2026
Big DataMWEcandidateMay 13, 2026
Bilateral Key SecurityMWEcandidateMay 12, 2026
Biometric DataMWEcandidateMay 13, 2026
Biometric InformationMWEcandidateMay 9, 2026
Biometric SystemMWEcandidateMay 9, 2026
Bit Error RateMWEcandidateMay 12, 2026
Bits per second (BPS)MWEcandidateMay 12, 2026
Black CoreMWEcandidateMay 12, 2026
Black holingMWEcandidateMay 9, 2026
Blended AttackMWEcandidateMay 9, 2026
Block cipherMWEcandidateMay 9, 2026
Block Cipher AlgorithmMWEcandidateMay 12, 2026
Blue TeamMWEcandidateMay 12, 2026
board committeeMWEcandidateMay 9, 2026
Board of DirectorsMWEcandidateMay 9, 2026
Body of EvidenceMWEcandidateMay 9, 2026
boolean searchMWEverifiedMay 11, 2026
Boot Record InfectorMWEcandidateMay 9, 2026
Border Gateway ProtocolMWEcandidateMay 9, 2026
Border routerMWEcandidateMay 9, 2026
bot mastMWEcandidateMay 9, 2026
Boundary ProtectionMWEcandidateMay 12, 2026
boundary protection deviceMWEcandidateMay 12, 2026
break downMWEverifiedMay 11, 2026
bring inMWEcandidateMay 11, 2026
Bring your own deviceMWEcandidateMay 12, 2026
British Standard 7799MWEcandidateMay 9, 2026
Broadcast AddressMWEcandidateMay 9, 2026
Brute forceMWEcandidateMay 9, 2026
Brute force attackMWEcandidateMay 9, 2026
Brute Force Password AttackMWEcandidateMay 9, 2026
budget processMWEcandidateMay 12, 2026
Buffer overflowMWEcandidateMay 12, 2026
Buffer Overflow AttackMWEcandidateMay 9, 2026
Build Security InMWEcandidateMay 9, 2026
Built-In TestMWEcandidateMay 13, 2026
Bulk Electric System Cyber SystemMWEcandidateMay 9, 2026
Bulk EncryptionMWEcandidateMay 9, 2026
bullet pointMWEverifiedMay 11, 2026
business activityMWEcandidateMay 9, 2026
business continuityMWEcandidateMay 12, 2026
Business Continuity PlanMWEcandidateMay 9, 2026
Business Continuity Plan (BCP)MWEcandidateMay 9, 2026
Business Continuity planningMWEcandidateMay 12, 2026
business continuity programMWEcandidateMay 12, 2026
Business Continuity StrategyMWEcandidateMay 12, 2026
Business Continuity TestMWEcandidateMay 12, 2026
business continuity testingMWEcandidateMay 9, 2026
business functionMWEcandidateMay 9, 2026
business impactMWEcandidateMay 9, 2026
Business Impact AnalysisMWEcandidateMay 12, 2026
Business Impact Analysis (BIA)MWEcandidateMay 9, 2026
Business impact analysis/assessmentMWEcandidateMay 12, 2026
business operationMWEcandidateMay 9, 2026
business processMWEcandidateMay 9, 2026
Business Process ManagementMWEcandidateMay 13, 2026
Business Recovery Test/ExerciseMWEcandidateMay 12, 2026
business resumption testingMWEcandidateMay 9, 2026
Business RuleMWEcandidateMay 13, 2026
business strategyMWEcandidateMay 9, 2026
business unitMWEcandidateMay 9, 2026
Business ValueMWEcandidateMay 12, 2026
Cache CrammingMWEcandidateMay 9, 2026
Cache PoisoningMWEcandidateMay 9, 2026
Call Admission ControlMWEcandidateMay 9, 2026
Call BackMWEcandidateMay 9, 2026
Call TreeMWEcandidateMay 9, 2026
Capacity TestingMWEcandidateMay 9, 2026
Capstone PoliciesMWEcandidateMay 9, 2026
Card IssuerMWEcandidateMay 9, 2026
Card Verification Code (CVC2)MWEcandidateMay 9, 2026
Card Verification Value (CVV2)MWEcandidateMay 9, 2026
carry outMWEverifiedMay 11, 2026
Cash LetterMWEcandidateMay 9, 2026
Central Office of RecordMWEcandidateMay 9, 2026
Central Services NodeMWEcandidateMay 9, 2026
Certificate ManagementMWEcandidateMay 9, 2026
Certificate Management AuthorityMWEcandidateMay 9, 2026
Certificate PolicyMWEcandidateMay 9, 2026
Certificate revocation listMWEcandidateMay 9, 2026
Certificate Status AuthorityMWEcandidateMay 9, 2026
Certificate-Based AuthenticationMWEcandidateMay 9, 2026
Certificate-Related InformationMWEcandidateMay 9, 2026
Certification AnalystMWEcandidateMay 9, 2026
Certification authorityMWEcandidateMay 12, 2026
Certification Authority FacilityMWEcandidateMay 12, 2026
Certification Authority WorkstationMWEcandidateMay 12, 2026
Certification PackageMWEcandidateMay 9, 2026
Certification Practice StatementMWEcandidateMay 9, 2026
Certification Test and EvaluationMWEcandidateMay 12, 2026
Chain of custodyMWEcandidateMay 9, 2026
Chain of EvidenceMWEcandidateMay 9, 2026
Challenge and Reply AuthenticationMWEcandidateMay 9, 2026
Challenge-Response ProtocolMWEcandidateMay 9, 2026
change in technologyMWEcandidateMay 12, 2026
Change managementMWEcandidateMay 9, 2026
change management processMWEcandidateMay 12, 2026
change to applicationMWEcandidateMay 9, 2026
Check 21 ActMWEcandidateMay 9, 2026
Check ClearingMWEcandidateMay 12, 2026
Check ImageMWEcandidateMay 9, 2026
Check TruncationMWEcandidateMay 9, 2026
Check WordMWEcandidateMay 12, 2026
Checklist ReviewMWEcandidateMay 9, 2026
Chief Information OfficerMWEcandidateMay 12, 2026
Chief Information Security OfficerMWEcandidateMay 9, 2026
Chief Security OfficerMWEcandidateMay 9, 2026
CIP exceptional circumstanceMWEcandidateMay 12, 2026
CIP Senior ManagerMWEcandidateMay 12, 2026
Cipher SuiteMWEcandidateMay 9, 2026
Cipher Text Auto-KeyMWEcandidateMay 9, 2026
Ciphertext/Cipher TextMWEcandidateMay 12, 2026
Circuit Switched NetworkMWEcandidateMay 12, 2026
Classified InformationMWEcandidateMay 9, 2026
Classified Information SpillageMWEcandidateMay 9, 2026
Clear TextMWEcandidateMay 12, 2026
Clearing CorporationMWEcandidateMay 12, 2026
Clearing House AssociationsMWEcandidateMay 9, 2026
Client ApplicationMWEcandidateMay 9, 2026
Clinger-Cohen Act of 1996MWEcandidateMay 12, 2026
Closed Security EnvironmentMWEcandidateMay 12, 2026
Closed StorageMWEcandidateMay 9, 2026
Cloud computingMWEcandidateMay 9, 2026
Cloud storageMWEcandidateMay 12, 2026
Code BookMWEcandidateMay 12, 2026
Code GroupMWEcandidateMay 12, 2026
Code VocabularyMWEcandidateMay 12, 2026
coding standardMWEcandidateMay 12, 2026
Cognitive AutomationMWEcandidateMay 13, 2026
Cognitive ComputingMWEcandidateMay 13, 2026
Cold SiteMWEcandidateMay 12, 2026
Cold StartMWEcandidateMay 9, 2026
Collect & OperateMWEcandidateMay 12, 2026
Collection OperatioMWEcandidateMay 9, 2026
Command AuthorityMWEcandidateMay 12, 2026
Commercial off-the-shelf (COTS)MWEcandidateMay 9, 2026
Commercially ReasonableMWEcandidateMay 9, 2026
Commodity ServiceMWEcandidateMay 12, 2026
Common Access CardMWEcandidateMay 9, 2026
Common CarrierMWEcandidateMay 12, 2026
Common Configuration EnumerationMWEcandidateMay 12, 2026
Common Configuration Scoring SystemMWEcandidateMay 12, 2026
Common ControlMWEcandidateMay 8, 2026
Common Control ProviderMWEcandidateMay 8, 2026
Common CriteriaMWEcandidateMay 8, 2026
Common Fill DeviceMWEcandidateMay 8, 2026
Common Gateway InterfaceMWEcandidateMay 8, 2026
Common Misuse Scoring SystemMWEcandidateMay 8, 2026
Common Platform EnumerationMWEcandidateMay 12, 2026
Common Vulnerabilities and ExposuresMWEcandidateMay 12, 2026
Common Vulnerability Scoring SystemMWEcandidateMay 12, 2026
communication channelMWEcandidateMay 12, 2026
communication systemMWEcandidateMay 8, 2026
Communications CoverMWEcandidateMay 12, 2026
Communications DeceptionMWEcandidateMay 12, 2026
Communications ProfileMWEcandidateMay 8, 2026
Communications SecurityMWEcandidateMay 8, 2026
Community of InterestMWEcandidateMay 12, 2026
Community RiskMWEcandidateMay 8, 2026
Compartmented ModeMWEcandidateMay 8, 2026
compensating controlMWEcandidateMay 8, 2026
Compensating Security ControlMWEcandidateMay 8, 2026
Competitive IntelligenceMWEcandidateMay 12, 2026
completion dateMWEcandidateMay 9, 2026
Compliance documentsMWEcandidateMay 9, 2026
Compliance Enforcement AuthorityMWEcandidateMay 12, 2026
compliance planMWEcandidateMay 9, 2026
compliance policyMWEcandidateMay 9, 2026
compliance procedureMWEcandidateMay 9, 2026
compliance programMWEcandidateMay 9, 2026
compliance requirementMWEcandidateMay 12, 2026
compliance riskMWEcandidateMay 9, 2026
compliance violation is detectedMWEcandidateMay 9, 2026
Component Test/ExerciseMWEcandidateMay 12, 2026
Comprehensive TestingMWEcandidateMay 12, 2026
Compromising EmanationsMWEcandidateMay 9, 2026
Computer AbuseMWEcandidateMay 9, 2026
Computer CryptographyMWEcandidateMay 9, 2026
Computer emergency response teamMWEcandidateMay 9, 2026
Computer forensicsMWEcandidateMay 12, 2026
Computer Incident Response TeamMWEcandidateMay 9, 2026
Computer NetworkMWEcandidateMay 9, 2026
Computer Network AttackMWEcandidateMay 9, 2026
computer network defenseMWEcandidateMay 12, 2026
Computer Network Defense AnalysisMWEcandidateMay 9, 2026
Computer Network ExploitationMWEcandidateMay 9, 2026
Computer Network OperationsMWEcandidateMay 9, 2026
computer operationMWEcandidateMay 9, 2026
computer portMWEcandidateMay 12, 2026
computer roomMWEcandidateMay 9, 2026
Computer SecurityMWEcandidateMay 9, 2026
Computer Security ObjectMWEcandidateMay 9, 2026
Computer Security Objects RegisterMWEcandidateMay 9, 2026
Computer Security SubsystemMWEcandidateMay 9, 2026
Computer VisionMWEcandidateMay 13, 2026
Computing EnvironmentMWEcandidateMay 9, 2026
COMSEC AccountMWEcandidateMay 9, 2026
COMSEC Account AuditMWEcandidateMay 9, 2026
COMSEC AidMWEcandidateMay 9, 2026
COMSEC AssemblyMWEcandidateMay 9, 2026
COMSEC BoundaryMWEcandidateMay 9, 2026
COMSEC Chip SetMWEcandidateMay 9, 2026
COMSEC Control ProgramMWEcandidateMay 9, 2026
COMSEC CustodianMWEcandidateMay 9, 2026
COMSEC DemilitarizationMWEcandidateMay 9, 2026
COMSEC ElementMWEcandidateMay 9, 2026
COMSEC End-itemMWEcandidateMay 9, 2026
COMSEC EquipmentMWEcandidateMay 9, 2026
COMSEC FacilityMWEcandidateMay 9, 2026
COMSEC IncidentMWEcandidateMay 9, 2026
COMSEC InsecurityMWEcandidateMay 9, 2026
COMSEC ManagerMWEcandidateMay 9, 2026
COMSEC MaterialMWEcandidateMay 9, 2026
COMSEC Material Control SystemMWEcandidateMay 9, 2026
COMSEC ModuleMWEcandidateMay 9, 2026
COMSEC MonitoringMWEcandidateMay 9, 2026
COMSEC ProfileMWEcandidateMay 9, 2026
COMSEC SurveyMWEcandidateMay 9, 2026
COMSEC System DataMWEcandidateMay 9, 2026
COMSEC TrainingMWEcandidateMay 9, 2026
Concept DriftMWEcandidateMay 13, 2026
confidential dataMWEcandidateMay 12, 2026
configuration change control processMWEcandidateMay 12, 2026
configuration change managementMWEcandidateMay 9, 2026
Configuration ControlMWEcandidateMay 12, 2026
Configuration Control BoardMWEcandidateMay 9, 2026
Configuration managementMWEcandidateMay 9, 2026
configure a systemMWEcandidateMay 12, 2026
conform toMWEcandidateMay 9, 2026
Confusion MatrixMWEcandidateMay 13, 2026
Connectivity TestingMWEcandidateMay 12, 2026
Constituent SystemMWEcandidateMay 13, 2026
Construct ValidityMWEcandidateMay 13, 2026
Consumer AccountMWEcandidateMay 9, 2026
Consumer informationMWEcandidateMay 9, 2026
contact informationMWEcandidateMay 9, 2026
Content filteringMWEcandidateMay 9, 2026
Content ValidityMWEcandidateMay 13, 2026
Contextual LearningMWEcandidateMay 13, 2026
Contingency KeyMWEcandidateMay 9, 2026
Contingency PlanMWEcandidateMay 9, 2026
Contingency PlanningMWEcandidateMay 12, 2026
Continuity of GovernmentMWEcandidateMay 9, 2026
Continuity of Operations PlanMWEcandidateMay 12, 2026
continuity planMWEcandidateMay 9, 2026
continuity requirementMWEcandidateMay 9, 2026
Continuous MonitoringMWEcandidateMay 12, 2026
contract terminationMWEcandidateMay 12, 2026
contractual obligationMWEcandidateMay 12, 2026
contractual protectionMWEcandidateMay 12, 2026
contractual requirementMWEcandidateMay 12, 2026
control and monitorMWEcandidateMay 11, 2026
Control ClassMWEcandidateMay 13, 2026
Control InformationMWEcandidateMay 12, 2026
Control requirementsMWEcandidateMay 9, 2026
Control self-assessmentMWEcandidateMay 9, 2026
Controlled Access AreaMWEcandidateMay 9, 2026
Controlled Access ProtectionMWEcandidateMay 9, 2026
Controlled AreaMWEcandidateMay 9, 2026
Controlled Cryptographic ItemMWEcandidateMay 9, 2026
Controlled InterfaceMWEcandidateMay 9, 2026
Controlled SpaceMWEcandidateMay 12, 2026
Controlling AuthorityMWEcandidateMay 9, 2026
Conversion planMWEcandidateMay 12, 2026
Cooperative Key GenerationMWEcandidateMay 12, 2026
Cooperative Remote RekeyingMWEcandidateMay 12, 2026
Core firmMWEcandidateMay 9, 2026
Corpus (corpora)MWEcandidateMay 13, 2026
corrective actionMWEcandidateMay 9, 2026
Corrective controlMWEcandidateMay 12, 2026
Correctness ProofMWEcandidateMay 9, 2026
Correspondent BankMWEcandidateMay 9, 2026
Cost Benefit AnalysisMWEcandidateMay 9, 2026
Counterfactual ExplanationMWEcandidateMay 13, 2026
Counterfactual FairnessMWEcandidateMay 13, 2026
Courtesy amount recognition (CAR)MWEcandidateMay 12, 2026
Covered EntityMWEcandidateMay 12, 2026
Covert ChannelMWEcandidateMay 12, 2026
Covert Channel AnalysisMWEcandidateMay 9, 2026
Covert Storage ChannelMWEcandidateMay 9, 2026
Covert TestingMWEcandidateMay 12, 2026
Covert Timing ChannelMWEcandidateMay 12, 2026
create and maintainMWEcandidateMay 9, 2026
Credential Service ProviderMWEcandidateMay 12, 2026
Credit CardMWEcandidateMay 9, 2026
Credit EntryMWEcandidateMay 9, 2026
credit policyMWEcandidateMay 12, 2026
criminal records checkMWEcandidateMay 9, 2026
Crisis managementMWEcandidateMay 9, 2026
Crisis Management Test/ExerciseMWEcandidateMay 12, 2026
Criterion ValidityMWEcandidateMay 13, 2026
critical business functionMWEcandidateMay 9, 2026
critical business processMWEcandidateMay 9, 2026
critical employeeMWEcandidateMay 12, 2026
Critical Financial MarketsMWEcandidateMay 12, 2026
critical functionMWEcandidateMay 9, 2026
Critical infrastructureMWEcandidateMay 9, 2026
Critical Market ParticipantsMWEcandidateMay 9, 2026
critical operationsMWEcandidateMay 9, 2026
Critical PathMWEcandidateMay 12, 2026
Critical Security ParameterMWEcandidateMay 9, 2026
critical serviceMWEcandidateMay 12, 2026
critical systemMWEcandidateMay 9, 2026
Critical system (infrastructure)MWEcandidateMay 12, 2026
critical third partyMWEcandidateMay 12, 2026
Criticality analysisMWEcandidateMay 12, 2026
Criticality LevelMWEcandidateMay 9, 2026
Cross Site ScriptingMWEcandidateMay 12, 2026
Cross-Domain CapabilitiesMWEcandidateMay 12, 2026
Cross-Domain SolutionMWEcandidateMay 9, 2026
Cross-Market TestsMWEcandidateMay 9, 2026
Crossover CableMWEcandidateMay 12, 2026
Crypto OfficerMWEcandidateMay 12, 2026
Cryptographic AlarmMWEcandidateMay 9, 2026
cryptographic algorithmMWEcandidateMay 9, 2026
Cryptographic Algorithm or HashMWEcandidateMay 9, 2026
Cryptographic Ancillary EquipmentMWEcandidateMay 9, 2026
Cryptographic BindingMWEcandidateMay 9, 2026
Cryptographic BoundaryMWEcandidateMay 9, 2026
Cryptographic ComponentMWEcandidateMay 12, 2026
Cryptographic EquipmentMWEcandidateMay 9, 2026
Cryptographic Hash FunctionMWEcandidateMay 9, 2026
Cryptographic Ignition KeyMWEcandidateMay 9, 2026
Cryptographic InitializationMWEcandidateMay 9, 2026
Cryptographic KeyMWEcandidateMay 9, 2026
Cryptographic LogicMWEcandidateMay 12, 2026
Cryptographic MaterialMWEcandidateMay 9, 2026
Cryptographic ModuleMWEcandidateMay 12, 2026
Cryptographic NetMWEcandidateMay 9, 2026
Cryptographic PeriodMWEcandidateMay 12, 2026
Cryptographic ProductMWEcandidateMay 9, 2026
Cryptographic RandomizationMWEcandidateMay 9, 2026
Cryptographic SecurityMWEcandidateMay 12, 2026
Cryptographic StrengthMWEcandidateMay 12, 2026
Cryptographic SynchronizationMWEcandidateMay 12, 2026
Cryptographic SystemMWEcandidateMay 12, 2026
Cryptographic System AnalysisMWEcandidateMay 9, 2026
Cryptographic System EvaluationMWEcandidateMay 9, 2026
Cryptographic System ReviewMWEcandidateMay 9, 2026
Cryptographic System SurveyMWEcandidateMay 12, 2026
Cryptographic TokenMWEcandidateMay 9, 2026
Currency BalanceMWEcandidateMay 9, 2026
Custom redirect serviceMWEcandidateMay 12, 2026
custom softwareMWEcandidateMay 12, 2026
customer accessMWEcandidateMay 12, 2026
customer accountMWEcandidateMay 9, 2026
customer data privacyMWEcandidateMay 9, 2026
customer educational materialMWEcandidateMay 12, 2026
customer informationMWEcandidateMay 9, 2026
customer information systemMWEcandidateMay 9, 2026
Customer ServiceMWEcandidateMay 12, 2026
cyber assetMWEcandidateMay 9, 2026
Cyber AttackMWEcandidateMay 12, 2026
cyber ecosystemMWEcandidateMay 12, 2026
cyber eventMWEcandidateMay 9, 2026
cyber exerciseMWEcandidateMay 12, 2026
cyber governanceMWEcandidateMay 9, 2026
cyber incidentMWEcandidateMay 9, 2026
cyber incident response planMWEcandidateMay 12, 2026
cyber incident response procedureMWEcandidateMay 9, 2026
cyber infrastructureMWEcandidateMay 12, 2026
cyber maturity modelMWEcandidateMay 9, 2026
Cyber OperationsMWEcandidateMay 12, 2026
Cyber Operations PlanningMWEcandidateMay 9, 2026
cyber resilienceMWEcandidateMay 12, 2026
cyber resilience frameworkMWEcandidateMay 9, 2026
cyber resilience strategyMWEcandidateMay 12, 2026
cyber riskMWEcandidateMay 12, 2026
cyber risk managementMWEcandidateMay 9, 2026
cyber risk profileMWEcandidateMay 9, 2026
cyber risk toleranceMWEcandidateMay 12, 2026
cyber system recovery planMWEcandidateMay 12, 2026
cyber threatMWEcandidateMay 12, 2026
cyber threat intelligenceMWEcandidateMay 12, 2026
cyber threat response strategyMWEcandidateMay 12, 2026
cybersecurity activityMWEcandidateMay 12, 2026
Cybersecurity architectureMWEcandidateMay 9, 2026
cybersecurity awarenessMWEcandidateMay 12, 2026
Cybersecurity CategoryMWEcandidateMay 9, 2026
cybersecurity controlMWEcandidateMay 9, 2026
cybersecurity eventMWEcandidateMay 9, 2026
Cybersecurity Framework CoreMWEcandidateMay 12, 2026
cybersecurity functionMWEcandidateMay 9, 2026
cybersecurity incident responseMWEcandidateMay 12, 2026
Cybersecurity outcomeMWEcandidateMay 12, 2026
cybersecurity patchMWEcandidateMay 9, 2026
cybersecurity personnelMWEcandidateMay 9, 2026
cybersecurity planMWEcandidateMay 9, 2026
cybersecurity policyMWEcandidateMay 12, 2026
cybersecurity procedureMWEcandidateMay 9, 2026
Cybersecurity ProfileMWEcandidateMay 12, 2026
cybersecurity programMWEcandidateMay 12, 2026
cybersecurity requirementMWEcandidateMay 12, 2026
cybersecurity riskMWEcandidateMay 12, 2026
cybersecurity risk managementMWEcandidateMay 12, 2026
Cybersecurity SubcategoryMWEcandidateMay 12, 2026
cybersecurity trainingMWEcandidateMay 12, 2026
cybersecurity updateMWEcandidateMay 12, 2026
cybersecurity vulnerabilityMWEcandidateMay 9, 2026
Cyclic Redundancy CheckMWEcandidateMay 9, 2026
Cyclical Redundancy CheckMWEcandidateMay 9, 2026
Dark PatternMWEcandidateMay 13, 2026
Data AdministrationMWEcandidateMay 9, 2026
data aggregationMWEcandidateMay 9, 2026
Data AnalyticsMWEcandidateMay 13, 2026
Data AssetMWEcandidateMay 9, 2026
data backupMWEcandidateMay 9, 2026
data breachMWEcandidateMay 12, 2026
Data centerMWEcandidateMay 9, 2026
data classificationMWEcandidateMay 9, 2026
Data classification programMWEcandidateMay 9, 2026
Data CleaningMWEcandidateMay 13, 2026
data controlMWEcandidateMay 12, 2026
Data corruptionMWEcandidateMay 12, 2026
Data custodianMWEcandidateMay 9, 2026
Data DredgingMWEcandidateMay 13, 2026
Data DriftMWEcandidateMay 13, 2026
Data ElementMWEcandidateMay 9, 2026
data encryptionMWEcandidateMay 9, 2026
Data Encryption AlgorithmMWEcandidateMay 12, 2026
Data Encryption StandardMWEcandidateMay 12, 2026
Data FabricMWEcandidateMay 13, 2026
data flowMWEcandidateMay 9, 2026
Data Flow ControlMWEcandidateMay 9, 2026
data flow diagramMWEcandidateMay 12, 2026
Data FusionMWEcandidateMay 13, 2026
data governanceMWEcandidateMay 12, 2026
data inputMWEcandidateMay 9, 2026
data integrityMWEcandidateMay 9, 2026
Data leakageMWEcandidateMay 12, 2026
data lossMWEcandidateMay 12, 2026
data loss preventionMWEcandidateMay 9, 2026
Data loss prevention (DLP) programMWEcandidateMay 12, 2026
data miningMWEcandidateMay 9, 2026
Data mirroringMWEcandidateMay 9, 2026
Data Origin AuthenticationMWEcandidateMay 9, 2026
Data ownerMWEcandidateMay 9, 2026
Data PointMWEcandidateMay 13, 2026
data preparationMWEcandidateMay 9, 2026
data processing serviceMWEcandidateMay 9, 2026
Data ProxyMWEcandidateMay 13, 2026
Data QualityMWEcandidateMay 13, 2026
data recoveryMWEcandidateMay 12, 2026
Data replicationMWEcandidateMay 12, 2026
Data retentionMWEcandidateMay 9, 2026
Data ScienceMWEcandidateMay 13, 2026
Data ScientistMWEcandidateMay 13, 2026
Data SecurityMWEcandidateMay 9, 2026
Data SeedingMWEcandidateMay 13, 2026
data storage mediaMWEcandidateMay 12, 2026
Data synchronizationMWEcandidateMay 12, 2026
data theftMWEcandidateMay 12, 2026
Data Transfer DeviceMWEcandidateMay 9, 2026
Data WarehousingMWEcandidateMay 9, 2026
Data WranglingMWEcandidateMay 13, 2026
date and timeMWEcandidateMay 9, 2026
Day ZeroMWEcandidateMay 9, 2026
Daylight overdraftMWEcandidateMay 12, 2026
Debit cardMWEcandidateMay 9, 2026
Debit entryMWEcandidateMay 12, 2026
Decision PointMWEcandidateMay 13, 2026
Decision Support SystemMWEcandidateMay 13, 2026
Decision TreeMWEcandidateMay 13, 2026
decision-making roleMWEcandidateMay 9, 2026
Decryption keyMWEcandidateMay 9, 2026
Dedicated ModeMWEcandidateMay 9, 2026
Deductive AnalyticsMWEcandidateMay 13, 2026
Deep LearningMWEcandidateMay 13, 2026
Deep packet inspectionMWEcandidateMay 9, 2026
Default ClassificationMWEcandidateMay 9, 2026
default passwordMWEcandidateMay 9, 2026
defence in depthMWEcandidateMay 9, 2026
Defense in depthMWEcandidateMay 9, 2026
Deferred net settlementMWEcandidateMay 12, 2026
Delegated Development ProgramMWEcandidateMay 9, 2026
delegation procedureMWEcandidateMay 9, 2026
Deleted FileMWEcandidateMay 12, 2026
Demilitarized zoneMWEcandidateMay 12, 2026
Demilitarized zone (DMZ)MWEcandidateMay 9, 2026
denial of serviceMWEcandidateMay 9, 2026
Denial-of-service attackMWEcandidateMay 9, 2026
Depository bankMWEcandidateMay 9, 2026
Depository bank (Check 21)MWEcandidateMay 12, 2026
Descriptive AnalyticsMWEcandidateMay 13, 2026
Descriptive Top-Level SpecificationMWEcandidateMay 12, 2026
design and implementMWEcandidateMay 11, 2026
Designated Approval AuthorityMWEcandidateMay 9, 2026
destruction of dataMWEcandidateMay 9, 2026
Detect FunctionMWEcandidateMay 9, 2026
Detection deviceMWEcandidateMay 9, 2026
detective activityMWEcandidateMay 9, 2026
Detective controlMWEcandidateMay 9, 2026
Deterministic AlgorithmMWEcandidateMay 13, 2026
Deterministic Random Bit GeneratorMWEcandidateMay 12, 2026
develop and implementMWEcandidateMay 11, 2026
development environmentMWEcandidateMay 12, 2026
Device Distribution ProfileMWEcandidateMay 9, 2026
device managementMWEcandidateMay 9, 2026
Device Registration ManagerMWEcandidateMay 9, 2026
Diagnostic AnalyticsMWEcandidateMay 13, 2026
Dial BackMWEcandidateMay 9, 2026
dial-up connectivityMWEcandidateMay 9, 2026
Dictionary AttackMWEcandidateMay 9, 2026
Differential Power AnalysisMWEcandidateMay 9, 2026
Differential PrivacyMWEcandidateMay 13, 2026
Differential ValidityMWEcandidateMay 13, 2026
Digest AuthenticationMWEcandidateMay 9, 2026
Digital certificateMWEcandidateMay 9, 2026
Digital EnvelopeMWEcandidateMay 12, 2026
Digital EvidenceMWEcandidateMay 12, 2026
Digital forensicsMWEcandidateMay 12, 2026
Digital LaborMWEcandidateMay 13, 2026
digital rights managementMWEcandidateMay 9, 2026
Digital signatureMWEcandidateMay 12, 2026
Digital Signature AlgorithmMWEcandidateMay 9, 2026
Digital Signature StandardMWEcandidateMay 9, 2026
Digital subscriber line (DSL)MWEcandidateMay 9, 2026
Digital WorkforceMWEcandidateMay 13, 2026
Dimension ReductionMWEcandidateMay 13, 2026
Direct data feedMWEcandidateMay 12, 2026
Direct debitMWEcandidateMay 9, 2026
Direct depositMWEcandidateMay 9, 2026
Direct presentmentMWEcandidateMay 9, 2026
Direct ShipmentMWEcandidateMay 9, 2026
Disaster recoveryMWEcandidateMay 9, 2026
Disaster recovery exerciseMWEcandidateMay 12, 2026
Disaster recovery planMWEcandidateMay 9, 2026
Discretionary access controlMWEcandidateMay 9, 2026
Disk ImagingMWEcandidateMay 12, 2026
Disk shadowingMWEcandidateMay 12, 2026
Disparate ImpactMWEcandidateMay 13, 2026
Disparate TreatmentMWEcandidateMay 13, 2026
dispose ofMWEcandidateMay 12, 2026
Distance VectorMWEcandidateMay 9, 2026
Distinguished NameMWEcandidateMay 12, 2026
Distinguishing IdentifierMWEcandidateMay 9, 2026
distributed denial of serviceMWEcandidateMay 12, 2026
Distributed environmentMWEcandidateMay 9, 2026
Distributed ScansMWEcandidateMay 9, 2026
Distributional RobustnessMWEcandidateMay 13, 2026
Domain ExpertiseMWEcandidateMay 13, 2026
Domain HijackingMWEcandidateMay 9, 2026
Domain NameMWEcandidateMay 12, 2026
Domain name systemMWEcandidateMay 9, 2026
Domain ShiftMWEcandidateMay 13, 2026
Drinking Your Own ChampagneMWEcandidateMay 13, 2026
Drop AccountabilityMWEcandidateMay 9, 2026
Dual controlMWEcandidateMay 12, 2026
Dual-Use CertificateMWEcandidateMay 9, 2026
Due careMWEcandidateMay 12, 2026
due diligenceMWEcandidateMay 12, 2026
due diligence processMWEcandidateMay 9, 2026
Dumpster DivingMWEcandidateMay 9, 2026
Duplicate Digital EvidenceMWEcandidateMay 9, 2026
dynamic attack surfaceMWEcandidateMay 9, 2026
Dynamic Link LibraryMWEcandidateMay 9, 2026
Dynamic portsMWEcandidateMay 12, 2026
Dynamic ProcessMWEcandidateMay 13, 2026
Dynamic Routing ProtocolMWEcandidateMay 12, 2026
Dynamic SubsystemMWEcandidateMay 12, 2026
E-mail serverMWEcandidateMay 9, 2026
Easter EggMWEcandidateMay 9, 2026
Eavesdropping AttackMWEcandidateMay 12, 2026
Echo ReplyMWEcandidateMay 9, 2026
Echo RequestMWEcandidateMay 12, 2026
Edge CaseMWEcandidateMay 13, 2026
Education and TrainingMWEcandidateMay 9, 2026
Education Information SecurityMWEcandidateMay 9, 2026
Egress FilteringMWEcandidateMay 9, 2026
electronic accessMWEcandidateMay 12, 2026
electronic access controlMWEcandidateMay 9, 2026
Electronic Access PointMWEcandidateMay 12, 2026
Electronic AuthenticationMWEcandidateMay 9, 2026
Electronic Benefits Transfer (EBT)MWEcandidateMay 9, 2026
Electronic BusinessMWEcandidateMay 12, 2026
Electronic check conversionMWEcandidateMay 9, 2026
Electronic check presentment (ECP)MWEcandidateMay 9, 2026
Electronic commerce (E-Commerce)MWEcandidateMay 9, 2026
Electronic CredentialsMWEcandidateMay 12, 2026
Electronic data capture (EDC)MWEcandidateMay 9, 2026
Electronic EvidenceMWEcandidateMay 12, 2026
electronic funds transferMWEcandidateMay 9, 2026
Electronic funds transfer (EFT)MWEcandidateMay 9, 2026
electronic funds transfer activityMWEcandidateMay 9, 2026
electronic funds transfer functionMWEcandidateMay 12, 2026
Electronic Key EntryMWEcandidateMay 12, 2026
Electronic Key Management SystemMWEcandidateMay 9, 2026
Electronic Messaging ServicesMWEcandidateMay 9, 2026
Electronic Security PerimeterMWEcandidateMay 12, 2026
electronic signatureMWEcandidateMay 9, 2026
Electronic vaultingMWEcandidateMay 12, 2026
Electronically Generated KeyMWEcandidateMay 9, 2026
elevated accessMWEcandidateMay 12, 2026
Elliptical curve cryptographyMWEcandidateMay 9, 2026
Emanations AnalysisMWEcandidateMay 12, 2026
Emanations SecurityMWEcandidateMay 9, 2026
Embedded ComputerMWEcandidateMay 9, 2026
Embedded Cryptographic SystemMWEcandidateMay 12, 2026
Embedded CryptographyMWEcandidateMay 9, 2026
Emergency planMWEcandidateMay 12, 2026
emerging issueMWEcandidateMay 9, 2026
employee accessMWEcandidateMay 9, 2026
Encapsulation security payloadMWEcandidateMay 9, 2026
Enclave BoundaryMWEcandidateMay 12, 2026
encrypted connectionMWEcandidateMay 12, 2026
Encrypted KeyMWEcandidateMay 12, 2026
Encrypted NetworkMWEcandidateMay 12, 2026
Encryption algorithmMWEcandidateMay 9, 2026
Encryption CertificateMWEcandidateMay 9, 2026
Encryption keyMWEcandidateMay 9, 2026
End Cryptographic UnitMWEcandidateMay 9, 2026
End EventMWEcandidateMay 13, 2026
End userMWEcandidateMay 9, 2026
End-Item AccountingMWEcandidateMay 9, 2026
End-point securityMWEcandidateMay 12, 2026
End-to-End EncryptionMWEcandidateMay 9, 2026
End-to-end process flowMWEcandidateMay 12, 2026
End-to-end recoverabilityMWEcandidateMay 12, 2026
End-to-End SecurityMWEcandidateMay 9, 2026
Engagement LetterMWEcandidateMay 9, 2026
Enrollment ManagerMWEcandidateMay 9, 2026
enter dataMWEverifiedMay 11, 2026
Enterprise ArchitectureMWEcandidateMay 9, 2026
enterprise risk managementMWEcandidateMay 9, 2026
Enterprise ServiceMWEcandidateMay 9, 2026
entrance of a visitorMWEcandidateMay 12, 2026
entry pointMWEcandidateMay 9, 2026
Environment of OperationMWEcandidateMay 12, 2026
environmental controlMWEcandidateMay 9, 2026
Ephemeral KeyMWEcandidateMay 12, 2026
Ephemeral PortMWEcandidateMay 9, 2026
Equality of OddsMWEcandidateMay 13, 2026
Equality of OpportunityMWEcandidateMay 13, 2026
Error Detection CodeMWEcandidateMay 9, 2026
Error PropagationMWEcandidateMay 13, 2026
Escrow PasswordsMWEcandidateMay 12, 2026
establish and implementMWEcandidateMay 11, 2026
establish and maintainMWEcandidateMay 11, 2026
Ethics by DesignMWEcandidateMay 13, 2026
Evaluation Assurance LevelMWEcandidateMay 12, 2026
Evaluation Products ListMWEcandidateMay 12, 2026
event dataMWEcandidateMay 9, 2026
event informationMWEcandidateMay 9, 2026
event logMWEcandidateMay 9, 2026
event loggingMWEcandidateMay 9, 2026
Exculpatory EvidenceMWEcandidateMay 12, 2026
execution statusMWEcandidateMay 9, 2026
Executive AgencyMWEcandidateMay 9, 2026
Exercise KeyMWEcandidateMay 9, 2026
existing controlMWEcandidateMay 9, 2026
Expected OutputMWEcandidateMay 12, 2026
experiment withMWEverifiedMay 11, 2026
Expert SystemMWEcandidateMay 13, 2026
Exploit CodeMWEcandidateMay 12, 2026
Exploitable ChannelMWEcandidateMay 12, 2026
Exploitation AnalysisMWEcandidateMay 9, 2026
Exponential Backoff AlgorithmMWEcandidateMay 12, 2026
Exposure limitMWEcandidateMay 12, 2026
Extended ACLsMWEcandidateMay 9, 2026
Extensible Authentication ProtocolMWEcandidateMay 12, 2026
Extensible Markup Language (XML)MWEcandidateMay 9, 2026
Exterior Gateway ProtocolMWEcandidateMay 9, 2026
external auditorMWEcandidateMay 9, 2026
external communicationMWEcandidateMay 12, 2026
external connectionMWEcandidateMay 9, 2026
external connectivityMWEcandidateMay 9, 2026
external information systemMWEcandidateMay 9, 2026
External Information System ServiceMWEcandidateMay 12, 2026
External NetworkMWEcandidateMay 12, 2026
external requirementMWEcandidateMay 9, 2026
external routable connectivityMWEcandidateMay 9, 2026
External Security TestingMWEcandidateMay 12, 2026
external service providerMWEcandidateMay 12, 2026
external userMWEcandidateMay 9, 2026
External ValidityMWEcandidateMay 13, 2026
Extraction ResistanceMWEcandidateMay 9, 2026
Facial Recognition (FR)MWEcandidateMay 13, 2026
Fail SafeMWEcandidateMay 9, 2026
Fail SoftMWEcandidateMay 9, 2026
Failure AccessMWEcandidateMay 12, 2026
Failure ControlMWEcandidateMay 9, 2026
Fairness MetricMWEcandidateMay 13, 2026
False AcceptanceMWEcandidateMay 9, 2026
False Acceptance RateMWEcandidateMay 9, 2026
False NegativeMWEcandidateMay 13, 2026
False PositiveMWEcandidateMay 9, 2026
False RejectionMWEcandidateMay 12, 2026
False Rejection RateMWEcandidateMay 9, 2026
False RejectsMWEcandidateMay 9, 2026
Fast File SystemMWEcandidateMay 9, 2026
Fast FluxMWEcandidateMay 12, 2026
Fault Line AttacksMWEcandidateMay 12, 2026
Fault ToleranceMWEcandidateMay 13, 2026
Favorable LabelMWEcandidateMay 13, 2026
Feature ExtractionMWEcandidateMay 13, 2026
Feature ImportanceMWEcandidateMay 13, 2026
Feature ShiftMWEcandidateMay 13, 2026
Federal Enterprise ArchitectureMWEcandidateMay 12, 2026
Federal Information SystemMWEcandidateMay 9, 2026
Federal Reserve BanksMWEcandidateMay 12, 2026
federal securities lawMWEcandidateMay 9, 2026
Federated LearningMWEcandidateMay 13, 2026
Fedwire Funds ServiceMWEcandidateMay 12, 2026
Fedwire Securities ServiceMWEcandidateMay 12, 2026
Feedback LoopMWEcandidateMay 13, 2026
Fibre channelMWEcandidateMay 9, 2026
figure outMWEverifiedMay 11, 2026
File EncryptionMWEcandidateMay 9, 2026
File Name AnomalyMWEcandidateMay 9, 2026
File ProtectionMWEcandidateMay 9, 2026
File SecurityMWEcandidateMay 9, 2026
File Transfer ProtocolMWEcandidateMay 9, 2026
File transfer protocol (FTP)MWEcandidateMay 9, 2026
Fill DeviceMWEcandidateMay 9, 2026
Filtering RouterMWEcandidateMay 9, 2026
FIN (Financial Application)MWEcandidateMay 9, 2026
Financial AuthorityMWEcandidateMay 9, 2026
financial conditionMWEcandidateMay 12, 2026
Financial EDI (FEDI)MWEcandidateMay 9, 2026
Financial industry participantsMWEcandidateMay 9, 2026
financial institutionMWEcandidateMay 9, 2026
financial market infrastructureMWEcandidateMay 12, 2026
financial transactionMWEcandidateMay 9, 2026
FIPS PUBMWEcandidateMay 12, 2026
FIPS-Approved Security MethodMWEcandidateMay 9, 2026
FIPS-Validated CryptographyMWEcandidateMay 9, 2026
Firewall Control ProxyMWEcandidateMay 9, 2026
firewall ruleMWEcandidateMay 9, 2026
Fixed COMSEC FacilityMWEcandidateMay 9, 2026
Flaw Hypothesis MethodologyMWEcandidateMay 9, 2026
Focused TestingMWEcandidateMay 12, 2026
Forensic CopyMWEcandidateMay 12, 2026
Forensic examinationMWEcandidateMay 12, 2026
forensic investigationMWEcandidateMay 9, 2026
forensic readinessMWEcandidateMay 12, 2026
Forensic SpecialistMWEcandidateMay 9, 2026
Forensically CleanMWEcandidateMay 9, 2026
Fork BombMWEcandidateMay 9, 2026
Form-Based AuthenticationMWEcandidateMay 9, 2026
Formal Access ApprovalMWEcandidateMay 9, 2026
formal contractMWEcandidateMay 9, 2026
Formal Development MethodologyMWEcandidateMay 9, 2026
Formal MethodMWEcandidateMay 9, 2026
Formal ProofMWEcandidateMay 9, 2026
Formal Security PolicyMWEcandidateMay 9, 2026
Formatting FunctionMWEcandidateMay 9, 2026
Forward CipherMWEcandidateMay 12, 2026
Forward LookupMWEcandidateMay 12, 2026
Forward ProxyMWEcandidateMay 9, 2026
Fragment OffsetMWEcandidateMay 12, 2026
Fragment Overlap AttackMWEcandidateMay 9, 2026
Frame relayMWEcandidateMay 9, 2026
Fraud DetectionMWEcandidateMay 13, 2026
Frequency HoppingMWEcandidateMay 12, 2026
Full Disk EncryptionMWEcandidateMay 12, 2026
Full DuplexMWEcandidateMay 12, 2026
Full MaintenanceMWEcandidateMay 9, 2026
Fully AutonomousMWEcandidateMay 13, 2026
Fully-Qualified Domain NameMWEcandidateMay 9, 2026
Functional drill/parallel testMWEcandidateMay 12, 2026
Functional requirementsMWEcandidateMay 12, 2026
Functional TestingMWEcandidateMay 9, 2026
Functionality testingMWEcandidateMay 9, 2026
funds transfer terminalMWEcandidateMay 9, 2026
Gap analysisMWEcandidateMay 12, 2026
Gateway serverMWEcandidateMay 9, 2026
general controlMWEcandidateMay 9, 2026
General Support SystemMWEcandidateMay 12, 2026
Generative Adversarial Network (gan)MWEcandidateMay 13, 2026
give exampleMWEverifiedMay 11, 2026
give examples ofMWEverifiedMay 11, 2026
Global Information GridMWEcandidateMay 9, 2026
Global Information InfrastructureMWEcandidateMay 9, 2026
governance structureMWEcandidateMay 9, 2026
government agencyMWEcandidateMay 9, 2026
government bodyMWEcandidateMay 9, 2026
Graduated SecurityMWEcandidateMay 9, 2026
Gramm-Leach-Bliley Act (GLBA)MWEcandidateMay 9, 2026
grant accessMWEcandidateMay 11, 2026
grant access to the systemMWEcandidateMay 12, 2026
Graphical Processing Unit (gpu)MWEcandidateMay 13, 2026
Ground TruthMWEcandidateMay 13, 2026
Group AuthenticatorMWEcandidateMay 9, 2026
Group FairnessMWEcandidateMay 13, 2026
Guessing EntropyMWEcandidateMay 12, 2026
Handshaking ProceduresMWEcandidateMay 12, 2026
Hard Copy KeyMWEcandidateMay 9, 2026
hardware integrityMWEcandidateMay 9, 2026
Hardwired KeyMWEcandidateMay 9, 2026
Harmful BiasMWEcandidateMay 13, 2026
Hash functionMWEcandidateMay 9, 2026
Hash totalMWEcandidateMay 9, 2026
hash valueMWEcandidateMay 12, 2026
Health Information ExchangeMWEcandidateMay 9, 2026
help fileMWEcandidateMay 12, 2026
High Assurance GuardMWEcandidateMay 12, 2026
High AvailabilityMWEcandidateMay 12, 2026
High ImpactMWEcandidateMay 12, 2026
High-Impact SystemMWEcandidateMay 9, 2026
Hijack AttackMWEcandidateMay 9, 2026
Homing beaconsMWEcandidateMay 12, 2026
Honey ClientMWEcandidateMay 12, 2026
Horizontal defense-in depthMWEcandidateMay 9, 2026
Host bus adapter (HBA)MWEcandidateMay 9, 2026
Host-Based IDMWEcandidateMay 12, 2026
Hot SiteMWEcandidateMay 12, 2026
Hot WashMWEcandidateMay 9, 2026
HTTP ProxyMWEcandidateMay 9, 2026
Human firewallMWEcandidateMay 9, 2026
human resources processMWEcandidateMay 9, 2026
Human SubjectsMWEcandidateMay 13, 2026
Human System Integration (hsi)MWEcandidateMay 13, 2026
Human-Cognitive BiasMWEcandidateMay 13, 2026
Human-Computer Interaction (hci)MWEcandidateMay 13, 2026
Human-Enabled Machine LearningMWEcandidateMay 13, 2026
Human-Machine Teaming (HMT)MWEcandidateMay 13, 2026
Hybrid AttackMWEcandidateMay 9, 2026
Hybrid EncryptionMWEcandidateMay 9, 2026
Hybrid Security ControlMWEcandidateMay 9, 2026
Hypertext Markup LanguageMWEcandidateMay 12, 2026
Hypertext Markup Language (HTML)MWEcandidateMay 12, 2026
Hypertext Transfer ProtocolMWEcandidateMay 12, 2026
Hypertext Transfer Protocol SecureMWEcandidateMay 9, 2026
Hypothesis TestingMWEcandidateMay 13, 2026
I/O (Acronym)MWEcandidateMay 9, 2026
IA ArchitectureMWEcandidateMay 12, 2026
IA InfrastructureMWEcandidateMay 12, 2026
IA ProductMWEcandidateMay 12, 2026
IA-Enabled ProductMWEcandidateMay 9, 2026
ICT supply chain threatMWEcandidateMay 9, 2026
Identification and AuthenticationMWEcandidateMay 12, 2026
identified riskMWEcandidateMay 12, 2026
identify and defineMWEcandidateMay 11, 2026
identify and documentMWEcandidateMay 12, 2026
Identify FunctionMWEcandidateMay 9, 2026
identity and access managementMWEcandidateMay 12, 2026
Identity BindingMWEcandidateMay 9, 2026
identity managementMWEcandidateMay 9, 2026
Identity ProofingMWEcandidateMay 9, 2026
Identity RegistrationMWEcandidateMay 9, 2026
Identity TokenMWEcandidateMay 9, 2026
Identity ValidationMWEcandidateMay 9, 2026
Identity VerificationMWEcandidateMay 12, 2026
Identity-Based Access ControlMWEcandidateMay 9, 2026
Identity-Based Security PolicyMWEcandidateMay 9, 2026
IEEE 802.11MWEcandidateMay 12, 2026
Image archive (Check 21)MWEcandidateMay 9, 2026
Image capture (Check 21)MWEcandidateMay 12, 2026
Image exchange (Check 21)MWEcandidateMay 9, 2026
Imitative Communications DeceptionMWEcandidateMay 12, 2026
Impact analysisMWEcandidateMay 12, 2026
Impact AssessmentMWEcandidateMay 13, 2026
Impact LevelMWEcandidateMay 9, 2026
Impact ValueMWEcandidateMay 9, 2026
Implementation planMWEcandidateMay 12, 2026
in order toMWEcandidateMay 12, 2026
in response toMWEcandidateMay 12, 2026
In SilicoMWEcandidateMay 13, 2026
in-house developed applicationMWEcandidateMay 12, 2026
In-Processing AlgorithmMWEcandidateMay 13, 2026
Inadvertent DisclosureMWEcandidateMay 12, 2026
incident alertMWEcandidateMay 9, 2026
incident alert thresholdMWEcandidateMay 9, 2026
incident containment processMWEcandidateMay 9, 2026
incident detectionMWEcandidateMay 9, 2026
Incident HandlingMWEcandidateMay 12, 2026
incident managemeMWEcandidateMay 9, 2026
incident managementMWEcandidateMay 9, 2026
incident management procedureMWEcandidateMay 9, 2026
incident management processMWEcandidateMay 12, 2026
Incident Management SystemMWEcandidateMay 12, 2026
incident monitoring processMWEcandidateMay 9, 2026
incident monitoring programMWEcandidateMay 9, 2026
Incident ReportMWEcandidateMay 12, 2026
incident reportingMWEcandidateMay 9, 2026
incident responseMWEcandidateMay 9, 2026
incident response activityMWEcandidateMay 9, 2026
incident response personnelMWEcandidateMay 12, 2026
Incident response planMWEcandidateMay 12, 2026
incident response planningMWEcandidateMay 9, 2026
incident response policyMWEcandidateMay 12, 2026
incident response processMWEcandidateMay 9, 2026
incident response programMWEcandidateMay 12, 2026
incoming debit and credit totalMWEcandidateMay 12, 2026
Incomplete Parameter CheckingMWEcandidateMay 9, 2026
Incremental BackupsMWEcandidateMay 9, 2026
Inculpatory EvidenceMWEcandidateMay 12, 2026
Indemnifying bank (Check 21)MWEcandidateMay 12, 2026
independence standardsMWEcandidateMay 9, 2026
independent reviewMWEcandidateMay 9, 2026
Independent sales organizationMWEcandidateMay 12, 2026
Independent Validation AuthorityMWEcandidateMay 9, 2026
individual accountMWEcandidateMay 9, 2026
Individual AccountabilityMWEcandidateMay 9, 2026
Individual FairnessMWEcandidateMay 13, 2026
Industrial Control SystMWEcandidateMay 9, 2026
Industrial Control SystemMWEcandidateMay 9, 2026
industry sectorMWEcandidateMay 12, 2026
industry standardMWEcandidateMay 12, 2026
Industry testingMWEcandidateMay 9, 2026
Inference AttackMWEcandidateMay 9, 2026
Informal Security PolicyMWEcandidateMay 9, 2026
information assetMWEcandidateMay 9, 2026
information assuranceMWEcandidateMay 9, 2026
Information Assurance CompliancMWEcandidateMay 9, 2026
Information Assurance ComponentMWEcandidateMay 12, 2026
Information Assurance ProfessionalMWEcandidateMay 9, 2026
Information DomainMWEcandidateMay 9, 2026
Information EnvironmentMWEcandidateMay 9, 2026
information flowMWEcandidateMay 9, 2026
Information Flow ControlMWEcandidateMay 9, 2026
Information Input ComponentMWEcandidateMay 13, 2026
Information ManagementMWEcandidateMay 9, 2026
information needMWEcandidateMay 9, 2026
Information OperationsMWEcandidateMay 9, 2026
Information OwnerMWEcandidateMay 9, 2026
Information ResourcesMWEcandidateMay 9, 2026
Information Resources ManagementMWEcandidateMay 12, 2026
Information SecurityMWEcandidateMay 12, 2026
Information Security ArchitectMWEcandidateMay 9, 2026
Information Security ArchitectureMWEcandidateMay 12, 2026
Information Security AwarenessMWEcandidateMay 9, 2026
information security controlMWEcandidateMay 9, 2026
information security eventMWEcandidateMay 12, 2026
information security incidentMWEcandidateMay 9, 2026
information security policyMWEcandidateMay 9, 2026
information security procedureMWEcandidateMay 8, 2026
information security processMWEcandidateMay 8, 2026
information security programMWEcandidateMay 8, 2026
Information Security Program PlanMWEcandidateMay 9, 2026
Information Security riskMWEcandidateMay 12, 2026
information security strategyMWEcandidateMay 12, 2026
information security threatMWEcandidateMay 12, 2026
information security trainingMWEcandidateMay 12, 2026
information sharingMWEcandidateMay 9, 2026
Information Sharing EnvironmentMWEcandidateMay 9, 2026
information sharing forumMWEcandidateMay 9, 2026
Information StewardMWEcandidateMay 9, 2026
Information SystemMWEcandidateMay 12, 2026
information system componentMWEcandidateMay 12, 2026
Information System Life CycleMWEcandidateMay 12, 2026
Information System OwnerMWEcandidateMay 9, 2026
information system resilienceMWEcandidateMay 12, 2026
Information Systems SecurityMWEcandidateMay 12, 2026
information technologyMWEcandidateMay 12, 2026
Information Technology auditMWEcandidateMay 12, 2026
Information Technology controlMWEcandidateMay 12, 2026
Information Technology operationMWEcandidateMay 12, 2026
Information Technology riskMWEcandidateMay 9, 2026
Information Technology serviceMWEcandidateMay 12, 2026
information technology supplierMWEcandidateMay 12, 2026
Information Technology systemMWEcandidateMay 12, 2026
Information TypeMWEcandidateMay 12, 2026
Information ValueMWEcandidateMay 9, 2026
Information WarfareMWEcandidateMay 9, 2026
Informative ReferenceMWEcandidateMay 12, 2026
Infrastructure as a ServiceMWEcandidateMay 12, 2026
Ingress FilteringMWEcandidateMay 12, 2026
Inherent riskMWEcandidateMay 9, 2026
Initialization VectorMWEcandidateMay 12, 2026
Input Validation AttacksMWEcandidateMay 9, 2026
Inside ThreatMWEcandidateMay 9, 2026
inside( r) threatMWEcandidateMay 9, 2026
Insider AttackMWEcandidateMay 13, 2026
Inspectable SpaceMWEcandidateMay 9, 2026
Instance WeightMWEcandidateMay 13, 2026
insurance coverageMWEcandidateMay 9, 2026
insurance riderMWEcandidateMay 9, 2026
Intangible assetMWEcandidateMay 9, 2026
integrated risk managementMWEcandidateMay 9, 2026
Integrated test/exerciseMWEcandidateMay 12, 2026
integrity check mechanismMWEcandidateMay 9, 2026
Integrity Check ValueMWEcandidateMay 9, 2026
Integrity Star PropertyMWEcandidateMay 9, 2026
intellectual propertyMWEcandidateMay 9, 2026
Intelligent Process AutomationMWEcandidateMay 13, 2026
interactive remote accessMWEcandidateMay 12, 2026
interactive user accessMWEcandidateMay 12, 2026
Interbank checksMWEcandidateMay 12, 2026
Interchange feesMWEcandidateMay 12, 2026
Interconnection Security AgreementMWEcandidateMay 9, 2026
interested personnelMWEcandidateMay 9, 2026
Interface Control DocumentMWEcandidateMay 9, 2026
Interim Approval to OperateMWEcandidateMay 9, 2026
Interim Approval to TestMWEcandidateMay 9, 2026
intermediate systemMWEcandidateMay 9, 2026
Internal "trusted" zoneMWEcandidateMay 12, 2026
internal auditMWEcandidateMay 9, 2026
internal audit functionMWEcandidateMay 12, 2026
internal audit managerMWEcandidateMay 9, 2026
internal audit programMWEcandidateMay 9, 2026
internal audit reportMWEcandidateMay 12, 2026
internal auditorMWEcandidateMay 9, 2026
internal communicationMWEcandidateMay 12, 2026
internal controlMWEcandidateMay 12, 2026
Internal NetworkMWEcandidateMay 12, 2026
internal processMWEcandidateMay 9, 2026
internal risk managementMWEcandidateMay 12, 2026
Internal Security ControlsMWEcandidateMay 9, 2026
Internal Security TestingMWEcandidateMay 9, 2026
internal systemMWEcandidateMay 9, 2026
Internal ValidityMWEcandidateMay 13, 2026
internet accessMWEcandidateMay 12, 2026
Internet Assigned Numbers AuthorityMWEcandidateMay 12, 2026
Internet Control Message ProtocolMWEcandidateMay 9, 2026
Internet Engineering Task ForceMWEcandidateMay 12, 2026
Internet Message Access ProtocolMWEcandidateMay 12, 2026
Internet protocolMWEcandidateMay 9, 2026
Internet protocol (IP)MWEcandidateMay 9, 2026
Internet Protocol SecurityMWEcandidateMay 9, 2026
Internet service providerMWEcandidateMay 12, 2026
Internet service provider (ISP)MWEcandidateMay 9, 2026
Internet StandardMWEcandidateMay 12, 2026
Interpretable ModelMWEcandidateMay 13, 2026
Intrusion detectionMWEcandidateMay 9, 2026
Intrusion detection systemMWEcandidateMay 12, 2026
Intrusion detection system (IDS)MWEcandidateMay 9, 2026
Intrusion preventionMWEcandidateMay 9, 2026
Intrusion prevention systemMWEcandidateMay 12, 2026
Intrusion prevention systems (IPS)MWEcandidateMay 12, 2026
Inverse CipherMWEcandidateMay 12, 2026
IP addressMWEcandidateMay 9, 2026
IP Authentication HeaderMWEcandidateMay 12, 2026
IP FloodMWEcandidateMay 9, 2026
IP ForwardingMWEcandidateMay 12, 2026
IP SecurityMWEcandidateMay 9, 2026
IP SpoofingMWEcandidateMay 12, 2026
IPv6 (Acronym)MWEcandidateMay 9, 2026
ISAC (Acronym)MWEcandidateMay 9, 2026
Issue-Specific PolicyMWEcandidateMay 9, 2026
IT architectureMWEcandidateMay 9, 2026
IT governanceMWEcandidateMay 9, 2026
IT Security ArchitectureMWEcandidateMay 12, 2026
IT Security AwarenessMWEcandidateMay 9, 2026
IT Security EducationMWEcandidateMay 9, 2026
IT Security InvestmentMWEcandidateMay 9, 2026
IT Security MetricsMWEcandidateMay 12, 2026
IT Security PolicyMWEcandidateMay 9, 2026
IT Security TrainingMWEcandidateMay 9, 2026
IT strategic planMWEcandidateMay 9, 2026
IT system inventoryMWEcandidateMay 9, 2026
IT-Related RiskMWEcandidateMay 9, 2026
job responsibilityMWEcandidateMay 9, 2026
Joint AuthorizationMWEcandidateMay 9, 2026
Jump BagMWEcandidateMay 9, 2026
Kernel modeMWEcandidateMay 9, 2026
Key BundleMWEcandidateMay 9, 2026
key controlMWEcandidateMay 12, 2026
Key Distribution CenterMWEcandidateMay 9, 2026
Key EscrowMWEcandidateMay 9, 2026
Key Escrow SystemMWEcandidateMay 9, 2026
Key EstablishmentMWEcandidateMay 9, 2026
Key ExchangeMWEcandidateMay 9, 2026
Key ExpansionMWEcandidateMay 12, 2026
Key fobMWEcandidateMay 9, 2026
Key Generation MaterialMWEcandidateMay 9, 2026
Key lengthMWEcandidateMay 9, 2026
Key ListMWEcandidateMay 9, 2026
Key LoaderMWEcandidateMay 9, 2026
Key LoggerMWEcandidateMay 9, 2026
Key ManagementMWEcandidateMay 9, 2026
Key Management DeviceMWEcandidateMay 12, 2026
Key Management InfrastructureMWEcandidateMay 9, 2026
key pairMWEcandidateMay 9, 2026
Key Production KeyMWEcandidateMay 9, 2026
Key RecoveryMWEcandidateMay 12, 2026
key resourceMWEcandidateMay 9, 2026
Key risk indicatorMWEcandidateMay 9, 2026
Key StreamMWEcandidateMay 9, 2026
Key TagMWEcandidateMay 12, 2026
Key TapeMWEcandidateMay 9, 2026
Key TransportMWEcandidateMay 9, 2026
Key UpdatingMWEcandidateMay 12, 2026
Key WrapMWEcandidateMay 12, 2026
Keying MaterialMWEcandidateMay 12, 2026
Keystroke MonitoringMWEcandidateMay 12, 2026
KMI Operating AccountMWEcandidateMay 9, 2026
KMI Protected ChannelMWEcandidateMay 9, 2026
KMI-Aware DeviceMWEcandidateMay 9, 2026
Knowledge ManagementMWEcandidateMay 12, 2026
KOA AgentMWEcandidateMay 9, 2026
KOA ManagerMWEcandidateMay 9, 2026
KOA Registration ManagerMWEcandidateMay 12, 2026
Label ShiftMWEcandidateMay 13, 2026
Labeled Security ProtectionsMWEcandidateMay 12, 2026
Laboratory AttackMWEcandidateMay 9, 2026
LAN (Acronym)MWEcandidateMay 12, 2026
Language ModelMWEcandidateMay 13, 2026
Large Language Model (LLM)MWEcandidateMay 13, 2026
Large value funds transfer systemMWEcandidateMay 12, 2026
Lattice TechniquesMWEcandidateMay 9, 2026
Law EnforcementMWEcandidateMay 12, 2026
law enforcement authorityMWEcandidateMay 9, 2026
lay outMWEverifiedMay 11, 2026
Layer 2 Forwarding ProtocolMWEcandidateMay 9, 2026
Layer 2 switchesMWEcandidateMay 9, 2026
Layer 2 Tunneling ProtocolMWEcandidateMay 12, 2026
Layer 3 and 4 switchesMWEcandidateMay 12, 2026
Layer 4-7 switchesMWEcandidateMay 9, 2026
layered protectionMWEcandidateMay 9, 2026
least functionality principleMWEcandidateMay 9, 2026
least privilegeMWEcandidateMay 12, 2026
Least TrustMWEcandidateMay 9, 2026
Legacy systemMWEcandidateMay 9, 2026
Legal Advice and AdvocacyMWEcandidateMay 9, 2026
Legal amount recognition (LAR)MWEcandidateMay 9, 2026
legal staffMWEcandidateMay 9, 2026
lessons learnedMWEcandidateMay 12, 2026
Level of ConcernMWEcandidateMay 12, 2026
Level of ProtectionMWEcandidateMay 9, 2026
Life-cycle processMWEcandidateMay 9, 2026
Likelihood of OccurrenceMWEcandidateMay 12, 2026
Limited MaintenanceMWEcandidateMay 9, 2026
Line ConditioningMWEcandidateMay 9, 2026
Line ConductionMWEcandidateMay 12, 2026
Line of BusinessMWEcandidateMay 9, 2026
Linear ModelMWEcandidateMay 13, 2026
Link EncryptionMWEcandidateMay 9, 2026
Link StateMWEcandidateMay 9, 2026
List Based Access ControlMWEcandidateMay 12, 2026
live CDMWEcandidateMay 12, 2026
Loadable Kernel ModulesMWEcandidateMay 9, 2026
Local AccessMWEcandidateMay 9, 2026
Local area networkMWEcandidateMay 9, 2026
Local AuthorityMWEcandidateMay 12, 2026
Local Registration AuthorityMWEcandidateMay 9, 2026
locally mounted hardwareMWEcandidateMay 12, 2026
Log ClippingMWEcandidateMay 9, 2026
log managementMWEcandidateMay 9, 2026
logging operationMWEcandidateMay 9, 2026
Logic BombMWEcandidateMay 12, 2026
Logic GateMWEcandidateMay 12, 2026
logical accessMWEcandidateMay 9, 2026
Logical access controlsMWEcandidateMay 9, 2026
Logical Completeness MeasureMWEcandidateMay 9, 2026
logical controlMWEcandidateMay 9, 2026
Logical PerimeterMWEcandidateMay 9, 2026
logical securityMWEcandidateMay 9, 2026
login attemptMWEcandidateMay 9, 2026
Logistic ModelMWEcandidateMay 13, 2026
Long positionMWEcandidateMay 12, 2026
Long TitleMWEcandidateMay 9, 2026
Loopback AddressMWEcandidateMay 12, 2026
Low ImpactMWEcandidateMay 9, 2026
Low Probability of DetectionMWEcandidateMay 12, 2026
Low Probability of InterceptMWEcandidateMay 12, 2026
Low-Impact SystemMWEcandidateMay 12, 2026
MAC AddressMWEcandidateMay 9, 2026
MAC headerMWEcandidateMay 12, 2026
Machine LearningMWEcandidateMay 13, 2026
machine learning and evolutionMWEcandidateMay 9, 2026
Machine ObservationMWEcandidateMay 13, 2026
macro virusMWEcandidateMay 9, 2026
Magnetic RemanenceMWEcandidateMay 9, 2026
Mail relay serverMWEcandidateMay 9, 2026
Maintenance HookMWEcandidateMay 12, 2026
Maintenance KeyMWEcandidateMay 9, 2026
Major ApplicationMWEcandidateMay 9, 2026
Major Information SystemMWEcandidateMay 9, 2026
make availableMWEcandidateMay 11, 2026
make upMWEverifiedMay 11, 2026
make use ofMWEverifiedMay 11, 2026
malicious actMWEcandidateMay 12, 2026
malicious activityMWEcandidateMay 9, 2026
malicious appletMWEcandidateMay 9, 2026
malicious codeMWEcandidateMay 12, 2026
Malicious Code PreventionMWEcandidateMay 9, 2026
malicious logicMWEcandidateMay 12, 2026
Man-in-the-middle attackMWEcandidateMay 9, 2026
management authorizationMWEcandidateMay 9, 2026
Management ClientMWEcandidateMay 9, 2026
Management ControlsMWEcandidateMay 9, 2026
management functionMWEcandidateMay 12, 2026
Management information systems (MIS)MWEcandidateMay 12, 2026
Management Security ControlsMWEcandidateMay 12, 2026
management structureMWEcandidateMay 9, 2026
Mandatory access controlMWEcandidateMay 9, 2026
Mandatory ModificationMWEcandidateMay 9, 2026
Manual CryptosystemMWEcandidateMay 9, 2026
Manual Key TransportMWEcandidateMay 9, 2026
Manual Remote RekeyingMWEcandidateMay 9, 2026
Market-wide testsMWEcandidateMay 12, 2026
Masquerade AttackMWEcandidateMay 9, 2026
Master Cryptographic Ignition KeyMWEcandidateMay 9, 2026
Matched instructionsMWEcandidateMay 12, 2026
material changeMWEcandidateMay 9, 2026
Maximum Tolerable DowntimeMWEcandidateMay 12, 2026
Mcnamara FallacyMWEcandidateMay 13, 2026
Measurement MethodMWEcandidateMay 13, 2026
Measurement ModelMWEcandidateMay 13, 2026
Measures of EffectivenessMWEcandidateMay 9, 2026
Media access controlMWEcandidateMay 9, 2026
Media SanitizationMWEcandidateMay 9, 2026
Membership InferenceMWEcandidateMay 13, 2026
Memory ScavengingMWEcandidateMay 9, 2026
Merchant acquirerMWEcandidateMay 9, 2026
Merchant processingMWEcandidateMay 9, 2026
Message authentication codeMWEcandidateMay 9, 2026
Message digestMWEcandidateMay 9, 2026
Message digest algorithmMWEcandidateMay 9, 2026
Message ExternalsMWEcandidateMay 12, 2026
Message IndicatorMWEcandidateMay 9, 2026
Metropolitan area networkMWEcandidateMay 12, 2026
Microwave technologyMWEcandidateMay 12, 2026
mind mapMWEverifiedMay 11, 2026
Miniature fragment attackMWEcandidateMay 12, 2026
Minimalist CryptographyMWEcandidateMay 9, 2026
Minimum password lengthMWEcandidateMay 9, 2026
Minor ApplicationMWEcandidateMay 12, 2026
Mirrored siteMWEcandidateMay 12, 2026
Misnamed FilesMWEcandidateMay 9, 2026
missing security updateMWEcandidateMay 12, 2026
Mission Assurance CategoryMWEcandidateMay 9, 2026
Mission CriticalMWEcandidateMay 9, 2026
Mission/Business SegmentMWEcandidateMay 9, 2026
mitigation actionMWEcandidateMay 9, 2026
Mixed MethodsMWEcandidateMay 13, 2026
mobile codeMWEcandidateMay 12, 2026
Mobile Code TechnologiesMWEcandidateMay 12, 2026
mobile deviceMWEcandidateMay 12, 2026
Mobile financial servicesMWEcandidateMay 9, 2026
Mobile siteMWEcandidateMay 12, 2026
Mobile Software AgentMWEcandidateMay 9, 2026
Mode of OperationMWEcandidateMay 9, 2026
Model AssertionMWEcandidateMay 13, 2026
Model CardMWEcandidateMay 13, 2026
Model DebuggingMWEcandidateMay 13, 2026
Model DecayMWEcandidateMay 13, 2026
Model EditingMWEcandidateMay 13, 2026
Model ExtractionMWEcandidateMay 13, 2026
Model GovernanceMWEcandidateMay 13, 2026
Model InventoryMWEcandidateMay 13, 2026
Model OverlayMWEcandidateMay 13, 2026
Model Risk ManagementMWEcandidateMay 13, 2026
Model SuiteMWEcandidateMay 13, 2026
Model TrainingMWEcandidateMay 13, 2026
Model ValidationMWEcandidateMay 13, 2026
Moderate ImpactMWEcandidateMay 12, 2026
Moderate-Impact SystemMWEcandidateMay 9, 2026
Module test/exerciseMWEcandidateMay 12, 2026
monitor and reviewMWEcandidateMay 11, 2026
Monitoring policyMWEcandidateMay 9, 2026
monitoring procedureMWEcandidateMay 9, 2026
Moral AgencyMWEcandidateMay 13, 2026
Moral PatiencyMWEcandidateMay 13, 2026
Morris WormMWEcandidateMay 9, 2026
moving target defenseMWEcandidateMay 9, 2026
Multi-factor authenticationMWEcandidateMay 12, 2026
Multi-Hop ProblemMWEcandidateMay 9, 2026
Multilevel DeviceMWEcandidateMay 9, 2026
Multilevel ModeMWEcandidateMay 9, 2026
Multilevel SecurityMWEcandidateMay 12, 2026
Multiple Security LevelsMWEcandidateMay 12, 2026
multiple sourcesMWEcandidateMay 9, 2026
Mutual AuthenticationMWEcandidateMay 9, 2026
Mutual SuspicionMWEcandidateMay 9, 2026
Naive BayesMWEcandidateMay 13, 2026
Naming AuthorityMWEcandidateMay 9, 2026
National Security InformationMWEcandidateMay 9, 2026
National Security SystemMWEcandidateMay 9, 2026
National Settlement Service (NSS)MWEcandidateMay 12, 2026
National Vulnerability DatabaseMWEcandidateMay 12, 2026
Natural DisasterMWEcandidateMay 12, 2026
Natural Language ProcessingMWEcandidateMay 13, 2026
need to knowMWEcandidateMay 12, 2026
Need To Know DeterminationMWEcandidateMay 9, 2026
negative effectMWEcandidateMay 12, 2026
Net debit capMWEcandidateMay 9, 2026
Net-centric ArchitectureMWEcandidateMay 12, 2026
Network AccessMWEcandidateMay 9, 2026
Network Access ControlMWEcandidateMay 9, 2026
network activity baselineMWEcandidateMay 12, 2026
Network address translationMWEcandidateMay 12, 2026
Network administratorMWEcandidateMay 9, 2026
Network attached storage (NAS)MWEcandidateMay 12, 2026
Network basic input/output systemMWEcandidateMay 9, 2026
network diagramMWEcandidateMay 12, 2026
Network Front-EndMWEcandidateMay 9, 2026
network integrityMWEcandidateMay 9, 2026
Network interface cardMWEcandidateMay 9, 2026
network mappingMWEcandidateMay 11, 2026
Network news transfer protocolMWEcandidateMay 9, 2026
network portMWEcandidateMay 9, 2026
network resilienceMWEcandidateMay 9, 2026
network securityMWEcandidateMay 9, 2026
Network segmentationMWEcandidateMay 9, 2026
network segregationMWEcandidateMay 9, 2026
Network ServicesMWEcandidateMay 9, 2026
Network SniffingMWEcandidateMay 9, 2026
Network SponsorMWEcandidateMay 9, 2026
Network SystemMWEcandidateMay 9, 2026
Network TapsMWEcandidateMay 9, 2026
Network traffic analysisMWEcandidateMay 9, 2026
Network WeavingMWEcandidateMay 9, 2026
Network-Based IDSMWEcandidateMay 9, 2026
Neural NetworkMWEcandidateMay 13, 2026
No-Lone ZoneMWEcandidateMay 9, 2026
non-compliance informationMWEcandidateMay 9, 2026
Non-Local MaintenanceMWEcandidateMay 12, 2026
Non-Organizational UserMWEcandidateMay 12, 2026
Non-Printable CharacterMWEcandidateMay 8, 2026
non-production environmentMWEcandidateMay 12, 2026
non-public informationMWEcandidateMay 8, 2026
Non-public personal informationMWEcandidateMay 8, 2026
non-shared user accountMWEcandidateMay 8, 2026
Nonintrusive monitoringMWEcandidateMay 8, 2026
Normal FlowMWEcandidateMay 13, 2026
normal operationMWEcandidateMay 9, 2026
not be necessaryMWEcandidateMay 9, 2026
not possibleMWEcandidateMay 9, 2026
notification procedureMWEcandidateMay 9, 2026
notification requirementMWEcandidateMay 9, 2026
NSA-Approved CryptographyMWEcandidateMay 9, 2026
Null SessionMWEcandidateMay 12, 2026
Object codeMWEcandidateMay 12, 2026
Object IdentifierMWEcandidateMay 12, 2026
Object ProgramMWEcandidateMay 12, 2026
Object ReuseMWEcandidateMay 12, 2026
Objective EvidenceMWEcandidateMay 13, 2026
Off-line AttackMWEcandidateMay 9, 2026
Off-line CryptosystemMWEcandidateMay 12, 2026
Official InformationMWEcandidateMay 9, 2026
Offline LearningMWEcandidateMay 13, 2026
offsite backupMWEcandidateMay 12, 2026
Offsite rotationMWEcandidateMay 9, 2026
On-us checksMWEcandidateMay 9, 2026
One-part CodeMWEcandidateMay 12, 2026
One-time CryptosystemMWEcandidateMay 9, 2026
One-time PadMWEcandidateMay 9, 2026
One-time TapeMWEcandidateMay 9, 2026
One-Way EncryptionMWEcandidateMay 9, 2026
One-Way FunctionMWEcandidateMay 9, 2026
One-Way Hash AlgorithmMWEcandidateMay 9, 2026
Online AttackMWEcandidateMay 12, 2026
Online Certificate Status ProtocolMWEcandidateMay 9, 2026
Online CryptosystemMWEcandidateMay 12, 2026
Online LearningMWEcandidateMay 13, 2026
online terminalMWEcandidateMay 9, 2026
Open Checklist Interactive LanguageMWEcandidateMay 12, 2026
Open market operationsMWEcandidateMay 12, 2026
Open Shortest Path FirstMWEcandidateMay 12, 2026
Open StorageMWEcandidateMay 9, 2026
Open Systems InterconnectMWEcandidateMay 12, 2026
Open Systems InterconnectionMWEcandidateMay 12, 2026
Operate & MaintainMWEcandidateMay 9, 2026
operating stateMWEcandidateMay 9, 2026
Operating systemMWEcandidateMay 9, 2026
Operating System FingerprintingMWEcandidateMay 9, 2026
operational controlMWEcandidateMay 9, 2026
operational exercisMWEcandidateMay 9, 2026
operational exerciseMWEcandidateMay 12, 2026
Operational IT planMWEcandidateMay 9, 2026
Operational KeyMWEcandidateMay 9, 2026
operational performance reportMWEcandidateMay 12, 2026
operational resilienceMWEcandidateMay 9, 2026
Operational riskMWEcandidateMay 12, 2026
Operational WaiverMWEcandidateMay 9, 2026
Operations CodeMWEcandidateMay 9, 2026
Operations SecurityMWEcandidateMay 9, 2026
Operations TechnologyMWEcandidateMay 9, 2026
Optional ModificationMWEcandidateMay 9, 2026
Organizational MaintenanceMWEcandidateMay 9, 2026
organizational objectiveMWEcandidateMay 12, 2026
organizational risk toleranceMWEcandidateMay 12, 2026
Organizational UserMWEcandidateMay 12, 2026
origination functionMWEcandidateMay 12, 2026
OSI layersMWEcandidateMay 9, 2026
Outcome measureMWEcandidateMay 9, 2026
Outside ThreatMWEcandidateMay 9, 2026
outside( r) threatMWEcandidateMay 12, 2026
Outsider ThreatMWEcandidateMay 9, 2026
outsourced applicationMWEcandidateMay 12, 2026
outsourcing arrangementMWEcandidateMay 12, 2026
outsourcing contractMWEcandidateMay 12, 2026
Outsourcing Service ContractMWEcandidateMay 12, 2026
Over-The-Air Key DistributionMWEcandidateMay 12, 2026
Over-The-Air Key TransferMWEcandidateMay 12, 2026
Over-The-Air RekeyingMWEcandidateMay 12, 2026
Oversight & DevelopmentMWEcandidateMay 12, 2026
Overt ChannelMWEcandidateMay 12, 2026
Overt TestingMWEcandidateMay 12, 2026
Overwrite ProcedureMWEcandidateMay 9, 2026
Packet FilterMWEcandidateMay 9, 2026
Packet filteringMWEcandidateMay 9, 2026
Packet SnifferMWEcandidateMay 9, 2026
Packet Switched NetworkMWEcandidateMay 12, 2026
Packet switchingMWEcandidateMay 12, 2026
Parent ProcessMWEcandidateMay 13, 2026
Partitioned Security ModeMWEcandidateMay 12, 2026
passive attackMWEcandidateMay 9, 2026
Passive Learning AgentMWEcandidateMay 13, 2026
Passive responseMWEcandidateMay 9, 2026
Passive Security TestingMWEcandidateMay 12, 2026
Passive WiretappingMWEcandidateMay 12, 2026
password attemptMWEcandidateMay 9, 2026
Password Authentication ProtocolMWEcandidateMay 9, 2026
password changeMWEcandidateMay 9, 2026
password complexityMWEcandidateMay 9, 2026
Password crackerMWEcandidateMay 9, 2026
Password CrackingMWEcandidateMay 9, 2026
password parameterMWEcandidateMay 9, 2026
Password ProtectedMWEcandidateMay 9, 2026
Password SniffingMWEcandidateMay 9, 2026
patch logMWEcandidateMay 12, 2026
Patch managementMWEcandidateMay 9, 2026
patch management programMWEcandidateMay 9, 2026
Path HistoriesMWEcandidateMay 12, 2026
Paying bankMWEcandidateMay 9, 2026
payment cardMWEcandidateMay 9, 2026
Payment systemMWEcandidateMay 9, 2026
Payments System Risk Policy (PSR)MWEcandidateMay 12, 2026
Payroll card accountMWEcandidateMay 9, 2026
PCI Security Standards CouncilMWEcandidateMay 12, 2026
Peer Entity AuthenticationMWEcandidateMay 9, 2026
Peer-to-peer (P2P)MWEcandidateMay 12, 2026
pen testMWEcandidateMay 9, 2026
Penetration testMWEcandidateMay 9, 2026
Penetration testingMWEcandidateMay 9, 2026
Per-Call KeyMWEcandidateMay 9, 2026
Performance Reference ModelMWEcandidateMay 12, 2026
performance reviewMWEcandidateMay 12, 2026
period of inactivityMWEcandidateMay 12, 2026
periodic assessmentMWEcandidateMay 9, 2026
Periods ProcessingMWEcandidateMay 9, 2026
Perishable DataMWEcandidateMay 9, 2026
Permanent virtual circuit (PVC)MWEcandidateMay 9, 2026
Person-to-person (P2P) paymentMWEcandidateMay 9, 2026
Personal DataMWEcandidateMay 13, 2026
Personal digital assistant (PDA)MWEcandidateMay 12, 2026
Personal FirewallMWEcandidateMay 9, 2026
Personal identification numberMWEcandidateMay 12, 2026
Personal Identity VerificationMWEcandidateMay 9, 2026
personnel activityMWEcandidateMay 9, 2026
personnel policyMWEcandidateMay 12, 2026
Personnel Registration ManagerMWEcandidateMay 9, 2026
personnel risk assessmentMWEcandidateMay 9, 2026
personnel risk assessment programMWEcandidateMay 12, 2026
physical accessMWEcandidateMay 9, 2026
physical access controlMWEcandidateMay 9, 2026
physical access control systemMWEcandidateMay 9, 2026
physical access logMWEcandidateMay 12, 2026
physical controlMWEcandidateMay 9, 2026
physical environmentMWEcandidateMay 12, 2026
physical securityMWEcandidateMay 12, 2026
physical security controlMWEcandidateMay 9, 2026
physical security perimeterMWEcandidateMay 9, 2026
physical security planMWEcandidateMay 12, 2026
Physically Isolated NetworkMWEcandidateMay 9, 2026
picture graphicallyMWEverifiedMay 11, 2026
PII Confidentiality Impact LevelMWEcandidateMay 9, 2026
Ping of DeathMWEcandidateMay 12, 2026
Ping ScanMWEcandidateMay 9, 2026
Ping SweepMWEcandidateMay 9, 2026
Plain old telephone serviceMWEcandidateMay 12, 2026
Plain old telephone system (POTS)MWEcandidateMay 12, 2026
Plaintext KeyMWEcandidateMay 12, 2026
Plan of Action and MilestonesMWEcandidateMay 9, 2026
Platform as a ServiceMWEcandidateMay 12, 2026
Point Of ContactMWEcandidateMay 9, 2026
point outMWEverifiedMay 11, 2026
Point-of-sale (POS) networkMWEcandidateMay 9, 2026
Point-to-Point ProtocolMWEcandidateMay 9, 2026
Point-to-Point Tunneling ProtocolMWEcandidateMay 9, 2026
Poison ReverseMWEcandidateMay 9, 2026
policies and controlsMWEcandidateMay 12, 2026
policy and procedureMWEcandidateMay 9, 2026
Policy Approving AuthorityMWEcandidateMay 9, 2026
Policy Certification AuthorityMWEcandidateMay 9, 2026
Policy Management AuthorityMWEcandidateMay 12, 2026
Policy MappingMWEcandidateMay 12, 2026
Policy-Based Access ControlMWEcandidateMay 9, 2026
Pop-up boxMWEcandidateMay 12, 2026
port rangeMWEcandidateMay 9, 2026
Port ScanMWEcandidateMay 9, 2026
Port scanningMWEcandidateMay 12, 2026
Portable Electronic DeviceMWEcandidateMay 9, 2026
Positive Control MaterialMWEcandidateMay 9, 2026
Positive payMWEcandidateMay 12, 2026
Post Office Protocol, Version 3MWEcandidateMay 9, 2026
Post-Hoc ExplanationMWEcandidateMay 13, 2026
Post-Processing AlgorithmMWEcandidateMay 13, 2026
potential impactMWEcandidateMay 9, 2026
Practical SignificanceMWEcandidateMay 13, 2026
Practice StatementMWEcandidateMay 12, 2026
Pre-Processing AlgorithmMWEcandidateMay 13, 2026
Prediction ResistanceMWEcandidateMay 12, 2026
Predictive AnalysisMWEcandidateMay 13, 2026
Predictive AnalyticsMWEcandidateMay 13, 2026
Predisposing ConditionMWEcandidateMay 9, 2026
preliminary examinationMWEcandidateMay 12, 2026
Preproduction ModelMWEcandidateMay 12, 2026
Prescriptive AnalyticsMWEcandidateMay 13, 2026
Presentment feeMWEcandidateMay 9, 2026
Pretty Good PrivacyMWEcandidateMay 12, 2026
Preventive controlMWEcandidateMay 9, 2026
previous residenceMWEcandidateMay 9, 2026
Primary Services NodeMWEcandidateMay 12, 2026
Prime numberMWEcandidateMay 12, 2026
Principal Accrediting AuthorityMWEcandidateMay 9, 2026
Principal Certification AuthorityMWEcandidateMay 9, 2026
Principle of least privilegeMWEcandidateMay 12, 2026
Print SuppressionMWEcandidateMay 12, 2026
prior toMWEcandidateMay 12, 2026
Privacy Impact AssessmentMWEcandidateMay 12, 2026
Privacy SystemMWEcandidateMay 12, 2026
Privacy-Enhancing TechnologyMWEcandidateMay 13, 2026
Private AddressingMWEcandidateMay 12, 2026
Private branch exchange (PBX)MWEcandidateMay 12, 2026
private keyMWEcandidateMay 9, 2026
Private key infrastructure (PKI)MWEcandidateMay 9, 2026
Private label cardMWEcandidateMay 9, 2026
Privilege ManagementMWEcandidateMay 12, 2026
Privileged accessMWEcandidateMay 9, 2026
Privileged AccountMWEcandidateMay 12, 2026
Privileged CommandMWEcandidateMay 12, 2026
Privileged ProcessMWEcandidateMay 9, 2026
Privileged Protected AttributeMWEcandidateMay 13, 2026
privileged userMWEcandidateMay 9, 2026
privileged utility programMWEcandidateMay 9, 2026
Process FlowMWEcandidateMay 13, 2026
Processing EnvironmentMWEcandidateMay 13, 2026
processing requirementMWEcandidateMay 9, 2026
Product ManagerMWEcandidateMay 13, 2026
Product OwnerMWEcandidateMay 13, 2026
Product Source NodeMWEcandidateMay 12, 2026
production codeMWEcandidateMay 9, 2026
production environmentMWEcandidateMay 12, 2026
Production ModelMWEcandidateMay 12, 2026
Program InfectorMWEcandidateMay 9, 2026
Program PolicyMWEcandidateMay 9, 2026
Project managementMWEcandidateMay 9, 2026
Promiscuous ModeMWEcandidateMay 12, 2026
Proof of deposit (POD)MWEcandidateMay 12, 2026
Proprietary InformationMWEcandidateMay 9, 2026
Protect & DefendMWEcandidateMay 9, 2026
Protect FunctionMWEcandidateMay 9, 2026
Protected AttributeMWEcandidateMay 13, 2026
Protected ClassMWEcandidateMay 13, 2026
Protected Distribution SystemMWEcandidateMay 9, 2026
Protection PhilosophyMWEcandidateMay 9, 2026
Protection ProfileMWEcandidateMay 12, 2026
Protective Distribution SystemMWEcandidateMay 9, 2026
protective measureMWEcandidateMay 9, 2026
Protective PackagingMWEcandidateMay 9, 2026
Protective TechnologiesMWEcandidateMay 9, 2026
protective technologyMWEcandidateMay 9, 2026
Protocol Data UnitMWEcandidateMay 12, 2026
Protocol EntityMWEcandidateMay 9, 2026
Protocol StacksMWEcandidateMay 9, 2026
provide accessMWEcandidateMay 11, 2026
provide forMWEcandidateMay 9, 2026
Proxy AgentMWEcandidateMay 9, 2026
Proxy serverMWEcandidateMay 9, 2026
Pseudorandom number generatorMWEcandidateMay 9, 2026
Public Domain SoftwareMWEcandidateMay 9, 2026
public keyMWEcandidateMay 9, 2026
Public Key CertificateMWEcandidateMay 9, 2026
public key cryptographyMWEcandidateMay 9, 2026
Public Key EnablingMWEcandidateMay 9, 2026
Public key encryptionMWEcandidateMay 9, 2026
Public key infrastructureMWEcandidateMay 9, 2026
public networkMWEcandidateMay 12, 2026
Public RelationsMWEcandidateMay 9, 2026
Public SeedMWEcandidateMay 9, 2026
Public switched telephone networkMWEcandidateMay 9, 2026
Public-Key Forward SecrecyMWEcandidateMay 12, 2026
qualified personnelMWEcandidateMay 9, 2026
Qualitative AssessmentMWEcandidateMay 9, 2026
Quality AssuranceMWEcandidateMay 12, 2026
Quality of ServiceMWEcandidateMay 12, 2026
Quantitative AssessmentMWEcandidateMay 9, 2026
Race ConditionMWEcandidateMay 9, 2026
Radiation MonitoringMWEcandidateMay 9, 2026
Radio Frequency IdentificationMWEcandidateMay 12, 2026
Random Bit GeneratorMWEcandidateMay 12, 2026
Random Number GeneratorMWEcandidateMay 9, 2026
Read AccessMWEcandidateMay 9, 2026
read-only mediaMWEcandidateMay 9, 2026
Real-time network monitoringMWEcandidateMay 12, 2026
Real-Time ReactionMWEcandidateMay 9, 2026
Recipient Usage PeriodMWEcandidateMay 12, 2026
Reciprocal agreementMWEcandidateMay 12, 2026
Recommendation SystemMWEcandidateMay 13, 2026
Reconverting bank (Check 21)MWEcandidateMay 9, 2026
Records ManagementMWEcandidateMay 9, 2026
records management procedureMWEcandidateMay 9, 2026
Recover FunctionMWEcandidateMay 9, 2026
Recovery actionMWEcandidateMay 9, 2026
recovery planMWEcandidateMay 12, 2026
recovery planningMWEcandidateMay 9, 2026
Recovery point objectiveMWEcandidateMay 12, 2026
Recovery point objective (RPO)MWEcandidateMay 9, 2026
Recovery ProceduresMWEcandidateMay 12, 2026
recovery processMWEcandidateMay 9, 2026
Recovery service levelsMWEcandidateMay 9, 2026
Recovery siteMWEcandidateMay 9, 2026
recovery strategyMWEcandidateMay 12, 2026
Recovery time objectiveMWEcandidateMay 12, 2026
Recovery time objective (RTO)MWEcandidateMay 12, 2026
Recovery vendorsMWEcandidateMay 12, 2026
Red SignalMWEcandidateMay 9, 2026
Red TeamMWEcandidateMay 12, 2026
Red Team exerciseMWEcandidateMay 12, 2026
Red/Black ConceptMWEcandidateMay 9, 2026
Redundant siteMWEcandidateMay 9, 2026
Reference ClassMWEcandidateMay 13, 2026
Reference MonitorMWEcandidateMay 9, 2026
Reflexive ACLsMWEcandidateMay 12, 2026
refrain from performingMWEcandidateMay 11, 2026
Registered portsMWEcandidateMay 9, 2026
Registration authorityMWEcandidateMay 9, 2026
regression analysisMWEcandidateMay 9, 2026
Regulation CCMWEcandidateMay 12, 2026
Regulation EMWEcandidateMay 9, 2026
Regulation ZMWEcandidateMay 9, 2026
regulatory agencyMWEcandidateMay 12, 2026
regulatory guidanceMWEcandidateMay 9, 2026
regulatory noticeMWEcandidateMay 12, 2026
Regulatory requirementsMWEcandidateMay 9, 2026
Reinforcement LearningMWEcandidateMay 13, 2026
rekey a certificateMWEcandidateMay 11, 2026
relate toMWEcandidateMay 9, 2026
Release PrefixMWEcandidateMay 9, 2026
rely uponMWEcandidateMay 9, 2026
Relying PartyMWEcandidateMay 9, 2026
remedial actionMWEcandidateMay 12, 2026
Remediation PlanMWEcandidateMay 12, 2026
Remittance cardsMWEcandidateMay 9, 2026
remote accessMWEcandidateMay 12, 2026
Remote access serviceMWEcandidateMay 9, 2026
Remote control softwareMWEcandidateMay 9, 2026
Remote deletionsMWEcandidateMay 12, 2026
Remote deposit capture (RDC)MWEcandidateMay 9, 2026
Remote Diagnostics/MaintenanceMWEcandidateMay 12, 2026
Remote journalingMWEcandidateMay 9, 2026
remote maintenanceMWEcandidateMay 9, 2026
Remote RekeyingMWEcandidateMay 9, 2026
Remotely created check (RCC)MWEcandidateMay 9, 2026
Removable mediaMWEcandidateMay 9, 2026
removable storage mediaMWEcandidateMay 12, 2026
Renew a certificateMWEcandidateMay 9, 2026
Repair ActionMWEcandidateMay 9, 2026
Replay attackMWEcandidateMay 9, 2026
Report of ExaminationMWEcandidateMay 9, 2026
report onMWEverifiedMay 11, 2026
reportable cyber incidentMWEcandidateMay 9, 2026
reporting requirementMWEcandidateMay 9, 2026
Request for CommentMWEcandidateMay 12, 2026
Reserve accountMWEcandidateMay 12, 2026
Reserve Keying MaterialMWEcandidateMay 9, 2026
Reserve requirementsMWEcandidateMay 9, 2026
Residual riskMWEcandidateMay 9, 2026
resilience by designMWEcandidateMay 9, 2026
Resilience testingMWEcandidateMay 12, 2026
Resource EncapsulationMWEcandidateMay 9, 2026
Resource ExhaustionMWEcandidateMay 9, 2026
Respond FunctionMWEcandidateMay 9, 2026
response activityMWEcandidateMay 9, 2026
response and recovery strategyMWEcandidateMay 9, 2026
response planMWEcandidateMay 12, 2026
response teamMWEcandidateMay 12, 2026
Responsibility to ProvideMWEcandidateMay 12, 2026
Responsible AiMWEcandidateMay 13, 2026
responsible entityMWEcandidateMay 12, 2026
Responsible IndividualMWEcandidateMay 8, 2026
restoration operationMWEcandidateMay 8, 2026
Restricted DataMWEcandidateMay 9, 2026
Retail paymentsMWEcandidateMay 9, 2026
Retention LimitMWEcandidateMay 13, 2026
Retention requirementMWEcandidateMay 9, 2026
Return (ACH)MWEcandidateMay 9, 2026
Return on investmentMWEcandidateMay 12, 2026
Return-oriented attacksMWEcandidateMay 9, 2026
Reverse EngineeringMWEcandidateMay 12, 2026
Reverse LookupMWEcandidateMay 12, 2026
Reverse ProxyMWEcandidateMay 9, 2026
review and approveMWEcandidateMay 12, 2026
review and testMWEcandidateMay 11, 2026
review and updateMWEcandidateMay 11, 2026
revoke a certificateMWEcandidateMay 11, 2026
Risk acceptanceMWEcandidateMay 12, 2026
risk analysisMWEcandidateMay 12, 2026
risk assessmentMWEcandidateMay 12, 2026
Risk Assessment MethodologyMWEcandidateMay 9, 2026
Risk Assessment ReportMWEcandidateMay 12, 2026
Risk AssessorMWEcandidateMay 9, 2026
Risk AverseMWEcandidateMay 9, 2026
Risk avoidanceMWEcandidateMay 9, 2026
Risk ControlMWEcandidateMay 13, 2026
risk decisionMWEcandidateMay 12, 2026
Risk ExecutiveMWEcandidateMay 9, 2026
Risk Executive FunctionMWEcandidateMay 12, 2026
risk exposureMWEcandidateMay 12, 2026
risk factorMWEcandidateMay 9, 2026
Risk identificationMWEcandidateMay 9, 2026
risk levelMWEcandidateMay 9, 2026
Risk managementMWEcandidateMay 9, 2026
risk management controlMWEcandidateMay 9, 2026
Risk Management FrameworkMWEcandidateMay 12, 2026
risk management practiceMWEcandidateMay 9, 2026
risk management processMWEcandidateMay 12, 2026
risk management programMWEcandidateMay 9, 2026
risk management strategyMWEcandidateMay 9, 2026
Risk measurementMWEcandidateMay 12, 2026
Risk mitigationMWEcandidateMay 12, 2026
Risk Mitigation PlanMWEcandidateMay 9, 2026
Risk ModelMWEcandidateMay 12, 2026
Risk MonitoringMWEcandidateMay 9, 2026
risk monitoring systemMWEcandidateMay 11, 2026
Risk ProfileMWEcandidateMay 12, 2026
Risk reductionMWEcandidateMay 9, 2026
risk responseMWEcandidateMay 12, 2026
Risk Response MeasureMWEcandidateMay 9, 2026
Risk toleranceMWEcandidateMay 9, 2026
Risk transferMWEcandidateMay 9, 2026
Risk treatmentMWEcandidateMay 9, 2026
Risk-Adaptable Access ControlMWEcandidateMay 9, 2026
risk-based approachMWEcandidateMay 12, 2026
risk-based auditingMWEcandidateMay 9, 2026
risk-based authenticationMWEcandidateMay 12, 2026
risk-based data managementMWEcandidateMay 9, 2026
Robotic Desktop Automation (rda)MWEcandidateMay 13, 2026
Robotic Process Automation (rpa)MWEcandidateMay 13, 2026
Robust AiMWEcandidateMay 13, 2026
Robust Security NetworkMWEcandidateMay 9, 2026
Rogue DeviceMWEcandidateMay 9, 2026
Rogue wireless accessMWEcandidateMay 12, 2026
Role Based Access ControlMWEcandidateMay 9, 2026
role playMWEverifiedMay 11, 2026
roles and responsibilitiesMWEcandidateMay 9, 2026
root causeMWEcandidateMay 9, 2026
Root cause analysisMWEcandidateMay 9, 2026
Root Certification AuthorityMWEcandidateMay 9, 2026
Root-Mean-Square Deviation (RMSD)MWEcandidateMay 13, 2026
Round KeyMWEcandidateMay 12, 2026
round offMWEverifiedMay 11, 2026
Routing Information ProtocolMWEcandidateMay 9, 2026
Routing LoopMWEcandidateMay 9, 2026
Routing numberMWEcandidateMay 12, 2026
RPC ScansMWEcandidateMay 9, 2026
rule onMWEverifiedMay 11, 2026
Rule Set Based Access ControlMWEcandidateMay 9, 2026
Rule-Based Security PolicyMWEcandidateMay 9, 2026
Rules of EngagementMWEcandidateMay 12, 2026
Safeguarding StatementMWEcandidateMay 9, 2026
SAS 70 reportMWEcandidateMay 12, 2026
Satellite technologyMWEcandidateMay 12, 2026
Scenario analysisMWEcandidateMay 9, 2026
Scoping GuidanceMWEcandidateMay 12, 2026
Screen OutMWEcandidateMay 13, 2026
secret keyMWEcandidateMay 9, 2026
Secret SeedMWEcandidateMay 9, 2026
secure coding practiceMWEcandidateMay 9, 2026
Secure Communication ProtocolMWEcandidateMay 12, 2026
Secure CommunicationsMWEcandidateMay 12, 2026
secure development practiceMWEcandidateMay 9, 2026
secure disposalMWEcandidateMay 9, 2026
Secure DNSMWEcandidateMay 9, 2026
Secure Electronic TransactionMWEcandidateMay 9, 2026
Secure EraseMWEcandidateMay 9, 2026
Secure Hash AlgorithmMWEcandidateMay 12, 2026
Secure Hash StandardMWEcandidateMay 12, 2026
Secure ShellMWEcandidateMay 12, 2026
Secure Socket LayerMWEcandidateMay 12, 2026
Secure Socket Layer (SSL)MWEcandidateMay 9, 2026
Secure Sockets LayerMWEcandidateMay 12, 2026
Secure StateMWEcandidateMay 9, 2026
Secure SubsystemMWEcandidateMay 12, 2026
Securely ProvisionMWEcandidateMay 9, 2026
security alertMWEcandidateMay 9, 2026
Security architectureMWEcandidateMay 9, 2026
Security as a ServiceMWEcandidateMay 9, 2026
Security Assertion Markup LanguageMWEcandidateMay 12, 2026
security assessment reportMWEcandidateMay 9, 2026
Security AssociationMWEcandidateMay 9, 2026
Security AttributeMWEcandidateMay 9, 2026
Security auditMWEcandidateMay 9, 2026
security automationMWEcandidateMay 12, 2026
Security Automation DomainMWEcandidateMay 12, 2026
Security Awareness programMWEcandidateMay 9, 2026
security awareness trainingMWEcandidateMay 9, 2026
Security BannerMWEcandidateMay 12, 2026
Security breachMWEcandidateMay 9, 2026
Security CategorizationMWEcandidateMay 12, 2026
Security CategoryMWEcandidateMay 12, 2026
Security Concept of OperationsMWEcandidateMay 12, 2026
security controlMWEcandidateMay 9, 2026
Security Control AssessmentMWEcandidateMay 9, 2026
Security Control AssessorMWEcandidateMay 9, 2026
Security Control BaselineMWEcandidateMay 9, 2026
Security Control EffectivenessMWEcandidateMay 9, 2026
Security Control EnhancementsMWEcandidateMay 9, 2026
Security Control InheritanceMWEcandidateMay 9, 2026
Security Controls BaselineMWEcandidateMay 9, 2026
Security DomainMWEcandidateMay 12, 2026
Security EngineeringMWEcandidateMay 12, 2026
security eventMWEcandidateMay 12, 2026
Security Event LogMWEcandidateMay 12, 2026
Security Fault AnalysisMWEcandidateMay 12, 2026
Security Features Users GuideMWEcandidateMay 12, 2026
Security FilterMWEcandidateMay 9, 2026
Security FunctionsMWEcandidateMay 9, 2026
Security GoalsMWEcandidateMay 12, 2026
Security Impact AnalysisMWEcandidateMay 12, 2026
security incidentMWEcandidateMay 12, 2026
security incident response planMWEcandidateMay 9, 2026
Security InspectionMWEcandidateMay 9, 2026
Security KernelMWEcandidateMay 12, 2026
Security LabelMWEcandidateMay 12, 2026
Security LevelMWEcandidateMay 12, 2026
Security logMWEcandidateMay 12, 2026
Security Management DashboardMWEcandidateMay 9, 2026
Security MarkingMWEcandidateMay 9, 2026
Security MechanismMWEcandidateMay 12, 2026
Security metricsMWEcandidateMay 9, 2026
Security Net Control StationMWEcandidateMay 9, 2026
Security ObjectiveMWEcandidateMay 12, 2026
security operations centreMWEcandidateMay 12, 2026
security patchMWEcandidateMay 12, 2026
security patchingMWEcandidateMay 9, 2026
security patching processMWEcandidateMay 9, 2026
Security perimeterMWEcandidateMay 9, 2026
security personnelMWEcandidateMay 9, 2026
Security PlanMWEcandidateMay 9, 2026
security policyMWEcandidateMay 9, 2026
Security PostureMWEcandidateMay 12, 2026
security practiceMWEcandidateMay 9, 2026
Security procedure agreementMWEcandidateMay 9, 2026
security processMWEcandidateMay 12, 2026
Security Program ManagementMWEcandidateMay 9, 2026
Security Program PlanMWEcandidateMay 12, 2026
Security RangeMWEcandidateMay 12, 2026
security requirementMWEcandidateMay 9, 2026
Security Requirements BaselineMWEcandidateMay 9, 2026
Security Requirements RequirementsMWEcandidateMay 12, 2026
Security SafeguardsMWEcandidateMay 9, 2026
Security ServiceMWEcandidateMay 9, 2026
Security SpecificationMWEcandidateMay 9, 2026
Security StrengthMWEcandidateMay 9, 2026
Security TagMWEcandidateMay 12, 2026
Security TargetMWEcandidateMay 12, 2026
security testMWEcandidateMay 9, 2026
Security Test & EvaluationMWEcandidateMay 12, 2026
Security TestingMWEcandidateMay 9, 2026
Security violationMWEcandidateMay 9, 2026
Security-Relevant ChangeMWEcandidateMay 9, 2026
Security-Relevant EventMWEcandidateMay 9, 2026
Security-Relevant InformationMWEcandidateMay 12, 2026
Seed KeyMWEcandidateMay 12, 2026
Segregation/separation of dutiesMWEcandidateMay 9, 2026
Self-Aware SystemMWEcandidateMay 13, 2026
Self-Healing SystemMWEcandidateMay 13, 2026
self-regulatory organizationMWEcandidateMay 12, 2026
Semantic MappingMWEcandidateMay 13, 2026
Semi-Quantitative AssessmentMWEcandidateMay 9, 2026
senior executiveMWEcandidateMay 9, 2026
senior managementMWEcandidateMay 9, 2026
senior managerMWEcandidateMay 9, 2026
Sensitive customer informationMWEcandidateMay 9, 2026
sensitive dataMWEcandidateMay 9, 2026
Sensitive InformationMWEcandidateMay 9, 2026
Sensitivity AnalysisMWEcandidateMay 13, 2026
Sensitivity LabelMWEcandidateMay 12, 2026
Sensory DigitizationMWEcandidateMay 13, 2026
Separation of DutiesMWEcandidateMay 9, 2026
separation of dutyMWEcandidateMay 9, 2026
service contractMWEcandidateMay 9, 2026
Service delivery objectiveMWEcandidateMay 12, 2026
Service level agreementMWEcandidateMay 12, 2026
Service Level Agreement (SLA)MWEcandidateMay 9, 2026
service level performanceMWEcandidateMay 12, 2026
service providerMWEcandidateMay 12, 2026
Session HijackingMWEcandidateMay 12, 2026
Session KeyMWEcandidateMay 12, 2026
set upMWEverifiedMay 11, 2026
Settlement date (ACH)MWEcandidateMay 12, 2026
Settlement eligible instructionsMWEcandidateMay 9, 2026
Shadow ITMWEcandidateMay 9, 2026
Shadow Password FilesMWEcandidateMay 9, 2026
Shallow LearningMWEcandidateMay 13, 2026
shared accountMWEcandidateMay 9, 2026
Shared SecretMWEcandidateMay 12, 2026
Shielded EnclosureMWEcandidateMay 12, 2026
Short positionMWEcandidateMay 12, 2026
Short position limitMWEcandidateMay 9, 2026
Short TitleMWEcandidateMay 9, 2026
Signal Detection TheoryMWEcandidateMay 13, 2026
Signals AnalysisMWEcandidateMay 12, 2026
Signature CertificateMWEcandidateMay 9, 2026
Signature GenerationMWEcandidateMay 9, 2026
Signature ValidationMWEcandidateMay 12, 2026
Signature VerificationMWEcandidateMay 12, 2026
Signed DataMWEcandidateMay 12, 2026
Significant firmsMWEcandidateMay 9, 2026
Simple Integrity PropertyMWEcandidateMay 9, 2026
Simple Mail Transfer ProtocolMWEcandidateMay 9, 2026
Simple Network Management ProtocolMWEcandidateMay 9, 2026
Simple Security PropertyMWEcandidateMay 9, 2026
Single factor authenticationMWEcandidateMay 9, 2026
Single Point KeyingMWEcandidateMay 9, 2026
Single-Entry (ACH)MWEcandidateMay 9, 2026
Single-Hop ProblemMWEcandidateMay 9, 2026
situational awarenessMWEcandidateMay 12, 2026
Smart cardMWEcandidateMay 12, 2026
Social engineeringMWEcandidateMay 12, 2026
Socio-Technical SystemMWEcandidateMay 13, 2026
Socket PairMWEcandidateMay 9, 2026
Software as a serviceMWEcandidateMay 12, 2026
software assuranceMWEcandidateMay 12, 2026
software platformMWEcandidateMay 12, 2026
software releaseMWEcandidateMay 12, 2026
software security controlMWEcandidateMay 9, 2026
Software TestingMWEcandidateMay 13, 2026
Software-Based Fault IsolationMWEcandidateMay 9, 2026
Sound practicesMWEcandidateMay 9, 2026
Source codeMWEcandidateMay 9, 2026
Source PortMWEcandidateMay 9, 2026
Source programMWEcandidateMay 9, 2026
Source routing specificationMWEcandidateMay 9, 2026
spam filtering softwareMWEcandidateMay 9, 2026
Spanning PortMWEcandidateMay 9, 2026
Spear phishingMWEcandidateMay 9, 2026
Special Access ProgramMWEcandidateMay 9, 2026
Special Access Program FacilityMWEcandidateMay 9, 2026
Special CharacterMWEcandidateMay 9, 2026
Spiral developmentMWEcandidateMay 9, 2026
Split HorizonMWEcandidateMay 9, 2026
Split KeyMWEcandidateMay 9, 2026
Split KnowledgeMWEcandidateMay 9, 2026
Split ProcessingMWEcandidateMay 9, 2026
Spread SpectrumMWEcandidateMay 9, 2026
SQL injectionMWEcandidateMay 9, 2026
SQL injection attackMWEcandidateMay 9, 2026
Sreen scrapingMWEcandidateMay 9, 2026
Stack MashingMWEcandidateMay 9, 2026
Standard ACLsMWEcandidateMay 12, 2026
Standard DeviationMWEcandidateMay 13, 2026
Standard Entry Class (SEC) codeMWEcandidateMay 12, 2026
Star PropertyMWEcandidateMay 9, 2026
Start EventMWEcandidateMay 13, 2026
Start-Up KEKMWEcandidateMay 9, 2026
State MachineMWEcandidateMay 12, 2026
Stateful inspectionMWEcandidateMay 9, 2026
Static Host TablesMWEcandidateMay 12, 2026
Static KeyMWEcandidateMay 9, 2026
Static RoutingMWEcandidateMay 9, 2026
Statistical BiasMWEcandidateMay 13, 2026
Statistical ParityMWEcandidateMay 13, 2026
Statistical SignificanceMWEcandidateMay 13, 2026
Status MonitoringMWEcandidateMay 9, 2026
Statutory requirementsMWEcandidateMay 9, 2026
Storage area network (SAN)MWEcandidateMay 12, 2026
storage locationMWEcandidateMay 12, 2026
Storage ObjectMWEcandidateMay 9, 2026
Storage virtualizationMWEcandidateMay 9, 2026
Store cardMWEcandidateMay 9, 2026
Stored-value cardMWEcandidateMay 9, 2026
Stovepipe applicationMWEcandidateMay 9, 2026
Straight-Through CableMWEcandidateMay 9, 2026
Straight-Through Processing (STP)MWEcandidateMay 13, 2026
strategic planningMWEcandidateMay 12, 2026
Stream CipherMWEcandidateMay 12, 2026
Street testsMWEcandidateMay 12, 2026
Strength of MechanismMWEcandidateMay 9, 2026
Stress TestMWEcandidateMay 13, 2026
Striped CoreMWEcandidateMay 9, 2026
Strong AuthenticationMWEcandidateMay 9, 2026
strong cryptographyMWEcandidateMay 12, 2026
Strong Star PropertyMWEcandidateMay 12, 2026
Structured DataMWEcandidateMay 13, 2026
Sub NetworkMWEcandidateMay 9, 2026
Subject Security LevelMWEcandidateMay 9, 2026
Subnet MaskMWEcandidateMay 9, 2026
Substitute check (Check 21)MWEcandidateMay 9, 2026
Suite AMWEcandidateMay 9, 2026
Suite BMWEcandidateMay 9, 2026
Superior Certification AuthorityMWEcandidateMay 12, 2026
Supervised LearningMWEcandidateMay 13, 2026
supervisory agencyMWEcandidateMay 9, 2026
Supplementation Security ControlsMWEcandidateMay 9, 2026
supply chainMWEcandidateMay 12, 2026
Supply Chain AttackMWEcandidateMay 9, 2026
supply chain riskMWEcandidateMay 12, 2026
Supply Chain Risk ManagementMWEcandidateMay 12, 2026
supply chain risk management processMWEcandidateMay 12, 2026
Support Vector MachinesMWEcandidateMay 13, 2026
Suppression MeasureMWEcandidateMay 12, 2026
suspicious activityMWEcandidateMay 9, 2026
Suspicious activity report (SAR)MWEcandidateMay 12, 2026
Switched NetworkMWEcandidateMay 9, 2026
Switched virtual circuit (SVC)MWEcandidateMay 9, 2026
Symbolic LinksMWEcandidateMay 9, 2026
symmetric cryptographyMWEcandidateMay 9, 2026
Symmetric Encryption AlgorithmMWEcandidateMay 9, 2026
symmetric keyMWEcandidateMay 12, 2026
Symmetric key encryptionMWEcandidateMay 9, 2026
SYN FloodMWEcandidateMay 12, 2026
Synchronous Crypto-OperationMWEcandidateMay 12, 2026
Synchronous data replicationMWEcandidateMay 12, 2026
Synchronous Optical NETwork (SONET)MWEcandidateMay 12, 2026
System AdministrationMWEcandidateMay 12, 2026
System AdministratorMWEcandidateMay 9, 2026
system and network monitoringMWEcandidateMay 9, 2026
System AssetsMWEcandidateMay 9, 2026
system configurationMWEcandidateMay 12, 2026
system developmentMWEcandidateMay 12, 2026
System Development Life CycleMWEcandidateMay 12, 2026
System Development MethodologiesMWEcandidateMay 12, 2026
system development methodologyMWEcandidateMay 9, 2026
system documentationMWEcandidateMay 9, 2026
System hardeningMWEcandidateMay 12, 2026
System HighMWEcandidateMay 9, 2026
System High ModeMWEcandidateMay 9, 2026
system implementationMWEcandidateMay 9, 2026
System IndicatorMWEcandidateMay 9, 2026
system integrityMWEcandidateMay 9, 2026
System InterconnectionMWEcandidateMay 12, 2026
System LowMWEcandidateMay 12, 2026
System Of RecordsMWEcandidateMay 9, 2026
System of SystemsMWEcandidateMay 13, 2026
system operationMWEcandidateMay 9, 2026
System OwnerMWEcandidateMay 9, 2026
System ProfileMWEcandidateMay 9, 2026
System resourcesMWEcandidateMay 8, 2026
system securityMWEcandidateMay 8, 2026
System Security OfficerMWEcandidateMay 8, 2026
System Security PlanMWEcandidateMay 8, 2026
System SoftwareMWEcandidateMay 8, 2026
System-Specific PolicyMWEcandidateMay 8, 2026
System-Specific Security ControlMWEcandidateMay 8, 2026
Systemic BiasMWEcandidateMay 13, 2026
Systems DevelopmenMWEcandidateMay 12, 2026
Systems Requirements PlanningMWEcandidateMay 12, 2026
Systems Security AnalysisMWEcandidateMay 8, 2026
Systems Security ArchitectureMWEcandidateMay 12, 2026
T-1 lineMWEcandidateMay 12, 2026
tabletop exerciseMWEcandidateMay 8, 2026
Tactical DataMWEcandidateMay 8, 2026
Tactical EdgeMWEcandidateMay 8, 2026
Tactical planMWEcandidateMay 12, 2026
Tailored Security Control BaselineMWEcandidateMay 8, 2026
tailored trustworthy spaceMWEcandidateMay 8, 2026
Tailoring Assessment ProcedureMWEcandidateMay 8, 2026
take actionMWEcandidateMay 11, 2026
take part inMWEverifiedMay 11, 2026
Tangible assetMWEcandidateMay 8, 2026
Target Of EvaluationMWEcandidateMay 8, 2026
TCP FingerprintingMWEcandidateMay 8, 2026
TCP Full Open ScanMWEcandidateMay 8, 2026
TCP Half Open ScanMWEcandidateMay 8, 2026
TCP WrapperMWEcandidateMay 8, 2026
Technical ControlsMWEcandidateMay 8, 2026
Technical Non-repudiationMWEcandidateMay 8, 2026
Technical Reference ModelMWEcandidateMay 8, 2026
Technical Security ControlsMWEcandidateMay 12, 2026
technical security solutionMWEcandidateMay 8, 2026
Technical Vulnerability InformationMWEcandidateMay 12, 2026
Technology Research and DevelopmentMWEcandidateMay 12, 2026
technology service providerMWEcandidateMay 12, 2026
TEMPEST TestMWEcandidateMay 8, 2026
TEMPEST ZoneMWEcandidateMay 9, 2026
Terminal servicesMWEcandidateMay 12, 2026
termination actionMWEcandidateMay 12, 2026
Test and EvaluationMWEcandidateMay 9, 2026
Test assumptionsMWEcandidateMay 12, 2026
test environmentMWEcandidateMay 12, 2026
test forMWEverifiedMay 11, 2026
Test KeyMWEcandidateMay 9, 2026
Test planMWEcandidateMay 12, 2026
test resultMWEcandidateMay 12, 2026
Test scenarioMWEcandidateMay 12, 2026
Test scriptsMWEcandidateMay 12, 2026
Test strategyMWEcandidateMay 12, 2026
third partyMWEcandidateMay 13, 2026
third party contractMWEcandidateMay 9, 2026
third party dependencyMWEcandidateMay 12, 2026
third party managementMWEcandidateMay 9, 2026
third party management policyMWEcandidateMay 12, 2026
third party risk assessmentMWEcandidateMay 12, 2026
Third Party Service ProviderMWEcandidateMay 9, 2026
Third Party Service Provider ListMWEcandidateMay 12, 2026
Third-party relationshipMWEcandidateMay 12, 2026
Third-party senderMWEcandidateMay 12, 2026
Third-party service provider (ACH)MWEcandidateMay 12, 2026
Threat agentMWEcandidateMay 9, 2026
Threat analysisMWEcandidateMay 9, 2026
threat assessmentMWEcandidateMay 9, 2026
Threat eventMWEcandidateMay 9, 2026
threat informationMWEcandidateMay 12, 2026
threat information sharingMWEcandidateMay 12, 2026
Threat intelligenceMWEcandidateMay 9, 2026
threat intelligence serviceMWEcandidateMay 12, 2026
Threat ModelMWEcandidateMay 12, 2026
Threat MonitoringMWEcandidateMay 9, 2026
threat monitoring processMWEcandidateMay 9, 2026
Threat ScenarioMWEcandidateMay 9, 2026
Threat ShiftingMWEcandidateMay 9, 2026
Threat SourceMWEcandidateMay 9, 2026
Threat vectorMWEcandidateMay 9, 2026
Three Lines of DefenseMWEcandidateMay 13, 2026
Time BombMWEcandidateMay 9, 2026
time frameMWEcandidateMay 9, 2026
time periodMWEcandidateMay 12, 2026
Time to LiveMWEcandidateMay 9, 2026
Time-Compliance DateMWEcandidateMay 9, 2026
Time-Dependent PasswordMWEcandidateMay 9, 2026
timely mannerMWEcandidateMay 9, 2026
Tiny Fragment AttackMWEcandidateMay 9, 2026
to the extent thatMWEcandidateMay 12, 2026
TOE Security FunctionsMWEcandidateMay 9, 2026
TOE Security PolicyMWEcandidateMay 9, 2026
Token RingMWEcandidateMay 9, 2026
Token-Based Access ControlMWEcandidateMay 9, 2026
Token-Based DevicesMWEcandidateMay 9, 2026
Total cost of ownershipMWEcandidateMay 12, 2026
Total cost of ownership (TCO)MWEcandidateMay 12, 2026
Total RiskMWEcandidateMay 12, 2026
Tracking CookieMWEcandidateMay 9, 2026
Tradecraft IdentityMWEcandidateMay 9, 2026
Traditional INFOSEC ProgramMWEcandidateMay 9, 2026
Traffic AnalysisMWEcandidateMay 12, 2026
Traffic Encryption KeyMWEcandidateMay 12, 2026
traffic light protocolMWEcandidateMay 9, 2026
Traffic PaddingMWEcandidateMay 9, 2026
Traffic-Flow SecurityMWEcandidateMay 12, 2026
Training AssessmentMWEcandidateMay 9, 2026
Training DataMWEcandidateMay 13, 2026
Training EffectivenessMWEcandidateMay 9, 2026
Training Effectiveness EvaluationMWEcandidateMay 12, 2026
training materialMWEcandidateMay 12, 2026
transaction fileMWEcandidateMay 12, 2026
Transaction testingMWEcandidateMay 12, 2026
Transfer LearningMWEcandidateMay 13, 2026
transient cyber assetMWEcandidateMay 9, 2026
Transmission Control ProtocolMWEcandidateMay 9, 2026
transmission equipmentMWEcandidateMay 9, 2026
Transmission SecurityMWEcandidateMay 9, 2026
Transport Layer SecurityMWEcandidateMay 9, 2026
Trap DoorMWEcandidateMay 12, 2026
Triple DESMWEcandidateMay 9, 2026
Trojan horseMWEcandidateMay 9, 2026
True NegativeMWEcandidateMay 13, 2026
True PositiveMWEcandidateMay 13, 2026
Truncating bank (Check 21)MWEcandidateMay 9, 2026
Trust AnchorMWEcandidateMay 12, 2026
Trust ListMWEcandidateMay 9, 2026
Trusted AgentMWEcandidateMay 9, 2026
Trusted CertificateMWEcandidateMay 9, 2026
Trusted ChannelMWEcandidateMay 9, 2026
Trusted Computer SystemMWEcandidateMay 9, 2026
Trusted Computing BaseMWEcandidateMay 9, 2026
Trusted DistributionMWEcandidateMay 9, 2026
Trusted FoundryMWEcandidateMay 9, 2026
Trusted Identification ForwardingMWEcandidateMay 12, 2026
Trusted PathMWEcandidateMay 9, 2026
Trusted Platform Module ChipMWEcandidateMay 12, 2026
Trusted PortsMWEcandidateMay 9, 2026
Trusted ProcessMWEcandidateMay 9, 2026
Trusted RecoveryMWEcandidateMay 9, 2026
Trusted SoftwareMWEcandidateMay 12, 2026
Trusted TimestampMWEcandidateMay 12, 2026
Trusted zoneMWEcandidateMay 12, 2026
Trustworthy AiMWEcandidateMay 13, 2026
Trustworthy SystemMWEcandidateMay 12, 2026
TSEC NomenclatureMWEcandidateMay 9, 2026
Tunnel modeMWEcandidateMay 9, 2026
Two-factor authenticationMWEcandidateMay 9, 2026
Two-Part CodeMWEcandidateMay 9, 2026
Two-Person ControlMWEcandidateMay 12, 2026
Two-Person IntegrityMWEcandidateMay 9, 2026
Two-way pollingMWEcandidateMay 9, 2026
Type 1 KeyMWEcandidateMay 9, 2026
Type 1 ProductMWEcandidateMay 9, 2026
Type 2 KeyMWEcandidateMay 9, 2026
Type 2 ProductMWEcandidateMay 9, 2026
Type 3 KeyMWEcandidateMay 9, 2026
Type 3 ProductMWEcandidateMay 9, 2026
Type 4 KeyMWEcandidateMay 9, 2026
Type 4 ProductMWEcandidateMay 9, 2026
Type AccreditationMWEcandidateMay 9, 2026
Type CertificationMWEcandidateMay 9, 2026
Type I ErrorMWEcandidateMay 13, 2026
Type Ii ErrorMWEcandidateMay 13, 2026
U.S. PersonMWEcandidateMay 9, 2026
U.S.-Controlled FacilityMWEcandidateMay 9, 2026
U.S.-Controlled SpaceMWEcandidateMay 9, 2026
UDP ScanMWEcandidateMay 9, 2026
Ultra forward serviceMWEcandidateMay 12, 2026
unauthorized accessMWEcandidateMay 9, 2026
unauthorized access is detectedMWEcandidateMay 9, 2026
unauthorized attemptMWEcandidateMay 9, 2026
unauthorized changeMWEcandidateMay 12, 2026
Unauthorized DisclosureMWEcandidateMay 12, 2026
unauthorized mobile codeMWEcandidateMay 9, 2026
unauthorized personnelMWEcandidateMay 12, 2026
unauthorized physical accessMWEcandidateMay 12, 2026
unauthorized softwareMWEcandidateMay 12, 2026
unauthorized useMWEcandidateMay 12, 2026
unescorted accessMWEcandidateMay 9, 2026
Uniform Resource IdentifierMWEcandidateMay 12, 2026
Uniform resource locatorMWEcandidateMay 9, 2026
Uniform Resource Locator (URL)MWEcandidateMay 12, 2026
Uninterruptible power supply (UPS)MWEcandidateMay 9, 2026
unnecessary default accountMWEcandidateMay 12, 2026
unpatched softwareMWEcandidateMay 9, 2026
unposted suspense itemMWEcandidateMay 12, 2026
Unprotected ShareMWEcandidateMay 12, 2026
Unsigned dataMWEcandidateMay 12, 2026
Unstructured DataMWEcandidateMay 13, 2026
Unsupervised LearningMWEcandidateMay 13, 2026
Untrusted ProcessMWEcandidateMay 12, 2026
unusual activityMWEcandidateMay 9, 2026
Update a CertificateMWEcandidateMay 9, 2026
USA Patriot ActMWEcandidateMay 12, 2026
Usability TestingMWEcandidateMay 13, 2026
user accessMWEcandidateMay 12, 2026
user access privilegeMWEcandidateMay 9, 2026
user access reviewMWEcandidateMay 9, 2026
user accountMWEcandidateMay 12, 2026
User account activityMWEcandidateMay 12, 2026
User Account ManagementMWEcandidateMay 12, 2026
User Contingency PlanMWEcandidateMay 12, 2026
User Datagram ProtocolMWEcandidateMay 9, 2026
User IDMWEcandidateMay 12, 2026
User IdentificationMWEcandidateMay 12, 2026
User InitializationMWEcandidateMay 9, 2026
User interface impersonationMWEcandidateMay 12, 2026
user manualMWEcandidateMay 12, 2026
User modeMWEcandidateMay 9, 2026
User Partnership ProgramMWEcandidateMay 9, 2026
User provisioningMWEcandidateMay 9, 2026
User RegistrationMWEcandidateMay 9, 2026
User RepresentativeMWEcandidateMay 9, 2026
User-Centered DesignMWEcandidateMay 13, 2026
Valid Data ElementMWEcandidateMay 9, 2026
Value Sensitive DesignMWEcandidateMay 13, 2026
Verified NameMWEcandidateMay 9, 2026
Verifier Impersonation AttackMWEcandidateMay 9, 2026
Vertical defense-in depthMWEcandidateMay 9, 2026
video blogMWEverifiedMay 11, 2026
Virtual local area networkMWEcandidateMay 12, 2026
Virtual local area network (VLAN)MWEcandidateMay 9, 2026
Virtual MachineMWEcandidateMay 9, 2026
Virtual MallMWEcandidateMay 12, 2026
Virtual private networkMWEcandidateMay 12, 2026
Virtual private network (VPN)MWEcandidateMay 12, 2026
virtual private network accessMWEcandidateMay 9, 2026
Virus signature fileMWEcandidateMay 9, 2026
visitor accessMWEcandidateMay 9, 2026
visitor control programMWEcandidateMay 9, 2026
visitor logMWEcandidateMay 9, 2026
visitor's nameMWEcandidateMay 9, 2026
Voice FirewallMWEcandidateMay 9, 2026
Voice Intrusion Prevention SystemMWEcandidateMay 12, 2026
Voice over Internet Protocol (VoIP)MWEcandidateMay 12, 2026
Voice-over Internet ProtocolMWEcandidateMay 9, 2026
Volatile dataMWEcandidateMay 9, 2026
Vulnerability analysisMWEcandidateMay 9, 2026
Vulnerability AssessmentMWEcandidateMay 12, 2026
Vulnerability Management planMWEcandidateMay 12, 2026
vulnerability mitigationMWEcandidateMay 9, 2026
vulnerability scanMWEcandidateMay 12, 2026
Vulnerability scanningMWEcandidateMay 9, 2026
Walk-through drill/simulation testMWEcandidateMay 12, 2026
Wallet cardMWEcandidateMay 12, 2026
War ChalkingMWEcandidateMay 12, 2026
War DialerMWEcandidateMay 9, 2026
War DialingMWEcandidateMay 9, 2026
War DrivingMWEcandidateMay 9, 2026
Warehouse attackMWEcandidateMay 9, 2026
Warm siteMWEcandidateMay 12, 2026
Web BugMWEcandidateMay 9, 2026
Web Content Filtering SoftwareMWEcandidateMay 9, 2026
Web hostingMWEcandidateMay 9, 2026
Web of TrustMWEcandidateMay 9, 2026
Web Risk AssessmentMWEcandidateMay 9, 2026
WEB SEC codeMWEcandidateMay 9, 2026
Web serverMWEcandidateMay 9, 2026
Website hostingMWEcandidateMay 12, 2026
Well-know portsMWEcandidateMay 12, 2026
White TeamMWEcandidateMay 9, 2026
Wi-Fi protected accessMWEcandidateMay 9, 2026
Wi-Fi protected access IIMWEcandidateMay 12, 2026
Wi-Fi Protected Access-2MWEcandidateMay 9, 2026
Wide area networkMWEcandidateMay 9, 2026
Wide-scale disruptionMWEcandidateMay 9, 2026
wiki buildMWEverifiedMay 11, 2026
wire servicerMWEcandidateMay 12, 2026
wire transferMWEcandidateMay 12, 2026
Wired Equivalent PrivacyMWEcandidateMay 9, 2026
Wireless Access PointMWEcandidateMay 9, 2026
Wireless Application ProtocolMWEcandidateMay 9, 2026
Wireless communicationMWEcandidateMay 9, 2026
Wireless gateway serverMWEcandidateMay 9, 2026
Wireless local area networkMWEcandidateMay 12, 2026
wireless networkMWEcandidateMay 9, 2026
Wireless phoneMWEcandidateMay 12, 2026
Wireless TechnologyMWEcandidateMay 9, 2026
Word EmbeddingMWEcandidateMay 13, 2026
work factorMWEcandidateMay 9, 2026
work paperMWEcandidateMay 9, 2026
Work programMWEcandidateMay 12, 2026
Work transferMWEcandidateMay 12, 2026
Workcraft IdentityMWEcandidateMay 9, 2026
World Wide WebMWEcandidateMay 9, 2026
WORM (Acronym)MWEcandidateMay 9, 2026
Write AccessMWEcandidateMay 9, 2026
Write blockerMWEcandidateMay 12, 2026
Write protectMWEcandidateMay 9, 2026
X.509 CertificateMWEcandidateMay 9, 2026
X.509 Public Key CertificateMWEcandidateMay 9, 2026
Zero DayMWEcandidateMay 9, 2026
zero fillMWEcandidateMay 11, 2026
Zero-day attackMWEcandidateMay 9, 2026
Zone Of ControlMWEcandidateMay 9, 2026