Property | Value |
rdfs:label | |
dbkwik:itlaw/property/wikiPageUsesTemplate | |
is dcterms:subject of | - Curation Lifecycle Model
- Trackball
- ATS-Passenger
- Title
- Microsode
- Statistical sampling
- Tweak
- Jamming
- Master International Frequency Register
- OS X
- Cyberspace support
- Systems design
- Geocaching
- Web-cramming
- Unauthorized copy
- Location services
- COTS
- Economic Union
- Computer log collector
- Deoxyribonucleic acid
- Telepresence
- Platform neutral
- Federal information processing
- Profile-squatting
- Reissue application
- Enforceability of a patent
- Coalition
- Strong password
- Border Gateway Protocol
- Security parameter
- Defensive Cyber Effects Operations
- T2
- Partnership Intermediary Agreement
- Hot Spot
- Edge device
- Tele-expertise
- Commercialization
- Intelligence estimate
- Computer crime
- Non-adaptive risk
- Tweet storm
- Contract administrator
- Space-shifting
- Atomic clock
- Asset Tracking
- Computer forgery
- Compression ratio
- Social broadcasting
- Analysis approach
- Stored Program Control Point
- Citizen-facing services
- Political space
- Behavioral targeting
- Permission marketing
- Image Capture
- Area of dominant influence
- Very high bit rate Digital Subscriber Line
- Wallpaper
- Causal linkage
- AT&T Consent Decree
- Chief IoT Officer
- EPROM
- Radix point
- Assertion
- Transferability
- Sales transaction
- Downloader
- Certiorari
- .au
- Telephone Line
- Point of Sale Intrusion
- Signature scanning and algorithmic detection
- Biomedical equipment
- Context of use
- Industrial design
- Stress testing
- Dynamic demand
- Reference
- Power over Ethernet
- Enterprise information environment
- Newsgroup server
- Audio compression
- Census
- Sockpuppet
- Clinical Decision Support System
- Isolation
- Software engineer
- Traffic light protocol
- Joint author
- Virtualization technology
- Internal security testing
- Challenge-response system
- Online customization
- Transit network
- Content integration
- Nontargeted attack
- Dot-com bubble
- Segmentation
- Social computing
- Concatenate
- Plans of action and milestones
- Information system security engineering
- Unbiased
- Geospatial intelligence interoperability
- Dedicated short-range communications
- Geopositioning
- Information system
- Computer Defense Association Program
- Intentional cyber actor
- Spyware
- Traffic shaping
- Freelance author
- Analog transmission
- Software agent
- Cryptolocker
- Mobile station
- Typosquatter
- Client
- Social world
- Password-protected file
- Pre-pay metering
- Web search query
- Integrated receiver/decoder
- Second chance offer
- Virus Generator
- Counterintelligence operational tasking authority
- Pyramid Scheme
- Thumbprint
- Antispyware software
- High-end computing
- Chase Aircraft
- Local Internet Registry
- Entrepreneur
- Social media tools
- Technical contact
- Hologram
- Threat
- Crypto
- Implied warranty of fitness for a particular purpose
- Detailed design
- Arithmetic and logic unit
- International call sign
- Coordination
- RF shielding
- Videogame controller
- Information flow
- Private key
- European Forum for Member States
- Hiss
- Preferential treatment
- Light remotely piloted aircraft
- Contract for sale
- Electronic imager
- National Fingerprint File
- Education record
- Digital orthoimagery
- Key distribution center
- Challenge response
- Automatic license plate reader
- Justification
- Horizontal information
- Cyborg
- Smurf attack
- Reliance damages
- Physical infrastructure
- Joint Worldwide Intelligence Communications System
- Duplicate
- Fortuitous conduction
- Internet Protocol Suite
- Bridge loan
- Cipher Disk
- Wireless sensor
- Internal risk
- Greenwich Mean Time
- Negotiated contract
- Analog stick
- Non-exclusive
- Verification
- Electronic information service
- Intrusion
- Long term
- Alerter service
- First inventor
- Business process analysis
- Editing
- Analyst
- Segregated airspace
- Network behavioral analysis
- Withdrawal
- Domain name owner
- Abstract of the disclosure
- Prospect information
- Blade computer
- Differential Global Positioning System
- Wireless modem
- Emergency notification services
- ISO 13407
- Agreed service time
- Exculpatory evidence
- Network security specialist
- Computational science and engineering
- Aircraft
- Structural mitigation
- Raw intelligence
- Machine-readable
- Log
- Octal
- Login-spoofing program
- Taxation
- Geoscientific information
- Dynamic memory access
- Record disposal
- Every Soldier is a Sensor
- IT portfolio
- Mandatory requirements
- Burst length
- Recursive name server
- Separation of Duties
- Possible
- Crowded art
- Cyberfunding
- Pseudoflaw
- Virtual infrastructure
- FDDI
- COMSEC account
- Open network
- Smart Grid
- Flood attack
- Longitudinal study
- Whole-of-government
- Advanced transmission application
- Sublicense
- Nanorobotics
- Provisional security impact level
- Equity
- Microwave network
- Comma separated values
- Text user interface
- Qualified electronic prescribing system
- IMT-2000
- Employee
- Statutory interpretation
- Eurodollars
- Broadband usage
- Business activities tax
- Configuration control
- Circuit switch
- Remote switch
- Covered data
- Conclusive Evidence
- Internet Filtering
- Assured protection
- Entrapment
- Embedded advertising
- COPICS
- Communications-as-a-Service
- Consistent use
- Controlled schedule
- Static analysis
- Proper party
- Information overload
- Internet of Toys
- Data profiling
- Continuous presence
- Malicious bot
- Asportation
- Laser optical card
- Traditional media
- Competitive Access Provider
- Intelligent terminal
- Exporting
- Inter-integrated circuit
- Organization
- OS kernel
- Bacn
- Contamination
- Personal Digital Cellular
- Copying
- Platform convergence
- Unallocated space
- Phonorecords
- Accessibility
- Bounce rate
- Case history
- Amicus brief
- Terminal device
- Pseudonymous remailer
- Data block
- Netcasting
- Active license
- Advertising display software
- .jobs
- Trophy grabbing
- Corporate governance
- Training
- Automatic account lockout
- Call processor
- Viewable
- Preference data
- Diffie-Hellman
- Risk management framework
- Commercial audiovisual content
- Skunkworks
- Composite Blocking List
- Alphanumeric pager
- Serial bus
- Patent search
- Electromagnetic Interference
- Parametric data
- U.S. national interests
- Passive advertising
- Flame
- Hybrid smart card
- Priority
- PageRank
- DNA matching
- Spectrum sharing
- Botnet code
- Virtual hard disk
- Nanoelectromechanical systems
- Credit Score
- Cryptographic checkvalue
- Machine Learning
- Rewriteable
- Remote wipe
- Backward compatibility
- Output controls
- Repatriation
- Signature support mission
- Speech-to-text
- Censorship
- Reverse domain-name hijacking
- Program Review
- Alphanumeric
- Improved data modem
- Price discrimination
- Active remote sensing
- Tunneling
- Long term preservation
- Open Pretty Good Privacy
- Blue Box
- Wireless personal area network
- Planets TimeCapsule
- Security incident
- Location information
- Information domain
- Triple-play
- Moratorium
- Host name
- Laser bridge
- Tor relay
- Wavelength
- Mixed systems
- Automated technology
- Invitation to treat
- Operating frequency
- Screening process
- E-ink
- Parity
- Radar
- Payee
- Quality
- Search term
- Account audit
- Click-and-mortar
- Return On Investment
- Limited area
- Software piracy
- Audit policy
- Live scan
- Maintenance agreement
- Tromboning
- Byte
- Bank Secrecy Act Advisory Group
- Network encryption system
- Human kinematics
- Transactional or relationship message
- Data stream mining
- System on a chip
- Intramodal competition
- Electronic format
- Technological determinism
- Must
- Counterclaim
- Tracking software
- Clinical Document Architecture
- Global positioning system occultation sensor
- Cost-based valuation
- Bathymetry
- Gain-sharing
- Subsidize
- Cyberspace-enabling information and communications technology
- Infratechnology
- Service of process
- Electromagnetic radiation hazards
- Alternating current erasure
- Body Shop
- Textual records
- Digital ecosystem
- Form grabbing
- Massively parallel computer
- Intelligence preparation of the operational environment
- Audit record
- DSL modem
- Certified product
- Ka-Band
- Remanence
- Search engine unifier
- Trade secret information
- Major application
- Hypervisor
- Spurious emission
- Storage appliance
- Live-scan reader
- Nonproprietary
- Security controls
- Notice of publication
- Operational security
- Autonomous aircraft
- Gravimetric data
- Smart contract
- Expiration
- Compiled virus
- Network weaving
- Gross negligence
- Architecture repository
- Malformed data
- Ingress filtering
- Battlefield TECHINT
- GPS spoofing
- Card-based product
- Tactical intelligence
- LMAO
- Day One strategy
- Peer-to-peer software
- Burden
- Communications software
- Passive electronic countermeasure
- Joint intelligence process
- Resilient system
- Radio communication
- Glitch
- Security certification
- Personal record
- Reference sample
- Inbound traffic
- Active measurement tool
- Undocumented feature
- Portfolio management
- Network traffic capture
- Derivative file
- Standard user
- Network Intrusion Detection System
- Detariffing
- DHS system
- Content discrimination
- Intrusion Detection and Prevention System
- Spatial data clearinghouse
- Medical Information Bus
- Measurement
- Multilevel secure system
- AMI head end
- Recovery and reconstitution
- Security assessment
- PWN
- Electronic Warfare Officer
- Crawlable web site
- Private ordering
- Failure of essential purpose
- Pay television
- User portability
- Pac-Man
- Kilobits per second
- Insurgency
- Microgrid
- Libel tourism
- Insertion
- Matching program
- Aggravated identity theft
- Detection and identification rate
- Susceptibility
- Data message
- Arithmetic logic unit
- Willful patent infringement
- Decontrol
- Electrical power system
- Business process controls
- Failure mode
- Broadband Radio Service
- Harassment restraining order
- Cryptor
- Taxation risk
- Cyber intelligence
- Elect
- Digital Video Interface
- Component Service Provider
- Computer-aided dispatch
- Spectrum band
- Balance of trade
- Chemical computer
- Confidential source
- Software conversion
- Inter-cloud federation
- Policy Decision Point
- Representative of the news media
- Systems security engineering
- Improvement
- Online wallet
- Vote-by-phone
- Internet exchange point
- Outing
- Critical Infrastructure Protection
- Bridge
- .az
- Biometric service provider
- Very small aperture terminal
- Wireless access point
- Misappropriation
- ISBN
- Upconvert
- Verdict
- Absorptive capacity
- Investor
- Automated Key Transport
- Standard cost
- Error detection
- Domain parameter
- Maintenance of information
- Noise
- Vanity CSC
- Transceiver
- Basic Research
- Covered Government support contractor
- Security protocol
- National information and communications networks
- Control deficiency
- Management system
- Audio response system
- Stability
- Data management
- Document pertaining to copyright
- Safeguard
- Gateway actor
- Intentional cyber warfare attack
- Undeletion
- E-discovery
- Record communications
- Traditional knowledge
- Substantiation
- Requirements management
- Hybrid fiber-coaxial cable
- International mobile subscriber identity
- Computer trespasser
- Delivery
- Audio mixing
- Sterile area
- Indirect inference
- Breach of the security of the system
- Security features
- Cryptologic activities
- Vehicle telemetric system
- Kill chain
- Metadata schema
- Instantaneous disc
- Computing infrastructure
- Bootlegging
- Capital asset
- File Transfer Protocol
- Oceanography
- Assessment procedure
- ILoveYou
- TEMPEST zoning
- Public key enabling
- Biometric data subject
- Attack signature
- Channel conflict
- PII Confidentiality Impact Level
- Data Processing
- Really Simple Syndication
- Pre-trial motion
- False acceptance
- Palm print recognition
- Telematics
- Transaction processing
- Royalty stacking
- Records Management
- NSA Suite B
- Informant
- Batch computer
- Emerging and readily available technologies
- Petition For Reconsideration
- Low power and lossy network
- Newsreader
- Googling
- Chipset
- Self contained, closed product
- Security management
- Expectation damages
- Protective Security Advisor
- False rejection
- Authorized access
- Super high frequency
- Dig once policy
- Biotechnology
- Document Review, Edit, Sign
- Software-as-a-Service
- Antemortem identification media
- Adjudicative process
- Embedded cryptography
- Telecommunications software
- Liability Insurance
- Private standard-setting
- Mosaicking
- Substantial similarity
- Customer web portal
- IS-95
- Hardening
- Vocabulary for Event Recording and Incident Sharing
- Design patent application
- Privacy and authentication management
- Telegraphy
- Countertrade
- Information Management and Technology
- Biometric Identification System for Access
- Quality assurance
- Deterrent
- Dynamic Pricing
- Telecommunications room
- Deposit copy
- Collective Intelligence
- Hackathon
- Wireless Access in Vehicular Environments
- Medical device data system
- Perimeter
- Mobile telemedicine
- Nslookup
- Internet standard
- Transport Layer
- Social listening service
- Malware creation tool
- In-app advertising
- Object Linking and Embedding
- Non-cooperative user
- Manual testing
- Request for information
- USB port
- Intelligence Agency
- Radio spectrum
- Bps
- Number Portability Administration Center
- Anti-jam
- Forward secrecy
- Breach of Contract
- Caption
- E-tenders
- Bureau of International Communications and Information Policy
- Femtosecond
- Validated E-Gov Standard
- News
- Correlated emanations
- Macrodata
- Corporate Security
- Numeric pager
- Wireless network card
- Docking Station
- Export Control Classification Number
- Archival standards
- Internet infrastructure
- Semiconductor
- Proprietary business information
- Telecommunications Service Priority
- Delink
- Beacon
- Obsidian Finance Group, LLC v. Cox
- Media democracy
- Equitable estoppel
- Dedicated Server
- Private line service
- Estoppel
- Core data center
- Mobile Application Part signaling protocol
- IC E-mail
- Dongle
- Accrual accounting
- Context
- Investigative analysis report
- United States work
- Global Packet Radio Services
- Metaknowledge
- Trademark use
- Digital Video Interactive
- Census block
- Authoring tools
- Priority intelligence requirement
- National Media Exploitation Center
- Program library
- Synchronous operation
- Cloud-based
- Wireless body area network
- Intelligent motor controller
- Disk encryption
- Equalizer
- Conformance assessment
- Enhanced 911
- Secondary data uses
- Vendor of PHR
- FBI Electronic Biometric Transmission Specification
- Data diddling
- Active data collection
- Bias
- Verbose message
- Burn box
- Spatial resolution
- Telecommunications service provider
- Business records exception
- Adhesion contract
- Per se
- ClanDestine
- DHS Intelligence Enterprise
- Bank Account
- Information society
- Executable
- Single input, multiple output
- Notary public
- Scientific assessment
- Node splitting
- High-definition
- Recovery timeline
- Open Source
- Public Domain
- Node
- Multi-factor authentication
- Competition policy
- General privacy policy
- Stakeholder security requirements
- Transparent computing
- Bibliographic citation
- Domestic intelligence
- Export Control Automated Support System
- End User License Agreement
- Fleet management system
- Privacy controls
- Personnel
- Bidder
- Space disaggregation
- Wireless Internet access
- Deficiency in internal control
- Asterisk
- Interbank network
- Webform
- Antenna
- Fabrication
- Electronic warfare frequency deconfliction
- Networthiness
- Ambiguous
- Crypto ignition key
- Policy-making
- Back office
- Covert agent
- Blogger
- Mail Transport Agent
- .cat
- Network interoperability
- Questionable patent
- Expired information
- Hibernation
- Post-grant review
- Authorized user
- Identity fraud
- Webmail
- Security Reference Model
- Data-center-as-a-service
- Mac OS
- Security Development Lifecycle
- Federal Rules of Civil Procedure
- Multiple system operator
- Advisory
- GAIT
- Inter-cloud peering
- Personal electronic device
- Plaintext
- Pay per view
- Unmanned aerial system
- Real currency
- Triple Data Encryption Algorithm
- Open source intelligence
- RESTART
- Gizmo
- Bandwidth usage
- Conductor
- Natural user interface
- Targeted marketing
- Lightweight Directory Access Protocol
- Wireless sensor network
- E-file
- Data element definition
- Double-click
- Broadcast messaging service
- Demand response ready
- Tactical data
- Hardware monitor
- Moving target defense
- Explicit Content
- Open Automated Demand Response
- GNU
- Data contamination
- Mobile computing device
- Automatic Voice Network
- Communications deception
- Referral of records
- Cross-site scripting
- Publicly available information
- Cost
- Case management system
- Misrepresentation
- Information security management
- Fully-connected network
- Unintentional cyber warfare attack
- Remedy
- Parent
- Cloud reseller
- Ping of death
- Wired telecommunications carrier
- Direct-to-video
- Frequency Allotment Plan
- Telephone service
- Automatic Number Identification
- Strategic risk
- Electronic gaming device
- Biometric modality
- Genre
- Cross-device tracking
- Statistical purpose
- Synthetic aperture radar
- Case study
- Public Relations Society of America v. Road Runner High Speed Online
- Ringback
- Command prompt
- Computer-based patient record system
- Mailbox
- U.S.-controlled space
- Internet taxes
- Corrective maintenance
- Internet of Things
- Electronic document
- Network failure
- Writeable CD
- File name anomaly
- Gallery
- Intelligence-led policing
- Cost reimbursement contract
- Duration
- Record locator
- Simple Network Management Protocol
- Domain name applicant
- Probative data
- Misconfiguration
- Overload interference
- Digital archive
- Automated cartography
- Signal leakage
- Radio Control
- Background investigation
- Audio data compression
- Identity-based encryption
- Communications Intelligence
- Signatory
- Counterintelligence activities
- CUI Executive Agent
- Recordable disc
- Min-entropy
- IT Services
- Survivability
- Computer matching program
- Identity confidentiality
- Transport agent
- Brute force
- Data in processing
- Copyright Royalty Board
- Nonrivalrous consumption
- Digital Access Index
- Predictive dialer
- Systemic effect
- Non-functional requirement
- Mobile network operator
- Token management
- Contractual data requirement
- Likelihood determination
- Tape cartridge
- Cost/benefit model
- Observed data
- Deactivate
- Geomatics
- Cybercrime
- Requirements creep
- Teleprocessing security
- Blaster worm
- Moderate system
- Cryptosecurity
- .wav
- Internal modem
- Repudiation
- Brute force password attack
- Date of recordation
- Acquisition planning
- In-home display
- Viral marketing
- Virtual blockade
- Property data
- Proprietary privacy
- Probable prime
- Audio surveillance
- Electronic funds transfer
- Character Large Object
- Cyber device
- Fraud alert
- Key exfiltration
- Network appliance
- Counterintelligence investigation
- Earth observation
- Documentary evidence
- Packet radio
- Structured Query Language
- Industry-specific regulations
- Document retention policy
- .kr
- Acoustical security
- Data administrator
- Medical device data
- Business associate
- Regenerator
- Surfing
- Creative Commons Attribution-NonCommercial-NoDerivs license
- Information delivery
- Iterative
- Web service
- Digital terrestrial television
- Cost-sharing
- Persistent identifier
- Technology trend
- Planets
- Security administrator
- Spectral link efficiency
- Open System Interconnection
- Information access
- Digital audio recording medium
- Documented
- Non-kinetic
- System design
- Text documents
- Transaction data
- JIPB
- Characteristic
- News agency
- BEWL
- Long-arm jurisdiction
- Bulk encryption
- Integrated Network Electronic Warfare
- Non-disclosure clause
- Agile software development
- Intrusion detection system
- Alternative dispute resolution
- IP endpoint
- Inference development
- Defensive electronic countermeasures
- Direct3D
- Nationwide Differential GPS System
- Telecommunications network
- Service‐oriented architecture
- .NET
- Individual authentication
- System availability
- Pseudo-flaw
- Point to Point Protocol
- Reference template
- General wellness product
- Addressable TV advertising
- Distant Early Warning
- Local switch
- System user
- Keyword list blocking
- Web tracking
- Constellation
- Remote access testing
- Volume encryption
- Authentication of identity
- Length of useful data
- Satisfiability
- Critical update
- Radio access point
- Microcomputer microcircuit
- Fighting words
- Sensitive application
- Wiretap friendly
- Default judgment
- Motion pictures
- Advanced meter system
- Sell Sheet
- Untrustworthiness
- Fair play and substantial justice
- Telecenter
- Communication and Information Systems
- Third Amendment
- Error control
- Data capture
- User equipment
- Dossier society
- Cyberspace Command and Control
- Information Security Management System
- Dexter
- Narrowcasting
- Improper authentication
- Recordkeeping
- Data glove
- Mechanical royalties
- Impartial
- Structured programming
- Ex ante disclosure
- High-technology crime
- Digital optical disk
- Risk perception
- Government-to-business
- Virtual private cloud
- Thing
- Social media optimization
- Telephony
- Absorption
- Records appraisal
- Surge protector
- Cyber enticement
- Process controller
- E-mail application
- E-petition
- Personal mobile device
- Caller ID
- Pots
- Fault avoidance
- Tactical imagery
- Duty to speak
- Wrapper
- Pay-per-sale
- Trademark registrant
- Electronic sensor
- Red Cell analyses
- One-part code
- Performance testing
- Audioblog
- Statistical activities
- Verbatim copying
- Cold Storage
- Failure access
- Blended workforce
- 1000BASE–T
- Tethered Aerostat Radar System
- Continuity Communications Architecture
- Centesimal coordinates
- Air commerce
- Patent monopoly
- Dynamic IP address
- Tele-training
- Data anonymization
- Dispute
- Gross receipts
- Hypervisor attack
- Data exchange
- Frequency spectrum
- Build-Own-Operate-Transfer
- Asynchronous system
- Signature validation
- Geodetics
- Analog signal
- Printer spool file
- Hqx
- Containment
- Repository for Individuals of Special Concern
- Matching
- Handshake packet
- Copper Wire
- Domestic industry requirement
- GPS Tracker
- Conforming
- Controlled risk
- Computational Biology
- Access period
- Packet sniffing
- Biometric file
- Critical technologies
- Terminal
- Vein scan
- Reveal
- Channel Data Format
- Adaptive branding
- Common Operational Picture
- Command-line interface
- Very high frequency
- Contactless payment system
- Latitude
- Mobisode
- Online payment provider
- Agent Provocateur
- Fedwire
- Brand name
- Freedom of Expression
- Situation Report
- Cyber Security Technical Infrastructure Gap
- Projection
- Log management
- Wiki
- E-panel
- Notice of abandonment
- Counterintelligence production
- Viral content
- Delivery order
- Solar Energy Grid Integration System
- Emission security
- Attribute type
- Information provider
- RFID chip
- Recover
- Data origin authentication
- Kerberos
- Netiquette
- Private information retrieval
- Integrity lock
- Archival quality
- Massive open online course
- Computer Software Configuration Item
- Key recovery
- Negotiable
- Mobile phone forensics
- Electromagnetic deception
- Network computer
- Infrastructure Critical Asset Viewer
- AppleTalk
- AND logic
- Right of integrity
- Champerty
- Carrier
- Intromercial
- Mobile IP
- Cost-per-action
- Windows Protected Store
- Fintech
- Report
- Army Command and Control System
- Processsing power
- Data scientist
- Radio frequency
- Class action waiver
- Risk event
- Partnership
- Edutainment
- Legacy System
- Repurposing
- Inaccessible
- Mass media
- Custom calling feature
- Number portability
- User information
- Archival processing
- Asset valuation
- Quid Pro Quo
- Sabotage
- Wi-Fi
- Remotely Piloted Aircraft Operator
- Compensating security requirement
- Health Information Exchange
- Blog aggregator
- One-year rule
- Pictomap
- Federal Computer System
- Degree of proof
- Dots per inch
- Continuous program
- Employer Identification Number
- Across-track scanner
- Upgrade
- Islanding
- Virtual Training
- Watermarking
- Transformational Government
- Multipath propagation
- Medical image communications device
- Audio flag
- File wrapper
- Change request
- Audit
- Binary-coded decimal
- Bayes' theorem
- Direct current
- Protection
- E-mail account compromise
- Do Not Collect
- Information systems vulnerability information
- Intermediate System
- Data device
- Pseudonymization
- Authentication server
- Medical surveillance
- Mobile communications device
- Asymmetric DSL 2
- Infrastructure mode
- Information category
- Data Migration
- Hash function
- Data usage
- Corporate brand
- Civil affairs
- Dial-up connectivity
- Best efforts
- Video stream
- Oscillator
- Paper tape
- Pure Play
- Automated assets
- E-forum
- Analog modem
- Command and control server
- Attempt
- Structural metadata
- List processing
- Multi-releasable
- Technical data package
- Automatic information technology
- Nonstate actor
- Common secure configuration
- Digital migration
- Pop-up menu
- Business record theft
- Least privilege administration
- Fingerprint
- Checklist
- Command and control system
- Television Series
- Web Content Management System
- Counterfeit
- Defacement
- Telehealth
- Communications privacy
- Touch-tone data entry
- M1
- Economic cost
- Geophysical location tracking technology
- Research data
- Government Chief Information Officer
- Robust
- National Alert Warning System
- Public data
- Polymorphic malware
- Coupon code
- Public/private signature key pair
- .am
- A record
- Stewardship
- Tree topology
- Store card
- EDVAC
- Cryptographic module security policy
- Common understanding
- Federation
- Sobig
- End-point
- Internal network
- Card Verification Value
- Criminal investigative analysis
- IP over Avian Carriers
- Personal health information
- Argos Data Collection and Position Location System
- Link
- Cloud service provider data
- Transient
- Periods processing
- Disaster recovery exercise
- Ionosphere
- Air defense control center
- Half-duplex
- Collection Limitation Principle
- Trial Version
- Free-to-air broadcasting
- Below-the-line costs
- Assured Services Admission Control
- Link popularity
- Target of evaluation
- Threat monitoring
- Identification tool
- Stream data
- Imprint
- Scalability
- Confusing similarity
- Regulability
- Checklist: Data Breach Response
- Cursor key
- Trojan attack
- Abandonment of patent application
- Software design
- Macromyopia
- All-source analysis
- Information warfare organization
- RTC
- Available bit rate
- Modbus
- Senior party
- Configuration management database
- Assessment
- Computer information
- Garlic routing
- ISO 9001
- Authorizing official designated representative
- Partition
- Remote sensing
- Design trade-off analysis
- Wideband
- Desktop application
- Cell site simulator
- Champion
- Covered account
- First generation language
- Showrooming
- Licensee
- Frequency band
- Telecommuter
- Precompiler
- Timing signal
- Virtual currency
- Download
- Critical intelligence message
- Malicious cyber command and control
- E-journal
- Sufficient evidence
- Median
- Machine cryptosystem
- Information management system
- Cloudware
- Static
- Knowledge-based society
- Transitory record
- Natural monopoly
- FloodNet
- Analog reclamation
- IT governance
- Body of evidence
- Leap year
- Auditor
- Compute card
- Consumption-based pricing model
- Data set
- Indications center
- MPAA film ratings
- CAT-5e
- Try-and-buy license
- Systeme Internationale Mobile
- Public telecommunication sector
- Graphical representation
- Ebay
- High Frequency Broadcasting
- Presence
- Automatic dependent surveillance
- Online processing
- Content farm
- Biometric characteristics
- Health care clearinghouse
- Infocentric
- Authentic signature
- Licensor
- Photosite
- Embezzlement
- Remote Control
- Approve
- Common Market
- Indoor positioning system
- Wearable Electronics
- Intelligence operative
- Secure communications
- Disruptive innovation
- Digital satellite news gathering
- Value Added Tax
- Center for Payments and Cybersecurity Policy
- Reconnaissance data
- Export controlled information
- Global Telecommunications Grid
- Shared computing
- Microwave antenna
- Dedicated mode
- Electro-optics
- Resource Allocation
- Cyberconflict
- Flat file
- Facial image
- 411 services
- Official DoD imagery
- Intelligence survey
- Electronic protection
- Internet of Things privacy
- Stored wire communication
- Intellectual property breach
- Risk tracking/control
- Global Information Grid Enterprise Management
- Lock-and-key protection system
- Advertising
- Scroll box
- Anti-Aliasing
- Mean
- Radiation monitoring
- Stovepipe application
- Bootstrapping
- Bent pipe
- Image sensor
- Environment
- Clandestine activity
- DoD Information Technology Security Certification and Accreditation Process
- Imaging system
- Third party maintenance organization
- Indication
- Session
- Void
- Case-sensitive
- Directorate of Defense Trade Controls
- Satellite carrier
- C
- Concurrent use license
- Actuator
- Network sharing
- Recovery point objectives
- Add-in
- Disk space
- Digital audio recording technology
- Wireless client
- Short message service
- Shell
- Systems software
- Synchronous data replication
- Administrative record
- Operational Concept for Cyberspace
- Personal information management
- Creative Commons Attribution-NonCommercial-ShareAlike license
- Data element tag
- Data interoperability
- Distributor
- Cloud bursting
- Flow
- Criminal Intelligence System
- Passive wiretapping
- Telecontrol
- Earbuds
- Joe
- Automated database
- Prisoner's Dilemma
- Technological substitution
- Terrorist activity
- Cloud service arbitrage
- Secondary considerations
- Friend
- Escalation
- Mega
- .org
- Terrorist site
- Open platform
- Guideline
- Technopanic
- Operational efficiency
- Distributed data
- Digital envelope
- Semantic Web
- Data portability
- Write-once
- Specialty aggregator
- Geoslavery
- Cloud portability
- RSS reader
- Counterfeit drugs
- Debriefing
- Nanoscale Science and Technology
- Mixer
- Disk
- Precedent
- Common Data Link
- Smart meter data
- Management controls
- Data Transfer
- Measure
- Data accuracy
- Juice jacking
- Broadband wireless access
- Judicial summons
- Summary issues
- Blanket license
- Port
- Audiovisual media
- CyberTipline II
- Mobile marketer
- Anonymity set
- Confidentiality
- Social software
- Hot fix
- Open eBook Publication Structure
- Outage detection
- Backpropagation
- Supply system threat
- Aggrieved party
- Testimony
- Shared situational awareness
- Authenticated RFID
- Enterprise Risk Assessment Methodology
- OSI model
- Assured software
- Hybrid cloud
- Microbusiness
- Streaming media player
- System testing
- Tier 1 network
- Risk likelihood
- Computer science
- Outsourced IT-based process
- Risk impact
- Wireless cellular network
- Common Criteria
- Chief Risk Management Officer
- Press Release
- Non Sequitur
- Signed data
- Truth-in-advertising
- Escrow password
- Client-server network
- Mean Time Between Failures
- Network computer architecture
- Security as a Service
- Picosecond
- Reduced resource costs
- Customer relations management
- Enhanced Long Range Navigation system
- Configuration
- Information integration
- Security Tool
- ITunes Jukebox
- Side channel attack
- Load testing
- Application security
- Remotely piloted aircraft system
- Multichannel network
- Prejudice
- Demand response
- Information Literacy
- Network warfare support
- Full-text
- Globally Unique Identifier
- Steer-by-wire
- Private-public key pair
- Authentication assertion
- High-tech crime
- Hardware-as-a-Service
- Universal Transverse Mercator
- Freight on board
- Customer system communications network
- Cost/benefit analysis
- Disposal
- Replay attack
- Orphan work
- NAD 1927
- Business recovery test
- Post-domain path
- Auto-tabbing
- Cross-browser
- Television camera
- Information security program
- Copyright misuse doctrine
- Extended ASCII
- Reduced instruction set computer
- Current records
- Exclusive distribution
- Threat awareness
- Knowledge sharing
- Robotification
- Cyclic redundancy check
- Intelligent Vehicle Initiative
- System Engineering Life Cycle
- Carrier's carrier
- Traceability analysis
- Occupant
- Spamware
- Web store
- Certificate status authority
- Subscription
- DVD
- Purging
- Interoperable network
- Packet filter firewall
- Reportable condition
- Department of Defense Intelligence Information System Enterprise
- Security configuration
- Terrorism-related information
- Sensor analytics
- Blockchain
- Proximity sensing
- Application software
- Multiplayer Game
- Database integration
- Dial-up client
- In-memory database
- Walk-through simulation test
- Cinematographic work
- Mobile subscriber radio terminal
- Increasingly autonomous
- Data element indexing
- Payment processor
- Very low frequency
- Completeness
- Service level
- Respect for Context principle
- Legacy
- Cyber event
- Infrared intelligence
- Interactive fiction
- Application hosting service
- Permanent Record
- Computer input microfilm
- SVGA
- Trademark disclaimer
- Hidden dialer
- De-provision
- Repudiation of transaction
- Deterrence by denial
- Target identity
- Investigation
- Logo
- Criminal justice information system
- Assurance of possession
- Ponzi scheme
- High-End Computing Terascale Resource
- Laboratory information system
- Empirical research
- Credential
- Vulnerability class
- Customer Energy Management System
- Learnability
- Unfriend
- RISS Automated Trusted Information Exchange
- Net income
- Debug
- Automatic telephone dialing system
- Data Collector
- Spatial information
- Share-folder feature
- Pre-accessioning
- Maritime broadcast communications net
- Honeypot
- Impression
- Electromagnetic wave
- Interference mitigation
- Agent of Influence
- Validated OSINT
- Information and Communications Infrastructure Interagency Policy Committee
- Taxonomy
- Anonymizer
- Recoverability
- Steady state investment
- Italic
- Service Level Management
- E-mail thread
- A-list blogger
- Design around
- Manipulated variable
- Computer-assisted learning
- Mobile topology
- Workflow software
- Mobile messaging
- Issue tracking system
- Observer
- Virtual ISP
- Creative thinking
- Open government
- Deconfliction
- Communication center
- Privacy-enhanced mail
- Error rate
- Installability
- Third Party
- MD5 hash
- Digital safe haven
- Trusted timestamp
- National information system
- Clearing and settling institution
- Plain view doctrine
- Innovation policy
- Operations security plan
- U.S. person
- Correctness
- False Positive
- Direct evidence
- Backup rotation scheme
- Resource control
- Domainer
- Wireless communications device
- Authoring software
- Consumer-to-business
- Cupping
- Monitoring sensor
- Electronic, mechanical, or other device
- Ubiquitous information society
- Handle
- Octopus Conferences
- Fixed broadband service
- Display scale
- Journalling
- Video tape service provider
- Cloud service customer data
- Dynamic page
- Federal Secure Telephone Service
- Subject matter
- INTs
- Expression
- Records management program
- Photographer
- Key remapping
- Assurance of public key validity
- Universal Service Fund
- Thought leader
- Poker
- Online Dating
- .ht
- Newspaper
- Standard dissemination
- Instant messaging service
- Community Standards
- False alarm rate
- Inadmissible evidence
- Electromagnetic vulnerability
- Unclassified information
- Joint research agreement
- Social networking services
- Flaming
- Document medium
- Spectrum management
- Authorization policies
- Planted information
- Main memory
- Bot program
- Restore
- Real-time system
- Model
- Cyberhooliganism
- Law enforcement officer
- Equipment under test
- Industrial society
- Teaching toward
- Product release
- Online music subscription service
- Cost of digital exclusion
- Intelligence analysis
- SCRM
- Filtration test
- Design
- User-generated content world
- Boot sector virus
- Laptop
- Application Layer
- Chapter 7 bankruptcy
- Sysop
- Micro Air Vehicle
- Resource Description Framework
- Strategic Analysis
- Security range
- DoD Internal Standards
- CI investigation
- Roaming arrangement
- Critical Infrastructure Assurance Officer
- National Airspace System
- Guard
- Inadvertent disclosure
- Data reliability
- Identity information
- Wireless service provider
- Classification significance
- Distinguished Name
- Cloud service level objective
- Wireless game
- Inside threat
- Smart camera
- Aerial remote sensing
- Clearance
- Remote terminal
- Distribution channel
- Federal Rules of Evidence
- Operations and maintenance
- Networked storage
- Objective reputation system
- Speed
- Intelligence reporting
- Forensic-enabled intelligence
- Disaggregation
- Web-wrap agreement
- Logical partition
- Watchlist
- Consequence
- Wait time
- Freemium pricing
- Collective work
- Mail Abuse Prevention System
- Visual observer
- Controlled interface
- General damages
- Line feed
- Effective Radiated Power
- Security by design
- Classified contract
- Government-off-the-shelf
- Administrative incident
- Real-time Information Network
- Multifunction printer
- Character string
- Desktop Computer
- Post
- Punctuation mark
- Online community
- Data mart
- Disinfect
- Human technology environment
- Protocol stack
- App
- Big data
- DELTA
- Domain name registration
- External threat
- Counterfeit cashier's check
- Fixed-mobile convergence
- Component Data Steward
- Palming off
- Vehicle tracking system
- Restricted TLD
- Profits
- Online educational services
- Star topology
- .pk
- Identifying material
- Designed to call attention
- DomainKeys Identified Mail
- Personal data filing system
- Paypal
- Preventive measures
- Enterprise resource planning system
- Process innovation
- Cybersecurity incident management
- Key enabling technologies
- Saboteur
- Script kiddie
- Broadband
- Partial summary judgment
- Intercom
- Data Network
- Binding corporate rules
- Decentralized processing
- R&D consortium
- Computer resources integrated support document
- EDS Yellow Pages
- Address hygiene
- Enterprise risk management
- Data loss
- Humanoid
- Subscriber data
- Device and media controls
- Lessee
- Interconnected VoIP services
- Cardholder data
- Internet Explorer
- Post-transaction third party seller
- Mission critical
- Foreign policy control
- Infrastructure resilience
- Serial Copy Management System
- Scareware
- Guidance
- Serial copying
- RSA algorithm
- Antivirus software
- Reputation management
- Physical surveillance
- Hostname lookup
- Identity security
- Grid-friendly appliance controller
- GIG Sector
- Acronym
- Digital image
- Red teaming
- Software compatibility
- .gq
- Proxy service
- Moderate-resolution satellite
- Searchable
- Question of law
- Database engineering
- Untrusted process
- Framing
- Operating environment
- Coded file
- Password Guessing
- Long-lived digital data collection
- On-screen
- Graduated security
- Abuse of privilege
- Nanotechnology chip
- Email bombing
- Insurance telematics
- Biosurveillance
- Consideration
- Seed node
- Digital set-top box
- Access control center
- Network Trusted Computing Base
- Predictive text
- Motion for reconsideration
- Foreign Intelligence Service
- Bus
- Worm
- Licensed spectrum
- Application originated message
- Means-plus-function
- Country risk
- Anonymous
- Readability
- DoD Discovery Metadata Specification
- Risk-transfer strategies
- Disseminate
- Royalty fee
- Security modes of operation
- Utility program
- Receiving Depository Financial Institution
- Indirect consequence
- Information technology investment
- Token-based system
- Project champion
- FidoNet
- Customer information system
- Geodynamics
- Permutation
- Global information society
- Computer simulation
- Card accepting device
- Threat landscape
- MPEG-4
- Automatic Train Supervision
- Subversion
- Protection schema
- Remote exploit
- Customs value
- International Watch and Warning Network
- Cyber-enabled intelligence
- Web client
- Unintentional damage
- Going dark
- Security-relevant event
- Intelligence, surveillance, and reconnaissance plan
- Network defense
- Package
- Composite data element
- Health information management
- Zero-day exploit
- External disk drive
- Chilling effect
- Internet governance
- Basic authentication
- Advanced Passenger Information System
- Electronic key management system
- Designated accrediting authority
- Font
- Public Notice
- Accession
- Symmetric message authentication code key
- Spoliation
- Advanced narrowband digital voice terminal
- .arpa
- Intelligent computer network
- Electronically Alterable Programmable Read-Only Memory
- Rebuttable presumption
- Message modification
- Online video distributor
- Trusted data recipient
- Non-practicing entity
- Computer intrusion
- Application server attack
- Automatic identification technology
- Goddard's Law
- Cathode ray tube
- Appendix
- Enterprise application software
- Information appliance access point
- Data-in-motion
- Received signal strength indicator
- Internet communication
- Stand-Alone Automated Information System
- Ning
- Suite B cryptography
- Continuous data
- Recovery site
- Write-to-release
- Synthetic secret
- Best and final offer
- Bit rot
- Tabular data
- System modifying software
- ASCII
- Bitway
- Television station
- Electric system reliability
- Bluesnarfing
- Evolved packet core
- Name collision
- Mediation
- Disaggregate
- Economic consequence
- Augmented-reality system
- Power line communications
- Attribution problem
- Biometric feature extraction process
- Domain Name System Security Extensions
- Bluetooth
- Close access operation
- Outlier
- Computer-aided instruction
- Insurance
- Sonar
- Computer security object
- Frivolous invention
- Universal Serial Bus
- Information security management system
- Commercial leased access
- Transnational organized crime
- Strategic Homeland Infrastructure Risk Assessment
- INTELSAT
- Resolver
- Astrological reading scam
- Nonlocal maintenance
- Total Cost of Ownership
- Video-on-Demand
- Packet header
- Broadcast industry
- Electronic agent
- Information Technology Markup Language
- Digital preservation network
- Submenu
- False authentication feature
- Government Furnished Equipment
- Skimmer
- Implementer
- Collaboration
- Outer Space
- Audio mining
- Network discrimination
- Operating expenses
- Telephone network
- Access originator
- Media outlet
- Effective Isotropic Radiated Power
- IP blocking
- Disk drive
- Electromagnetic environment
- Major case prints
- Windows meta file
- Data injection
- .ag
- Local authorization
- Shrinkwrap license
- Spatial
- Accessible record
- Public telecommunications network
- Engineering
- Network integration
- Software interface
- High Terrorist Factor
- Zone
- Electronic Data Interchange Personal Identifier
- Circular
- Logical data independence
- Orphan Works: Statement of Best Practices
- Firm fixed-price contract
- Guest-hopping attack
- Alternate routing
- Mobile social network
- Telephony Denial-of-Service
- UUnet
- Financial services industry
- Semantic metadata
- Cloud operating system
- .at
- Auction
- Geopolitics
- National critical infrastructure and key assets
- Virtual object
- Bottom-up
- International application
- Sendmail
- Fully autonomous weapon
- Access line
- Federal Telework: Additional Controls Could Strengthen Telework Program Compliance and Data Reporting
- Non-volatile memory
- Dependability
- Public
- Motion for partial summary judgment
- Network flow record
- Comparison
- Identification Card
- Least restrictive means
- E-health
- Data sovereignty
- Interest
- Linguistics
- Other wireline
- Automated storage and retrieval system
- Lottery
- Repeatability
- Moderator
- Computer manufacturer
- Implied warranties
- Insight Smart Discovery
- Secure subsystem
- Protected frequencies
- Warranty
- Chronological filing
- Generation Loss
- Autonomy
- Location service
- Consumer report security freeze
- Time behavior
- Security event auditing
- Memorandum of Understanding
- User-curated aggregator
- Everflux
- Author Created
- Classified research
- Security engineering
- Online Certificate Status Protocol
- Operational asset evaluation
- Management integration
- De jure standard
- Current intelligence
- Outside attack
- Metcalfe's Law
- Wireless Medical Telemetry Service
- Breach of duty
- Tangible costs
- Calling features indicator
- Insecure cloud interface
- Use Limitation Principle
- Adequacy
- Shutter control
- Unobservability
- Air tasking order
- Social gaming
- Microprogram
- Red Flag
- Iris scan
- Switching
- Access Control Decision Information
- Bona fides
- Productivity software
- Enhanced 9-1-1 service
- Dissemination and integration
- Dual criminality
- Research infrastructure
- Knowledge engineering
- Screen scraper
- Anonymous health information
- Temporospatial
- Ad server
- Apportionment
- Cyberfraud
- Supply chain attack
- Online behavioral tracking
- Current view
- Police Intelligence Operations
- Search warrant
- Packet network
- Unsolicited proposal
- Geospatial engineering
- Technological obsolescence
- Network Access
- ATSC 3.0
- SECAM
- Customer service provider
- Access agent
- Generalizability
- System entity
- Active surveillance
- Leading
- Asembling
- Interconnected network
- Zero Day
- Clandestine photography
- Media
- Impostor
- Thrashing
- Banner
- Trace route
- Culture
- Alternative work site
- Petabits per second
- Surveillance technology
- Release early and often
- Regrade
- Risk severity
- Documentation
- Trademark cancellation
- Knowbot
- Limitation of liability clause
- Statistics
- Hardware failure
- Building automation
- BES Cyber Asset
- Dialog Box
- Critical Infrastructure Information Warning Network
- Accessioned Records
- IT Service Management
- Public Switched Network
- Intellectual capital
- Frequency Assignment Plan
- Data-centric
- Records schedule
- Spellchecker
- Computer Chip
- Text
- White site
- Telephone voice response
- Work-at-home scam
- Secret
- Data deduplication
- Creation
- Manufacturing Execution System
- Compensating security controls
- Contract formation
- Indications watch officer
- Equator
- FM radio
- ADP security planner
- Embedded multimedia terminal adapter
- Fiber-to-the-node
- Intelligence files
- RAS tool
- GWAN
- Blogject
- In-Vehicle Infotainment
- Personalized pricing
- Policy intelligence
- Extensibility
- Vocabulary standards
- Computer Operation
- Drive-by installation
- Legal remedy
- Media exploitation
- Port-based security
- Job churn
- Conficker
- Secure working area
- Digital Clock
- Product standard
- Codification
- Kilohertz
- Knowledge economy
- Line of communication
- Cloud implementer
- Command and Control
- WEP key
- Classified Information Processing Equipment
- Administrative Contracting Officer
- Yahooboys
- Human-in-the-loop weapon
- Means of identification
- Cyberethics
- Cyber observables
- Machine-readable medium
- Null
- Substantial evidence
- Duty to preserve
- Security requirements
- Electric grid
- Technical attack
- E-mobility
- Cloud interoperability
- Enterprise-Content-Delivery-as-a-Service
- News aggregator
- Scanned image
- Unfair trade practices
- Play Mode
- Source
- Communications assistant
- Information systems security officer
- Variant
- Base unit
- Layout
- Essential elements of friendly information
- Covered defense information
- Shared source license
- Random number generator
- Trust
- Asynchronous transmission
- Internet edge
- Algorithm
- Cookie manipulation
- Local processing
- LTO
- Customer support
- Inside wiring
- Truncate
- Civil suit
- Secret parameter
- Digital record
- Command Line
- Dedicated Internet access
- Correlation
- Authentication Code
- Structured Data
- Cable programming service tier
- Pulverize
- Polygraph examination
- Technical surveillance device
- Naval tactical data system
- Service migration
- Adaptive routing
- Law
- Context awareness
- CAN
- Autonomous mode
- User Profile
- Federal Enterprise Architecture
- National Continuity Coordinator
- Binary number
- Emerging technology
- Late interest charge
- External network
- Value network
- Privacy risk
- BinHex
- Minor application
- Data controller
- P2P lending
- Angstrom
- Guarantor
- Source code editor
- Glossary
- Data interpretation
- Distributed ledger
- Sensed data
- Software client
- Verification rate
- Superstation
- Government-owned, contractor-operated
- Things-as-a-Service
- Cross media rating system
- Proxy agent
- VoIP service provider
- Day One
- Wireless Internet technology
- Dangling threat
- Workstation
- Deep Learning
- Software Update
- Unique user
- EXtensible Access Control Markup Language
- Hyperconnectivity
- Exfiltration
- Outage time
- Search and Rescue Repeater
- Copy-protected
- Message stream
- Capture
- Yellow Pages Concept
- Enterprise data warehouse
- SSL certificate
- Computational grid
- Policy filter
- Time-of-use pricing
- Signal transmission
- Latent print
- Labelling
- Cryptographic compromise
- Mobile application gateway
- Satellite cable programming
- Cloud orchestration
- Gray-hat hacker
- Safeguards Information
- Astroturfing
- Reciprocal agreement
- Intelligent modem
- Industry standard
- Voice network
- ISE-Suspicious Activity Report
- Variable Peak Pricing
- Service consumer
- Economic denial of service
- Network performance
- DOS file
- Comity
- Radio communications
- Password-protected
- Written warranty
- Connection speed
- Pseudocode
- Google Docs
- Civil information
- SDTV
- Virtual disk encryption
- Indecent
- Card Holder Unique Identifier
- Intelligence information
- Critical Information List
- Online encryption
- National security
- Warehouse attack
- Analog format
- Informed communities
- Lossless compression
- Hell or high water clause
- Outage restoration
- Transfer
- Decentralize
- Distributed network protocol
- Effluent/Debris intelligence
- Port scanning
- Adversary data
- Three-click rule
- Zone Signing Key
- Cable television system
- Software domain
- Degrees-minutes-seconds
- Contractor
- Private home viewing
- Interactive whiteboard
- Indefeasible right of use
- Computer-on-a-chip
- System noise
- Terrorist organization
- High-tech bus
- Alternative workplace arrangement
- Man-in-the-browser attack
- File header
- Transitioned employee
- Backscatter channel
- Brain Drain
- Advanced Wireless Services
- Google bomb
- Mootness
- Page visits
- Public figure
- Active server page
- Authors’ rights
- Information resources of business value
- Barrier to entry
- Satellite telecommunications industry
- Roving bug
- Micropatent
- Pull-down menu
- Private browsing
- Telemarketer
- Government Open Systems Interconnection Profile
- SNI protocols
- Intelligent clothing
- Service asset
- Selling, general and administrative expenses
- ICT company
- Information gathering
- Asset management
- Tablet
- Works of visual art
- Video programming
- Critical records
- Cell site data
- Browser fingerprints
- Maximum Capacity
- Like button
- .gw
- Intelligence cycle management
- Online Campaign
- Data key
- Unacceptable risk
- Battlespace Preparation Autonomous Undersea Vehicle
- Baseline security requirement
- Sector
- Living
- Remote computer
- Bad mouthing
- Net present value
- Off-the-record messaging
- Bastion host
- Unauthorized access
- Acceptable technology
- Communication interface
- Electronic vaulting
- Stakeholder
- In-memory processing
- Confidentiality level
- Logic gate
- Prime contract
- Service consumption
- Mistake
- Outsourcing Standard
- Puck
- Ring network
- Threat analysis
- Non-line-of-sight
- Descrambler
- Civil liberties
- Alphabetic
- Open security
- Black Market
- Accounting entry
- Symmetric cipher
- Hybrid threat
- Assisted Global Positioning System
- Point size
- Clinical decision support
- Cashing
- Multimedia file
- Partially exclusive license
- Diagnostic software
- Spectral data
- Consortium agreement
- Antiterrorism risk management
- Encoder
- Collection
- Electronic Billing (Claims, Eligibility, and Remittance)
- Industrial policy
- Off-hook
- Preservation
- Capacitor
- Frequency division multiplexing
- Remotely Piloted Aircraft Observer
- Intended signatory
- Hello domain
- DoD Secure Communications Device
- Reconverting bank (Check 21)
- Margin of error
- Perimeterization
- Wireless internet connection
- Mailbox rule
- IT Workforce Capability Assessment
- Cryptographic key lifecycle
- Spacebook
- Functional testing
- Ramp-up
- Computer industry
- Chinese Wall
- Hacker culture
- Microcode
- Sousveillance
- Concurrency
- Computing device
- Substitution
- Musical composition
- Short privacy statement
- Closed shop
- Delamination
- Retention period
- Distance education program
- Business data processing
- Reasonable care
- Fixity
- Negligent infliction of emotional distress
- Video dialtone
- Fail soft
- Green IT
- Analytical tool
- Tera
- Unobstructed device
- Accountability information
- Maintenance organization
- Simultaneous
- Performance metric
- Snippet
- Cybersecurity Capability Validation
- Human enhancement technologies
- Propagation
- Continuous speech recognition system
- Physical link
- Advanced service lines
- Level of uptime
- Electrical Engineering
- Local number
- Credit monitoring
- Interactive animation
- Access control card
- Hate Speech
- Rate limiting
- Advanced computing ecosystem
- Repudiation of data
- Configuration error attack
- Internet operator
- Risk exposure
- Bibliography
- Nanomanufacturing
- Red Green Blue
- L-commerce
- Gene
- Processing time
- Administrative simplification
- Application obfuscation
- Gaze tracking
- Voiceband data
- Acquisition systems protection
- Transmission medium
- Storage management
- ATM fraud
- Service tier
- Narrative information
- Page break
- Cost Plus Fixed Fee
- Hax
- Infected system
- Extrinsic evidence
- Motion for summary adjudication
- Wireline E911 network
- Deck
- SPIM
- Message broker
- Claimant
- Advance
- Broadcatching
- Packaged software
- Pen test
- Explore.Zip worm
- Violation
- Cost per impression
- Decipherable
- Computer network
- Institutional review board
- Special interest group
- Closed-loop
- Management countermeasure
- Voice channel
- Public key certificate
- Intent
- Land information
- Publication for opposition
- Duping
- Opposition
- End effector
- User-centric
- Semantics
- Science and technology diplomacy
- Expertise
- Applied intelligence
- Integrated Services Digital Network
- Homeland security intelligence
- Intercloud
- Non-removable magnetic media
- Per-message secret number
- Numerically-controlled industrial equipment
- Rights metadata
- Statutory damages
- Critical Intelligence
- Personnel file
- Videogame console
- Rounding
- Search box
- Racketeering activity
- Bit map
- Federal record
- Attribute-based authorization
- Voting system standards
- Defensive countermeasures
- Access profile
- Contents
- Amendment
- National Center for Education Statistics
- Fishbowl
- Cyberstrategy
- Evidence
- Corps
- Trenching
- Jurisdictional separations procedures
- Broadcast signal
- Operational analysis report
- Security kernel
- Substitute check (Check 21)
- Combat information
- Challenge and reply authentication
- Security function
- Baudot Code
- Data restoration
- Wireless mesh network
- Cyber asset
- Digital Marketing
- RED
- Telemedicine
- Privacy compliance
- Terascale
- Exclusion area
- On-Line Analytical Processing
- International terrorist
- Social Capital
- Abandonment of invention
- Mechanical rights administrator
- Large-scale system
- Cybercide
- Mail server
- Loss
- Host Identity Protocol
- Roamer
- Document-making implement
- Tribal lands
- Unclassified technical data
- Digital stratigraphy
- Personal computing device
- Chief Human Capital Officer
- Influence operations
- Micromarketing
- Cosmic
- Beta version
- Operational policies and procedures
- Back Door
- Abandoned record
- Energy management system
- Benefit fraud
- Functional permissions
- Concept
- Petit jury
- Malicious cyber activity
- Nanoparticle
- Fault tolerance
- Acting under color of law
- Confidential
- Authenticated encryption
- Voice over DSL
- Public trust position
- LoveLetter worm
- 3D
- Assignor
- Foreign intelligence information
- Closed storage
- Advanced communications engine
- Alert level
- Technology assessment
- Video tape recorder
- Common Access Card
- System software
- Certification agent
- Reload
- Medical image digitizer
- Frequency reuse
- B2B direct business model
- De minimis
- Consumerization of Information Technology
- Digital Radio Frequency Memory
- Hidden text
- Driver only
- Enterprise system
- Polling place internet voting
- Protocol analyzer
- Step-in rights
- Autonomic computing
- Application Reference Model
- Whistleblower
- Laboratory attack
- Bid defect
- Digital signage
- Autonomous agent
- Chief Operating Officer
- DNA Computing
- Electronic search
- Electromagnetic spectrum operations
- Mail server administrator
- SD Card
- Finding of fact
- Reliability flaw
- CC0 1.0 Universal (CC0 1.0) Public Domain Dedication
- Covert
- National Intelligence Estimate
- Project coordination
- Spatial reference system
- Orange Book
- Program analyzer
- Managed security services
- IO threat
- Redirection number
- Mobile cramming
- Biometric model
- Protest
- Hamming distance
- Dependent code
- Pure opinion
- Virtual mobile network operator
- Lidar
- Flash Memory
- Flooding program
- Computer-based evidence
- Administrative data
- Risk criticality
- Network station
- MMORPG
- Dual-mode vehicle
- Capability validation
- Windump
- Check validation services
- Alternating current
- Network administrator
- Compromised computer
- Damage to the national security
- Secure configuration management
- White space
- Building to Grid
- Consensus
- Economic loss rule
- Audit log
- Immutable audit log
- General information
- Customer list
- Personal data
- Falsification
- Molniya orbit
- Gnutella
- Fake check scheme
- Collective mark
- First-person perspective
- Motherboard
- Phishing kit
- Personal Health Information Technology
- Incentive auction
- Keypad
- Public-private partnership
- Cyber risks
- Recurring effort
- Malice
- Whorl
- Federated identity
- Loop detector
- Wright's Law
- Maskirovka
- Login screen
- Ghostware
- Electronic payment system
- Mobile site
- Third-party websites or applications
- Controlled variable
- IA Control
- Temporary storage
- Classified material
- Originating Depository Financial Institution
- Automated Tactical System
- E-skills
- Fiat currency
- One-time cookie
- Registration authority
- Public safety
- Automated information security incident
- Anonymous credentials
- Power Supply
- Fingerprinting
- Dropper
- Systematic declassification review
- Venue
- Cyber vandal
- Operational effectiveness
- Guest OS
- Patch management
- Territoriality
- Verification surveillance
- Accidental
- Person of Interest
- Bring Your Own Wearable
- Commission
- Parental consent
- Adaptive keyboard
- Agency controlled mobile device
- Stylus
- Electronic authentication
- Risk criteria
- Key agreement
- Summons
- Collateral effect
- Copyright Office Registration Cataloging System
- Electronic journal
- Remote diagnostics/maintenance
- Judgment on the pleadings
- Universal exchange language
- Related Searches
- Trust validation
- De-identification
- Data destruction
- Certification and accreditation
- Anonymize
- One-way
- Data marketplace
- Millisecond
- Simple mail transfer
- Proximity
- Electronic data capture
- Haptic technology
- Information in identifiable form
- Decision table
- Adjudicator
- Bits per pixel
- Distributing institution
- Memory dump
- COMSEC custodian
- Remote
- Government records
- Voice communication
- Clinical data
- Mesh router
- Edge device company
- Programmable automation
- Ultra low frequency
- Network-attached storage
- Phisher
- Electronic signature
- Acoustic communications
- Administrative records
- IRC server
- Interactive white board
- Ultrawide band
- Digital storyteller
- Inventory control system
- Transmission line
- Reformat
- Online access agreement
- Global interrupt latency time
- Procurement system
- Free Speech
- Content validity
- Gank
- Life-enhancing information
- Fuel Cell
- Clarke Belt
- General Wireless Communications Service
- Motion to transfer
- Defensive counter cyberspace
- Video description
- Data preservation
- Multispectral imaging
- Mean time between maintenance
- Loop-back mode
- Automated surveillance system
- Secure Terminal Equipment
- Authenticate
- Intelligence failure
- Alternative method of entry
- Buffer overflow
- Key performance indicator
- Bulk Electric System (BES) Cyber Asset
- Monophonic ringtone
- Domain name address
- Second generation language
- Enterprise Mobility Infrastructure
- Tempest
- Constructive knowledge
- Free-to-pay
- InterNational Committee for Information Technology Standards
- Leveraging
- Digital appliance
- Feedback control
- 24X7
- Computer-mediated network
- Bit preservation
- Substituted service of process
- Mobile carrier billing
- Exchanger
- Administrative control
- Critical National Information Infrastructure
- Understandability
- Schema
- Radio frequency interference
- Electronic attack data message
- .hm
- Ridge ending
- Special drawing rights
- Optical mark recognition
- Interactive entertainment
- Unit of measure
- IA-enabled product
- Mere descriptiveness
- Certification authority software
- Voluntary standard
- MP3 file
- Confidentiality-protected information
- Risk probability
- Trade Agreement
- Service deployment
- Configuration data
- De jure
- Physical safeguards
- Relevance
- Customer information
- Search engine marketing
- Fuzzing attack
- IoT Architectural Reference Model
- Capital Planning and Investment Control Process
- Biological
- Compressed file
- Foreign computer intrusion
- Remote-sensing imagery
- Derivative classification
- Access to classified information
- Cyber Security Evaluation Tool
- Paying bank
- Salting
- Token copy
- Airborne electronic attack
- Littoral Battlespace Sensing-Autonomous Undersea Vehicle
- National Airspace System Voice System
- White Hat Hacker
- DNA template
- Protected system
- Common Internet File System
- Application tool
- Avionics
- Safe Mode
- Above-the-line costs
- Bursty
- Network discovery
- BIT
- Assessment object
- Treaty
- Derf
- Human-out-of-the-loop weapon
- Provable prime
- DNA profile
- Meaconing
- Token
- Risk description
- Critical asset
- Abbreviation
- Circuit-switched digital network
- Course of dealing
- Advanced RISC Machine
- Broadband Passive Optical Network
- Prejudicial error
- Master files
- Habeas corpus
- Professional analog video cassette recorder
- Comparability
- Patentee
- Levi guidelines
- Persistent data
- Key Signing Key
- Magnetic remanence
- Processor serial number
- E-readiness
- Information fratricide
- Geodetic product information
- Session hijacking
- Handwritten signature
- Government Purpose License Rights
- Good Game
- Digital device
- Internet economy
- Desktop productivity tools software
- Multi-data-stream processing
- Group
- Research and Development Degree of Difficulty
- Market survey
- Acquiescence
- Listing
- IFP
- Endorsed Tools List
- NODC
- Creeper virus
- Radiocommunication
- Voice identification
- Nonconforming goods
- Node board
- Authentic document
- Delete
- Electronic banking
- Web designer
- Browser-safe colors
- Identity-based access control
- Assignment
- Wi-Fi access point
- Consumer survey
- Binary Code
- Unbundle
- Advertising results
- Informatics
- Scope of claims
- Horizontal integration
- DMCA takedown notice
- Anticipation
- Location-based service
- Lease agreement
- Probative
- Rich Text Format
- Broadcasting
- Differential Pulse Code Modulation
- Audioconferencing
- Operational environment
- Resale price maintenance
- Schematic diagram
- Non-developmental item
- Testability
- Access cross domain solution
- Computerized branch exchange
- Transfer of copyright ownership
- Maintenance Key
- File system
- Dual band
- Microphone
- Trustworthy Digital Repository
- Patently offensive
- Plagiarism
- Redundancy
- Block diagram
- Critical operations
- Cost-per-click
- Deidentified data
- Widespread outage
- Mobile endpoint
- Auto-complete
- Burn Rate
- Carrier pre-selection
- Packet routing
- Closed loop system
- Invisible button
- On-site
- Data visualization
- Public information
- Downgrading
- Online speed test
- Offensive counter cyberspace
- Twishing
- Genetic engineering
- Combat
- Not
- Irreparable injury
- Monograph
- Indispensable party
- Software platform
- Standby service
- Browser fingerprinting
- Vishing
- Transmission Line Monitoring System
- Global Network
- Graphics hardware
- Product description
- Journalism
- Telecommunications fraud
- Archived video stream
- Brownfield
- Predisposing condition
- Geographic information system
- Information fusion
- Foreign internal defense
- Research
- Common Short Code Administrator
- Barter transaction
- CryptoWall
- Information management
- Piracy
- Digital orthoimage
- Electronic media
- Bug bounty
- Materials intelligence
- Controlled Cryptographic Item
- Majority opinion
- X.509
- Consultant
- Background process
- Translation
- Software Security Assurance
- Random attack
- Maker movement
- DOS interrupt
- Internal control
- IS-136
- Deliberate exposure
- Visual
- Actor
- Risk transfer
- On-line attack
- Illegal
- Later round
- Remote access trojan
- Malware
- Electro-optical
- Update rollup
- Smart Grid domain
- Air-gapped network
- Mobile standby
- Smartmob
- Enabling technologies
- Objectivity
- Point of Contact
- Coded
- Automatic Flight Control System
- Confirmation e-mail
- Wrapping algorithm
- Studio
- On the Fly
- Malicious attack
- U.S. Government-Wide Standards
- Speaker recognition
- Internet pharmacy
- Digital scientific data
- Net-centric architecture
- Address format
- Account fraud
- Electromagnetic spectrum operational planning
- Administrative safeguards
- Information product
- Arrest
- PlayStation Portable
- Network mapping
- Multispectral
- Security research
- Chemical and biological intelligence
- Certificate registrar
- Keyword stuffing
- Local data
- Human trafficking
- Degausser Product List
- Service mark
- Privateering
- SMS gateway
- Sandboxing
- CPA Webtrust
- External information system
- Property Tax
- Influential scientific information
- Capital planning
- Information bit
- Hard disk platter
- AMI communications network
- Subtraction method VAT
- Session visitor
- Convert
- Configuration Item
- ADP security officer
- Canister
- Salami technique
- National security threat
- Breach notification clause
- OpenNet
- Security Safeguards Principle
- Data corruption
- Enabler
- Requirements Traceability Verification Matrix
- Text file
- Sound recordings
- Administrative Domain
- One-way hash algorithm
- Lost profits
- Certification mark
- Visitor
- Window manager
- Low-interaction honeypot
- Medical intelligence
- Nanorobot
- Logical format
- Data Item Description
- Microblog
- Waterfall model
- Visualization
- DSL in a box
- Mobile browser
- Client-side
- Central computer facility
- Equivalent
- Automatic failover
- Transactional security
- Sweep jamming
- Operate
- Proprietary content
- W00t
- North American Industry Classification System
- Frames
- Reversibly anonymized data
- Cloudsourcing
- Single-level device
- Binder
- Electronic transmission
- Assumption of risk
- Data Encryption Algorithm
- Port scanner
- Full-feature operating system
- Hide
- Data Encryption Standard
- Littoral data
- Subscription-based pricing model
- Privacy by design
- Capital expenditure
- Electromagnetic surveillance
- Online social networking
- Far-field communication
- Multimedia
- Physical data independence
- Storage allocation algorithm
- Advanced city car
- Open media
- Cybersecurity control assessment
- Biometric match
- Asymmetric attack
- Physical migration
- Identity verification
- Participation television
- Hash algorithm
- Reciprocity
- Signature verification
- Sticky content
- Switched access service
- Write
- Writ of mandamus
- Workaround
- Full back-up
- High assurance guard
- Transmural care
- Resource sharing
- Processing and exploitation
- Hardwired
- Remote device
- Test readiness review
- Full and open competition
- Internet
- Dynamic circuit network
- National Security/Emergency Preparedness
- Provisioning
- Black equipment
- Synthetic data
- Data Warehouse
- Dynamic Spectrum Access
- Commercial satellite
- Virtual access controls
- Toolbar
- Level-of-Concern
- KeyStroke
- Near-field communications device
- Verifying party
- Network
- Atomicity, consistency, isolation, durability
- Software distributor
- Web access log
- Physical digital
- Red-pencil doctrine
- New vs. returned visitor
- Cease-and-desist letter
- Fiber optic node
- Hypertext
- Electronic system
- Money transmitter
- Mobile advertising
- Backbone operator
- Foundation-based Operation
- Optical device
- Original application
- Automated message system
- Netscape Navigator
- Affinity marketing
- Clipboard
- Embedded system
- Demon dialer
- Electromagnetic
- Peering agreement
- National Broadband Availability Target
- Gamer
- Synthetic environment system
- Customer verification
- Wireless spam
- Iris
- Extraterritoriality
- System file
- Background Information
- Bits per inch
- Signal
- Security risk
- Target
- Binding precedent
- ISO 13485
- Horizontal segment
- Custom processor
- Consumer Sentinel
- Cyber
- Sitemap Protocol
- Genuine issue of material fact
- Mandatory deposit copy
- User name
- Pornography
- Security Category
- Gesture recognition
- Infected File
- Source address
- Label
- Unlicensed national information infrastructure
- Unlicensed equipment
- Software user
- Threat shifting
- Beachfront spectrum
- Disk reformat
- Networked system
- Reckless
- Preferred bidder
- Phase synchronization
- Routine use
- VSkimmer
- Domestic counterterrorism
- Certificate of Authorization
- .com
- Body
- Reader spoofing
- Comparably efficient interconnection
- Escalation management
- Contracting party
- Private network
- Fuzzing
- Slider
- Flow analysis
- Packet switch
- Assessment method
- Land remote sensing
- E-prescribing
- Integral file block
- Exclusionary rule
- International Morse Code
- Electronic reconnaissance
- Accidental hazard
- Videoconference
- Actionable information
- Digital mapping
- WHOIS query
- Docket
- Agency issued mobile device
- Conformance
- Magnetic stripe
- Information dissemination
- SQL injection vulnerability
- Accelerometer
- Environmental failure protection
- Scholarly discourse
- Memory scavenging
- Postprocessor
- Highlight
- Money mule
- Maximum bit transfer rate
- Caching server
- Geolocation database
- Disassembly
- Task Force
- Utility
- Solicitation document
- Low Earth Orbiting LUT
- .al
- Telenursing
- Centralized virtual currency
- Biometric trait
- Severe disruption
- Shell program
- Designated community
- DomainKeys
- Passport
- System assessment
- Passive defense
- Reasonable level of protection
- Jaggies
- Erase
- Enforceable contract
- Adobe Shockwave
- Prosecution history
- COTS software
- Emoticon
- Invalid patent
- Intercept Related Information
- Gigabit point of presence
- Mission-critical system
- CD-R
- Cyber critical infrastructure
- Citizens band radio station
- Unintentional
- Contextual information
- Strategic intelligence
- Organizational innovation
- Ex ante negotiation
- Craigslist
- Reasonable cost
- Deliberate compromise
- Behavioral analytics
- Access master
- Doctrine
- IMAP
- Interactive terminal
- Passive services
- Always-on
- Clock speed
- Surface web
- Disruption
- Virus obfuscation techniques
- Major system
- Floating point
- Digital photography
- Inter partes
- Primary Mission Essential Functions
- Intermodal competition
- Vital equipment
- Telework
- Masquerader
- Fiber Optic Link Around the Globe
- Smart mob
- Self-replication
- Transaction signing
- Naked license
- Descriptive metadata
- Encryption licensing arrangement
- American National Standards
- Digital Identity Lifecycle Management
- Human factors
- Mobile marketing
- Cat-6
- Class A station
- Googol
- Information Transfer
- DVD+R
- Version control system
- Information Technology Management Strategic Plan
- Innovation
- Exascale
- Redirect
- Autoresponder
- Benefit of the bargain
- Prevention
- Intercommunication
- International governmental organization
- Input validation attack
- Cryptoperiod
- Ensuring document integrity
- Open Smart Grid
- Mod chip
- Social platform
- Clean install
- Email redirector
- Mnemonic
- On-demand self-service
- Server application
- Unambiguous, free and informed consent
- Paid per inclusion
- Pure cybercrime
- Electronic evidence
- Access control software
- Microinstruction
- Trap Door
- Operational intelligence
- Webtribution
- Replaceability
- Security anomaly
- Geosphere
- Non-local maintenance
- Official information
- Top Secret
- Competitive bidding
- Indirect damages
- Regional Cyber Action Team
- ADP equipment
- Satellite television
- Lock Up
- Inkjet printer
- Sentient computing
- Qualitative data
- Phased conversion
- Re-identification risk
- Distributed trust
- DVD-R
- White-collar crime
- Data sharing
- Regulator
- E-ballot
- Perl
- Click
- Mezzanine debt
- Software vendor
- Generation
- Information Repository
- Electronic mail service provider
- Dashboard
- CMOS
- Create, Read, Update, Delete
- Side letter
- Strategic Plan
- Polar orbit
- Scanning resolution
- Authenticated identity
- Cyber vulnerabilities
- Transactional processes
- Information assurance test bed
- Error log
- Semi-structured data
- Epistemology
- Anonymizing tool
- Networked information system
- Communications security equipment
- Digital provenance
- Headend router
- Security authorization
- Second mile
- Search agent
- Paging
- Server
- Supercomputer
- Subscription television
- Financial services
- Terabit per second
- Tor
- Manmade threat
- Electronic data discovery
- Discrete process
- Credit report
- Record material
- Smart Traffic
- Facilitator
- Strategic alliance
- Baseband
- Royalty rate
- Covert security testing
- Secure payment gateway
- Individually identifiable health information
- Internet of Things, Services and People
- Modular development
- Shortened statute of limitations
- Mistake of fact
- Non-GIG IT
- MOPO
- Google TV
- Geographic indication
- Subscription upseller
- Scramble
- Benchmark test
- Custom-developed code
- Federal Tax Information
- Disk imaging
- TinyOS
- Creative Commons Public Domain Mark
- Operation phase
- Rational basis
- Mission Statement
- Google Glass
- Cell Phone
- Digital out-of-home
- Location awareness
- Spam blog
- Privileged user
- Operational risk
- Standard Operating Procedure 303
- Decimal number
- Cost-plus award fee contract
- Soft infrastructure
- Clandestine intelligence collection
- Ad blocker
- Full disk encryption
- Subscription television program
- Guidance system
- Security certificate
- Block
- Bid shielding
- Geofencing
- Web portal
- Aggregate liability
- TYPE SIZE
- Two-person integrity
- Acceptable level of risk
- Audio frequency
- Independent Verification and Validation
- A la carte
- Number
- Messaging standard
- Batch processing
- Just-in-time
- Electromagnetic hardening
- Cutting edge
- Resource exhaustion attack
- Handheld device
- Deductible
- 3-D scanner
- Chat
- Megabits per second
- Systematic process
- Call sign
- Alternative input device
- Automated password generator
- Knowledge-based economy
- DR1440-002
- Adaptive risk
- Internet border router
- Agreement
- Identity authentication
- Broadcast license
- Copyright Imaging System
- Mobile Security
- Frequency
- Exterior Gateway Protocol
- Contempt
- JPEG 2000
- Persuasive precedent
- Contractor Performance Assessment Review System
- Mediation function
- Capability computing
- Application Front End
- Electronic warfare reprogramming
- Double flux
- Restricted use
- Defense Automated Visual Information System
- Access control service
- Exposure
- Content confidentiality
- Computer-related crimes
- Interactive software
- Space-based PNT
- Federal Internet Exchange
- Recall
- Emergent intelligence
- Public official
- Non-sensitive data
- .ax
- Facility clearance
- Ripping
- Interoperability framework
- Bibliographic information
- Intelligent electronic device
- Publicly available technology and software
- Solid state hard drive
- Electronically created payment order
- Data throughput
- Radio Beacon
- FTE
- Video Clip
- Write-protect
- Records creation
- Information system general controls
- Telecommunications subsector
- Secrecy
- Criteria
- Application protocol
- Needs determination
- Packet-switched network
- Widget
- Information system component
- Decimal point
- Task
- Machine controller
- Active content
- Data integrity service
- Human-on-the-loop weapon
- Query
- Data Dictionary
- Moderately interactive website
- Tethering
- Terrestrial broadcast station
- Want To Buy
- Air traffic management
- Attack pattern
- State action doctrine
- Knowledge-intensive economy
- Software verification
- Environmental impact statement
- Multiplexing
- Tamper-evident hardware
- Internet exceptionalism
- Subcategory
- Mitigate damages
- Composite personal information
- Gigabyte
- GPS constellation
- Closed network
- Telegraph
- Physical security perimeter
- Autonomous network
- Intelligent Vehicle Highway System
- Spreadsheet
- Jailbreaking
- Build versus buy
- Virtual goods
- Dual-interface chip smart card
- Access level
- EDS Blue Pages
- Geographic location
- Decibel watt
- Access charge decision
- Settlement
- System denial
- Silo
- Remote user
- CM Authority
- Light pen
- Vaporware
- Anti-trafficking
- Electronic attack
- Demographics
- Enterprise resource planning
- Organization chart
- Offline storage
- Network protection
- Gilder's Law
- Protocol of intelligence collection
- Big data paradigm
- Noncopyrightable
- Smart object
- Cryptographic key management system
- Clock
- Hardware platform
- Geospatial mapping
- Micrographic
- Knowledge base
- Coordinated cyber-physical attack
- Survey scam
- Advanced communications infrastructure
- Continuation-in-part application
- Detect and avoid
- Security Vulnerability Assessment
- Elevation data
- Contactless smart card
- Access network
- Reality
- Sub-Loop Unbundling
- Financial market infrastructure
- Strength of function
- Mobile work
- IA Authentication
- Information processing outsourcing
- Calm technology
- Cyberspace operations
- Scientific information
- Mebibyte
- Identifying information
- Icon
- Triple Play
- Collaborative learning
- Frame relay
- Intelligence data handling system
- Fax
- Offensive counterintelligence operation
- Uncloak
- Public disclosure
- Member of the public
- Time on page
- One-time cryptosystem
- Aural surveillance
- Repair or replacement
- Domain parking
- Access method
- Alert phase
- Million Theoretical Operations Per Second
- Should
- Transmission authentication
- Internet of Things security
- Embedded link
- Manmade unintentional cyber incident
- Identifiable form
- Application file
- Explicit
- Associated information
- Terrestrial environment
- Privacy field
- COMSEC monitoring
- 3-D printer
- Redact
- Sandbox escape
- Scrolling
- Privacy Threshold Analysis
- Synergy
- Touchscreen
- Minicomputer
- Gazelle
- 3rd Generation Partnership Project
- Modularity
- Common cybersecurity control
- Access control check
- International organization
- Schematic
- Incremental Program Strategies
- Advanced metering
- Azimuth
- Area code
- Active information
- Multiple agency distribution
- Enduring intelligence requirements
- Click happy
- Bottleneck
- Designated security officer
- Treble damages
- ENCOMPASS
- On-demand
- Economic espionage
- Breach of the security of the system data
- Infrared imagery
- Gift
- Carrier wave
- Sandworm
- Cable modem termination system
- Identified
- Air gap
- Data reduction
- Mobile entertainment
- Adult Content
- Bookmark method
- Media Literacy
- Defense Information Systems Network
- Economic damages
- Website
- Collision avoidance
- Digital orphan
- Interactive Video Disc
- Confidential communication
- Smart metering system
- IP spoofing
- Bandwidth as currency
- Malicious code
- Outward-looking sensor
- International Standard Serial Number
- Domain name system poisoning
- Wrapper format
- Intra-message threat
- Accurateness
- Marketing
- Monitoring software
- VBScript
- Certificate-based authentication
- IP redirecting
- Have Quick
- Central air data computer
- Battery-Assisted Passive Tag
- Neutralize
- ICT product
- Networked device
- Source Selection Plan
- Preservation strategy
- Mediator
- Fiber-optic strand
- Beneficiary
- Identity Ecosystem Framework
- Structural separation
- App economy
- Transmission information
- Acoustic fingerprinting
- High-impact system
- Root of Trust
- Proximity token
- Cloud service developer
- IntelliDrive
- Black signal
- Blended threat
- Commodity service
- Digitized file
- Battlespace
- Trusted path
- Compatibility
- Teleconferencing
- Multiple tax
- Media neutral
- Subtotal
- Joint intelligence preparation of the operational environment
- Cyber enterprise management
- Commercial key escrow service
- Data collections universe
- Data resource
- Tying arrangement
- Domain name space
- Attrition
- Capitalization
- Visitor control
- Disk cache
- Proprietary
- X.509 public key certificate
- Co-Branding
- Cryptographic hash algorithm
- Communications path
- International Reference Alphabet
- Standard security procedures
- Electronic piggybacking
- Physical industries
- Revision control
- Autonomous System Number
- Cover sheet
- Civic intelligence
- High-speed access
- Electronic microimage transmission
- Conference Report
- Middle mile
- Daisy Chain
- Packet Filter
- Earnings per click
- Distributed database
- Bar code verifier
- Device-to-device
- Network scanner
- Orthoimagery data
- Third-party sender
- Invalid
- Rating system
- Object
- Host-protected area
- Encipherment
- Immigration data
- Data flow
- Aggregator
- Contextual menu
- Application Back End
- Disassociability
- Federal regulation
- Military Information Support Operations
- Unambiguous
- Write protection
- Telework managing officer
- Geocoding accuracy
- Pay-per-view
- .hk
- Attribute Authority Revocation List
- Site license
- Distinguished name
- Cut-through
- T3
- Distributed data processing
- Automated information system application
- Reportable Cyber Security Incident
- Unified Nursing Language System
- Electric vehicle
- Gamepad
- Portfolio
- Refusal to deal
- Staging
- Privacy unconcerned
- Digital immigrant
- Fonds
- Arbitrary code execution
- Decompiler
- Portfolio PAE
- Incremental back-up
- Global War On Terror
- Two-factor authentication
- Constant bit rate
- Computer-aided
- Gateway device
- Trade-Off
- Heap
- Trusted Introducer
- Temporal data
- Litigant
- Transaction fee
- Technology neutrality
- Minimize
- Control character
- Digital eantity
- Screen name
- Asset
- Hung
- Simple Network Time Protocol
- Vendor neutral
- Digital story
- Boring
- Oral information
- Network Access Control
- Host-based firewall
- Privacy fundamentalist
- Email social engineering attack
- Internet video
- Thin terminal
- COMSEC officer
- Disintegration
- Published work
- Incident data
- Token restore
- Head-end system
- Next-generation network
- In rem
- Web client attack
- Sponsored results
- Permissions
- Microcomputer
- Galileo
- Credit Rating Agency
- Zero Sum Game
- CcTLD
- Queue
- Access BPL
- Hard bounce
- Access Code
- Unconstrained network
- Microsoft Windows registry
- Social networking site
- Transmission Control Protocol
- Mens rea
- Inference engine
- Common user interface
- Footprint
- Small to medium enterprise
- Recording Studio
- Standard industry practice
- Initial operational capability
- Edition
- Radiometer
- Biological agent
- Reaction GIF
- Analog hole
- Tax moratorium
- Scheduled records
- Objective territorial jurisdiction
- Clarity
- Always On SSL
- Data bank
- Blue-pencil doctrine
- Fingerprint identification
- Device generated data
- Accounts Receivable
- Technology Development Strategy
- Measurement error
- Parsing
- Command, Control, Communication and Information Systems
- Active cyber defence
- Authority to Operate
- Architecture governance
- Full and open exchange of data
- Group chat
- Industrial security
- Domestic terrorism
- Password
- Bitcoin Exchange
- Configuration Management Policy
- Record length type
- Acquiring technical operator
- Stateful evaluation
- Information Technology Laboratory
- Electronic record
- Cloud server
- Gigabit Ethernet
- Reliability, availability and serviceability
- Administrative summons
- Prima facie evidence
- Copy
- Data teleconferencing
- Information system owner
- International nongovernmental organization
- Electronic archiving
- Data Collection
- Metatag
- Fraud resolution systems
- Geostationary
- Records center
- Targeted
- Verification system
- Enterprise-wide
- Character set
- Termination for Cause
- Absolute location
- Targeting
- Negative know-how
- Business rules engine
- Exemption 3 statute
- Aid and abet
- Department Security Officer
- Storage allocation
- Genericide
- Polyphonic ringtone
- Data owner
- Constructive reduction to practice
- Global information environment
- Data historian
- Trademark license
- Emission control
- Website operator
- CAPS LOCK
- Tort
- National Reconnaissance Office
- Electronic assembly
- Altavista
- Message replay
- Prosecution
- Analysis
- IBM PC compatible
- Interactive courseware
- Raster image
- .gm
- Minimum Essential Emergency Communication Network
- Critical Infrastructure Partner
- Glove-input device
- Non-deterministic noise
- Mass surveillance
- Attack surface
- Operationalizing cyberspace
- Manmade deliberate threat
- Demon program
- Common control provider
- Executory contract
- Biometrics Application Programming Interface
- Hexadecimal
- Bioprinter
- 404 Error
- Line-of-sight signal propagation
- Bar coding
- Assessment Information Management System
- Insider threat
- ATM card
- Motion to dismiss for lack of personal jurisdiction
- Dedicated trunk
- EInclusion
- Matching agency
- Typesetting
- Incumbent local exchange carrier
- File series
- CyberLearning
- Wireless Markup Language
- Vagueness
- Null route
- Total digital transfer rate
- Networkable
- Clandestine code
- Windowing system
- Circular orbit
- Nomadicity
- Touch-tone
- Anonymous post
- Authentication header
- NAFTA
- Motor controller
- Emergency Medical Radio Service
- IT security policy
- Weapon of mass destruction
- Palm print
- Common Announcement Interchange Format
- Fax over IP
- Agreement to operate
- Remotely piloted aircraft
- Combination patent
- Authentication error
- High resolution
- Security area
- Converging technologies
- Administrative alert
- Right of last refusal
- Distributed environment
- CERT.Brazil
- Data Recovery
- Digital computer
- Technical operational intelligence
- Electronic and information technology
- Actual knowledge
- ANSI ASC X12
- Profession
- Increasingly autonomous system
- Internet extortion
- Regulatory sandbox
- Impulsive emanation
- Foreign instrumentation signals intelligence
- Phonogram
- Banner grabbing
- National Institute of Standards and Technology Interagency or Internal Report
- Difference score
- Mydoom
- Motion to compel arbitration
- Cost-per-customer
- Criminal intrusion
- Outage information
- Information transfer network
- Geographical indications
- ZIP code
- .int
- Artifact
- Portable computer system
- Subscribe
- Air interface
- Video Recording
- Cloud gaming
- Experimental development
- General Packet Radio Service
- Computer-to-computer communications
- Network gateway
- Anticompetitive conduct
- Digitizer
- Management message
- Common Operating Picture
- Original development manufacturer
- Human technology interface
- Account compromise
- Public safety answering point
- Security Measures
- Critical intelligence parameter
- One-way communication
- Addition method VAT
- Frequency-shift keying
- Stored Value Cards and Other Nontraditional Access Mechanisms
- Information user
- Distributed robotics
- Weight
- Neologism
- Sequential
- Dependent claim
- Incident detection
- Fungible goods
- Debtor
- Accurate data
- Ampersand
- Open band
- Statement of objectives
- Domain name extension
- Absolute device
- Trademark assignee
- Heterogeneous
- Audible signal
- Card holder
- Stealth virus
- IT software
- Function
- System context
- Hydrography
- Esoteric communications
- Cartel
- Upstream traffic
- Placename
- Rating site
- Performance specification
- Cardholder
- Pandemic risk
- Run time
- Nailbed identification
- Green Dam
- Autonomous technology
- Service portability
- Out–of–band
- Local Exchange Carrier
- Computer scientist
- Bright-line restriction
- Frame
- Patent misuse
- Tactical electronic reconnaissance
- Z-wave
- Softswitch
- Split tunneling
- Splash screen
- Blue-hat hacker
- Policy Statement
- Microgroove disc
- Pushbutton
- Coherence
- D channel
- Honeynet
- Theatre
- Foreign terrorist organization
- Terrestrial
- Integrated Customer Communications Environment
- Endorsed Cryptographic Products List
- Predicate offense
- Carrier billing
- Developed
- Browsewrap license
- Multi-agency contract
- Keyword filter
- Social trading
- Diagnostics
- Legacy media
- Representational state transfer
- First-person shooter
- Information security policy
- Space science
- Humanware
- Privacy, civil rights, and civil liberties policy
- Structured data entry
- Mobile short
- Multimedia Messaging Service
- Communication-related information
- Data administration
- Chain of command
- Propaganda
- Application whitelisting
- Credential validation
- Geospatial information and services
- Blind carbon copy
- Cloaking
- Payment
- Bug report
- Asymmetric signature system
- Memory device
- Step-down transformer
- Wireless wide area network
- Tax
- Indications and warning intelligence
- Media cluster
- Programmer
- Seed money
- Petascale
- Advanced driver assistance system
- Linkability
- Development phase
- Model law
- Multi-User Virtual Environment
- Fixed-link
- Consequence mitigation
- Data governance
- Sexual harassment
- Iris Exchange Program
- Altitude
- Binary executable file
- Attribute value
- .pg
- Bibliometric data
- Electronic Benefits Transfer
- Author-centric
- Universal Access
- Famous marks
- Identity-related crime
- Telecommand
- MICR line
- Digital media player
- Kerning
- Active state
- Usurpation
- Rekey
- Data Field
- Thin client
- Passive remote sensing
- Guessing entropy
- Optical splitter
- Second Life
- IT Steering Committee
- Quantitative risk assessment
- Digital commodity
- Closeout
- National standard
- Body area network
- Output block
- Active tag
- Capacity computing
- National Cybersecurity Awareness Month
- Broadband Metropolitan Area Network
- Combat intelligence
- Sensor Node
- High confidence
- System Development Life Cycle
- Data performance plan
- Senior Agency Official for Security
- Acknowledgement
- Reconnaissance
- Descriptive mark
- Next Generation Access
- Clawback clause
- Information superiority
- Go-live
- Power electronics
- Commercial electronic text message
- First Responder Network Authority
- 50-Cent Party
- Asymmetric cipher
- Copyright applicant
- Cyber layer
- Data-over-voice
- Fiduciary currency
- Application security testing
- Cognitive vehicle
- Query string
- Unicasting
- Operational data store
- Employee manual
- Geographic information science
- Flowdown
- Security fault analysis
- Converged network
- Mobile Location Analytics
- Secure domain
- Sensitive personal data
- Declaratory relief
- Preauthentication
- Asymmetric threat
- Direct consequence
- Human-readable interpretation
- De facto standard
- Self-correcting
- Human-information interaction
- Satellite relay
- Storage migration
- Publications
- Trademark counterfeiting
- Director's Daily Report
- Communication-based train control
- Broadcast auxiliary service
- Acquisition
- Information operations
- Traveler information system
- Key server
- Base station
- Inspection
- Economic crime
- Processing year
- Cyber adversary
- Private Internet Exchange
- Optional requirements
- Creativity
- Source documents
- Listening
- Certificate Status Authority
- Traffic analysis attack
- Negative benefit
- List server
- Coaxial cable
- Brick
- Government Coordinating Council
- Utilities
- Phreaking
- Low-power television station
- Depositary bank
- Significant consequences
- Hack
- International Nonproprietary Name
- Manufacture
- CPS reference architecture
- Electric sector
- BIBFRAME
- Public broadcast
- Virtual Private Network
- K-anonymity
- Significant deficiency
- Directly identifiable data
- Geo-blocking
- Dissemination of intelligence
- U.S. Court of Claims
- Measured services
- Server Appliance
- Reader server
- Usage in trade
- System designer
- Macro language
- Smurf
- Multiple Input, Multiple Output
- One-way radio
- Underblock
- Network Layer
- Asynchronous operation
- Critical cluster
- Mission consequence
- Enjoin
- Freely redistributable software
- Analog image
- Document scanner
- Topographic map
- Data terminal equipment
- Filler character
- Natural threat
- Electronic communications network
- Local government
- Networked game
- Application
- Conus
- Fabless
- Frye standard
- Doorway page
- Parallel development
- Web browser cache
- Exculpatory clause
- Cross-sell
- Kermit
- Law of the case doctrine
- Longitude
- Relay Spam Stopper
- Discreet surveillance
- Computer animation
- Informatization
- Image Search
- Random
- In scope
- E-government interoperability
- Abort
- Acquisition program
- Deliberate
- Network perimeter
- Slamming
- Litigation
- National Intelligence Council
- Audio conference
- Conversion rate
- Smart disclosure
- Computing appliance
- Code Book
- In-Band On-Channel digital radio broadcasting
- RPA Observer
- Multiplex
- Clearinghouse
- Public transportation system
- Independent station
- Nino
- Sense-and-avoid
- Space weather events
- SYN flood
- Affordability
- Sales Tax
- Slogan
- Non-personally identifiable information
- Internet poker
- Alpha character set
- Tax deduction
- Upper-atmospheric expansion
- Warranty registration card
- Vulnerability database
- Wartime reserve modes
- System resource
- Chain of trust
- Cable Internet service
- Adaptive cruise control
- Forensic web services
- Performance mobile advertising
- Commercial data
- Maritime Domain
- Mutual consent
- Business record
- Auto-forward
- Machine-readable privacy policy
- Statistical data
- Data encryption key
- Full profile
- Biometric authentication
- RFC
- File shadowing
- Appliance
- Computational science
- Informed Consent
- Child predator
- List-oriented
- Global Satellite Communications Support Center
- Deterrence
- Tiered service
- Cybersecurity requirements
- Wayback Machine
- Long-distance telephone call
- International Telecommunication Union
- Privacy policy
- Modding
- Exporter
- Conspirator
- Web mapping
- Outcome economy
- Unlinkability
- Netbook
- Firewire
- Bulk Electric System
- Online back-up
- Biochip
- Synthetic data generation
- Passive surveillance
- Satellite digital audio radio service
- Collateral information
- AFK
- Intellectual privacy
- Website services
- Cyber PII incident (electronic)
- Average visit duration
- Vehicle platoon
- Build automation
- Catastrophic incident
- Menu bar
- Res judicata
- Technologist
- Non-interactive
- Handler
- Doppler shift
- Anti-spam
- Found data
- Resource pooling
- Maintenance contract
- Registered Health Information Technician
- Cybersecurity event
- Dark wallet
- Infrared
- Information appliance
- Baseline schedule
- Threat source
- Access minutes
- Public Interest Registry
- Business trend
- Closed source
- Divulge
- Translator
- Internet ecosystem
- Grand Design Program Strategies
- Clearly erroneous
- Strategic military deception
- Infrastructure network
- Request criteria
- Contest
- Direct access
- Trading partner agreement
- Air reconnaissance
- Reference monitor
- Embeddedness
- Compilation
- Security architecture
- Photogrammetry
- Personalized smart card
- Reformation
- Cross-site scripting flaws
- Cyber exercise
- Qualified Security Assessor
- Automatic speech recognition
- Alphanumeric character set
- Network component
- Malware scanner
- Disable
- Save
- Standard
- Cyber talent
- Preserving document confidentiality
- Memory card
- Synthesis
- Network resources
- Man-made unintentional threat
- AutoComplete
- Robotics and Autonomous Systems
- Crime pattern analysis
- Arbitration award
- Multi-level marketing
- Log in
- Decimal digit
- Record index
- Source code escrow
- Head-mounted display
- Cybercriminal
- Secure voice
- Natural phenomena
- Negative option marketing
- Cable network
- CyberGeography
- Techno-regulation
- Conditional access
- Monopolist
- Private peering point
- Tagged-field record
- Feedback Loop
- Coordinates
- Decryption
- Part 15 device
- INFO chunk
- Video site
- Altimeter
- Psychological operations
- Active device
- Patent portfolio
- Information system authorization
- Dumping
- Digital journalism
- Ear shape recognition
- Data feed
- Code set
- Closed source operating system
- Numeric data
- Engine Control Unit
- Prepaid subscriber
- Chat services
- Automated location information
- Descriptive analysis
- Dead dropping
- Damages
- Forensic readiness
- Automated demand response
- Fixity check
- Teleguidance
- Digital modulation technique
- Carnivore
- Contact
- Ethernet adapter address
- Integrated risk management
- Data science
- Analog TV
- Anonymous FTP
- Homegrown software
- Microflow
- Astrolabe
- Address field
- Acquisition team
- Shard
- Abridgement
- Dark archive
- Records
- Medical image hardcopy device
- Mobile TV
- Digerati
- Modeling
- Rekey (a certificate)
- File-level encryption
- Front-end security filter
- Shortwave radio
- Computer vision syndrome
- Automated data
- ATM switch
- Space Situational Awareness
- Digital persona
- Fusion process
- Relative risk
- Internet fraud
- Data Protection
- Circuit element
- Error
- Complex Electro-Magnetic Environment
- Along-track scanner
- Central Office
- Wireless microphone
- Authorized
- Regime
- XG-PON2
- Fulfillment
- Account
- Antisubmarine Warfare Unmanned Surface Vehicle
- Dynamic cyber defense
- SMS chat
- Complementary intelligence capabilities
- Structured information
- Broad network access
- Unique visitors
- Event data recorder
- Point surveillance
- Intelligence Information Reports
- DARPA Syndromic Surveillance System
- Analyzability
- Attenuation
- Project Life Cycle Framework
- Electronic deception
- Improved-definition television
- Distribution Grid Management
- Reflection attack
- Truncating bank (Check 21)
- Information warfare support team
- Black core
- System interface
- Pie Chart
- Optical storage
- Electronic protective measures
- Public records
- Dangerous assumption
- Cold site
- Geometric datum
- Contra proferentem rule
- Data life cycle
- Best commercial practice
- Pictorial
- Decontamination
- Container
- Bandwidth
- Intellectual property community
- Single frequency network
- Fixed surveillance
- Information Technology Architecture
- Structure information
- Immunity
- Data center
- Electronic mail message
- Risk management strategy
- Meeting of the minds
- Network sniffing
- Operating system fingerprinting
- Accreditation level
- Nondevelopmental item
- DNS client
- Radio Receiver
- Express consent
- Boolean operator
- Fixed Satellite Services
- Off-site
- Kilobit
- Outcome
- Product baseline
- IT asset
- Data furnisher
- .ad
- Patch
- Gigaflop
- Credit card number generator
- Network operating system
- App Store
- Postsecondary education
- Sexual contact
- Artistic work
- Virtual interface
- Digital economy
- Navy-Wide Intranet
- Coarsening
- Exemplar
- Interactive on-demand services
- Code.gov
- Configure
- Knowledge processing outsourcing
- Window of Opportunity
- Domain parameter seed
- Route
- Secure room
- Cyber Security Vulnerability Assessment
- Data harmonization
- Social network
- Data Warehousing
- System-of-systems
- Advisory sensitivity attributes
- Material Transfer Agreement
- Enterprise software
- False pretenses
- Randomly generated
- Interlaced scan
- Issue-motivated group
- Certification policy
- QWERTY keyboard
- Source data
- Cryptographic defense
- Meter data management
- Control System Cyber Security Self-Assessment Tool
- Compliant
- Electromagnetic radiation
- Webometrics
- Build-Operate-Transfer
- Countervailing measures
- Discrete component
- Internet-ready device
- Mass customization
- Exporting carrier
- Interior Gateway Protocol
- Counter C3
- Emergency management information
- Botnet management
- Reach
- Content management
- Allowable downtime
- Central Processing Unit
- Access category
- Satellite-based Internet access
- Blackberry
- PKI user
- Telephone access code
- OAuth
- Proposal
- Non-compete clause
- DNA cryptography
- Certificate expiration
- Telephone call
- Group authenticator
- Analog Computer
- Without authority
- Investment fraud
- Baseline intelligence capabilities
- Heartbeat signal
- Homeland Security Information Network for Critical Sectors
- Multiple security levels
- Cloud service contract
- Personal dataveillance
- Command & control link
- Defense Information School
- Reconstitute
- Optical
- MODCERT
- Public services
- Alert
- AND
- Operable control
- Flowchart
- Chargeware
- Categorical inclusion
- Cropping
- Webmaster
- Substantially
- Offensive counterinformation
- Duty of loyalty
- Primary status
- Voting system security testing
- Military operations other than war
- Genetic data
- Domain name transfer
- Chat Room
- Very high-data-rate digital subscriber line
- Attributable network
- Black Line
- Geostationary orbit
- E-commerce
- Deputy PCII Officer
- Selective availability
- Attribute data
- DHS Component
- Occurrence
- Guest account
- Blacklisting software
- Time-Out
- Electronic mail address
- Performance-based payments
- Mean time to recovery
- Hotfix
- Handover interface
- Likelihood of threat
- Geometry
- Security Zone
- Patent number
- Physician-patient privilege
- Multi-purpose prepaid card scheme
- Plug-in
- CUI Framework
- Community of Practice
- The Exponential Encryption System
- System integration
- Network element
- Mediated reality
- Self-restoring
- Common Terrorism Information Sharing Standards
- Harvester
- Stock Footage
- Compulsory counterclaim
- Display mode
- Satellite imagery
- Disgruntled insider
- Screen dump
- Megatrend
- Internet backbone
- Dialer program
- Post-industrial society
- Trade name
- Government Interoperability Framework
- Digital radio
- Virtual server
- Material weakness
- Harvesting
- Infect
- Two-way satellite
- Common Criteria for Information Technology Security
- Internal link
- Software framework
- Careless
- Clearing
- Identification document
- Stateful
- Assistant PCII Officer
- Analog communication
- Printing
- Specific Make and Model Specification
- Command, control and communications
- Optical character recognition
- WTO member state
- Bona fide intention to use
- Simulated loss of data center site test
- Ad-hoc mode
- Computer criminal
- Deceptive acts or practices
- Continuous monitoring
- Standard Interchange Format
- Stream cipher
- Camcording
- Dark fiber
- Standard safeguarding
- Non-crawlable Web site
- Off-line cryptosystem
- Cyberterrorist
- Telemetering
- Sale agreement
- Attacker
- Critical information
- Counterterrorism
- Windows XP
- Privileged instructions
- Cyber resilience strategy
- Television channel
- Risk governance
- BSD license
- Covered transaction
- Administrator
- Fully distributed cost allocation
- Software Capability Evaluation
- Adverse inference
- Business continuity management
- Electronic publishing
- Subscriber station
- Logical record
- Data access
- Botnet operator
- Data
- Digital footprint
- Microcell
- Consumer-to-consumer
- Convertible virtual currency
- Virus checker
- Monetary damages
- Spot report
- Mass digitization
- Self or Co-regulatory Organization
- Promiscuous mode
- CERN
- Basic intelligence
- Clipping
- Useable record
- Fixed Price Economic Price Adjustment
- Disgorgement
- Classification level
- Performability
- Passcode
- Frames Per Second
- On-board equipment
- Certificate renewal
- Quantum sensor
- IA Nonrepudiation
- Assured service
- Remotely Piloted Aircraft System Commander
- Adversary threat strategy
- Effective competition
- Pay-per-lead
- Incisive analysis
- Logical access system
- Operations research
- Continuity
- Intermediate biometric sample processing
- Cleanroom
- Narrative
- Fair information practices
- Middleman
- Advanced Radio Data Information Service
- Overt act
- New subscription service
- Sponsored top-level domain
- Security Information and Event Management
- Gantt chart
- Rapid provisioning
- Grant-back
- Limited data set
- Dedicated system
- Prerecorded
- Ultra-narrowband network
- Front running
- Terabyte
- Chronometer
- Ganking
- Traditional outsourcing
- Moiré fringes
- Use-based rules
- Penetration profile
- Battle box
- Elliptic Curve Cryptography
- .mobi
- Libel
- Build-Own-Operate
- Content injection attack
- Nameserver
- Classification authority
- Attack program
- Open TLD
- Address verification system
- Distribution Automation Communications Network
- Cyber-trader
- Data compression context
- Brownout
- Telephone system
- Fulfillment house
- Attention scarcity
- Network convergence
- Commodity malware
- Risk assessment tool
- Cyberpiracy
- Lock command
- Data carrier
- Professional malpractice
- Attribute search
- COMSEC material control system
- System surveillance
- Prior user
- Audio clip
- Mobile telecommunications switching office
- Tiff
- Digital law
- Derogatory information
- Colocation center
- Access authorization
- T4
- Title key
- Media organization
- Information and communication technologies
- Archiving
- Signature
- Diplomatic Telecommunications Service
- Convergence
- Electro-optical intelligence
- May
- Digital environment
- Prognostics
- Page impressions
- Personal user profile
- Message passing interface
- Impersonation
- Conventional mode
- Digital sampler
- M-government
- Airtime
- Mobile Subscriber Integrated Services Digital Network
- National Trade Data Bank
- Ontology
- Business risk
- One-way voice link
- Batching
- Concurring opinion
- In silico
- Hibernation file
- Interactive television
- Relay station
- Network manager
- Roaming
- Data entry
- Signal-to-noise ratio
- Reference model
- Phracker
- Version number
- Polar-orbiting satellite
- Cruel and unusual punishment
- Draft (ANSI or ISO) Standards
- Overhead data
- Security update
- Alarm monitoring service
- On-the-fly
- Happy slapping
- Sealing
- Karaoke
- Malvertising
- Service Delivery Platform
- Abstraction
- Information flow control
- Comparative negligence
- DevOps
- Ruleset
- .coop
- Gig economy
- Data deluge
- Alias
- Agency Internet
- Mail fraud
- Software publishing industry
- Direct Broadcast Satellite Service
- Geographic Resources Analysis and Support System
- Predicate
- Behavior monitoring signature
- USCIS Genealogy Program
- Identity vetting
- Carding
- Override
- Logical connectivity
- Identity superiority
- Bulletin Board System
- User Rights
- Warning center
- Data map
- Mobile dating
- Information Sharing and Analysis Organization
- Sheet music
- Administrative subpoena
- 2.5G
- Web-based circumvention system
- Knock-off
- Risk ranking
- Pattern of racketeering
- Tearline reporting
- Message Board
- File encryption
- NPC
- Lisp
- Divestiture
- Beta culture
- Auction sniping
- Commander's critical information requirement
- Processing of personal data
- High-confidence medical device
- 128-bit encryption
- Uniform Trade Secrets Act
- User-friendly
- Ex officio
- Authentication exchange
- Convergent device
- Basic testing
- Terms of Service
- Unit Testing
- Slander
- Wireless gateway server
- Server program
- Communications countermeasure
- Bidirectional
- Cellular subscriber
- Data compression
- Forensic science
- Actual capacity
- Cloud carrier
- Meaningfully use
- Perceived collection threat
- Personal access communications system
- Web developer
- Greenfield outsourcing
- “Through-the-wires” attack
- North American Numbering Plan
- Internet protocol multimedia subsystem
- Headend
- Tactical warning
- Hypertext Transfer Protocol Secure
- Public health processor
- Major acquisition/investment
- Optical disc drive
- DNS security extensions
- Recoverable loss
- Business identifiable information
- Watch center
- Fingerd
- Information asymmetry
- Participatory media
- Large-scale machine learning
- Public right-of-way
- Numeral
- Appeal to prurient interest
- Open port
- SSID
- Online identity management
- Focused testing
- VPN gateway
- Resource Abstraction and Control Layer
- GovLoop
- Health Level 7
- Content development
- Discussion group
- Digital audio recording
- Typewriter
- Emergency Position Indicating Radio Beacon
- Technology Control Plan
- Link analysis
- Telecommunications Device for the Deaf
- Electric current
- Package speed
- Hardware virtualization
- Direct identifying data
- Call waiting
- Army Web Risk Assessment Cell
- Time-shifting
- E-cash
- Cultural broker
- Thread
- Interactive videogame
- Privileged account
- Special verdict
- Internet Telephone Service Provider
- Written agreement
- Counterreconnaissance
- Access control system
- Signals security
- Joint force commander
- Comprehensive review
- Privacy notice
- Deflection
- Evil Twin
- Sideband
- Global Maritime Community of Interest
- Group database registration
- Self-authentication
- Internet voting system
- Debit card payment
- Communications satellite
- Outlier detection
- Joint application
- Intermediary
- Gripe site
- Microsecond
- Lack of transport encryption
- Outsourcing vendor
- Non-real time
- Next Generation Internet eXchange
- Trusted software
- Mobile money
- Essential elements of information
- Antenna Array
- End user device
- Location-based application
- Passive security testing
- Federal contract information
- Critical cyber function
- A/D converter
- Ruler
- Multicore processor
- Three-way calling
- Intelligence sharing
- Push-to-talk
- Rollover menu
- Cross-app data
- 2-D barcode
- Useful article
- Third-party tracking
- Cellular system
- U.S.-controlled facility
- Route hijacking
- Lethal autonomous robotics
- Visually perceptible copies
- Printed records
- Bandwidth throttling
- Bootleg
- Geographic information system services
- Automated decision making application
- Encapsulation
- Add-on
- Temporary file
- Lane departure warning
- .pe
- Left justify
- Data replication
- E-impact
- Retrofit
- Nonce
- Technology Center
- Headphones
- Fair and reasonable price
- Optical head-mounted display
- Computer attack
- Data transfer rate
- Hacktivist
- Rogue account
- Numeric value
- Joint accreditation
- Slap segmentation
- Network interface
- trust relationship
- Local delivery agent
- Dropcatching
- Cryptographic key
- Coordinate pair
- Importing
- Certificate revocation
- Encoded data
- Horizontally integrated schedule
- E-information
- Full-motion video
- For Official Use Only
- Computer record
- DAT recorder
- Personal area networking
- Magnetic wire recording
- Permission
- Counterintelligence controlled activities
- Cloud service
- Tessellation
- Google App Engine
- Digital identity
- Medical image storage device
- Arduino board
- Illusory promise
- Metropolitan area network
- Physical asset
- E-business
- External traffic
- Localization
- Film library
- Virtual identity
- Audiovisual records
- Spread spectrum
- Transformation
- Major IT investment
- Automated controls
- Unclassified controlled information
- Digital distribution
- Intelligence report
- Parent company
- Prices-to-devices
- Listserv
- Long-distance carrier
- Network surveillance
- Verbatim
- File structure
- Bitmapping
- Subcarrier
- Addendum
- Micrographics
- Role
- Mobile Communications On-board Aircraft
- Cage
- Pixel
- .gn
- EBITA
- Parody
- Secondary storage
- Counterdeception
- WHOIS search
- Presumed damages
- Industrial application
- Internet television
- Brand manager
- Entrepreneurship
- Substantive evidence
- Strategic information management
- Virtual mall
- Smart logistics
- Risk consequence
- Compact Disc Digital Audio
- EXecute In Place
- Overt testing
- Human Systems Integration
- Passive communications satellite
- Charity scam
- Station authentication
- In-line link
- Geosynchronous
- Request for proposal
- Mutual suspicion
- Pitch
- Investigative consumer report
- Fixed length field
- Annunciator
- Conversational mode
- Resolution
- In-app advertisement
- Vendee
- Traffic encryption key
- Backhaul communications
- Interstitial text ad
- EPaper
- Electronic health record
- Web API
- Processing, exploitation, and dissemination
- Video programming industry
- Embedded
- Security control assessment
- Incident handling
- Directed energy
- Alternate bid
- Internetworking
- Remote disabling
- Authorization boundary
- Back channel communication
- Risk appetite
- Play data
- Aural
- Duty of good faith and fair dealing
- Cartographer
- Ad blocking
- Charge-coupled device
- Amendment to allege use
- E-purse
- Key exchange
- National Identification Index
- Irreversibility
- Initial merchant
- Billion Instructions Per Second
- Immortal
- Groupware
- Adversary
- Remote pilot station
- Internet infrastructure attacks
- Red October
- Applet
- International subcontracting
- Filing basis
- MILNET
- Data model
- Band
- Processing, of or in relation to information or data
- Physical vulnerability
- Anti-virus management
- L-diversity
- GPS navigation device
- Key
- Legacy network
- Card Authentication Key
- Broadcast spectrum
- Process control system
- Internet access
- Twitter
- Terms of reference
- Overt
- Location Information Server
- Contracting state
- Digital musical recording
- Telecommunications-related personal information
- Xbox Live
- Open information
- Technical standard
- Protocol data unit
- Tag cloud
- Interactive website
- Orbital jamming
- Reader privacy
- Internet Relay Chat
- Domain name registrant
- Nanosensor
- Backup operation
- Walled garden network
- Operational asset
- Computer literacy
- Paid placement
- Natural Language Processing
- National Emergency Management Information System
- Information Commissioner
- Automatic data processing equipment
- Computer software documentation
- Dangling vulnerability
- Automatic identification and mobility
- Insurer
- Cybercrisis
- Data transport
- Telemarketing fraud
- Cyber protection
- OLE for Process Control
- Metering
- Notification
- Human Resources
- Alignment
- Access-Control-as-a-Service
- Digital broadcasting
- Echo request
- Program management
- Cyber snake oil
- Digital signature validation
- Detection of modification
- CM Specialist
- Revenge porn
- Technology protection measure
- Computer-based instruction
- Online porn
- Tape cleaner
- Terrestrial jamming
- Stealthing
- Casual gamer
- 3G
- Point-of-sale network
- Forum
- Identified information
- GIF
- Secondary transmission
- Access control list
- Automatic Identification and Data Capture
- Intelligent character recognition
- Web application
- Legal Advice and Advocacy
- Encrypted key
- Global Navigation Satellite System
- Fiber-to-the-curb
- Digital signal processor
- Rapidly report
- Mass Storage
- Switch
- Validity opinion
- Acoustic Intelligence
- Critical processing
- Joint Imagery Management Operations Cell
- Strict scrutiny
- Authentication credentials
- Resiliency testing
- Agility
- Data readability
- Agency Private Network
- Technical reference files
- Hum
- Records maintenance and use
- Business process outsourcing
- Digg
- Precise location data
- Imagery intelligence
- Wireless router
- Keycard
- Paddle
- Gross margin
- Software-intensive system
- SATCOM
- IT general controls
- Sensitive Homeland Security Information
- Terminal emulator
- Uninstall
- Time interval
- Crisis manager
- "Special needs" doctrine
- Synchronization
- Near field communication enabled smartcard
- Responsiveness
- Message digest
- Virtual domain
- Single-award contract
- Computer-generated evidence
- Smart automation
- Critical information infrastructure
- Authentication system
- Patentable combination
- Identification and Authentication
- Composite Theoretical Performance
- Black
- Copyright license
- Operator
- IT security metrics
- Tear-line report
- Compulsory licensee
- Optical scan
- Supportability
- Topographic information
- Technical position
- Active RFID
- Joint invention
- Investigative support package
- COBOL
- Packet fingerprinting
- Account take over attack
- Altcoin
- Tampering
- PlayStation 2
- Lex ferenda
- Electromagnetic spectrum control
- Negative film
- History sniffing
- CPS architecture
- Enterprise services
- Additive Manufacturing
- Cycle per second
- Marginal cost
- Wireless chipset
- MHEG
- Regulatory agency
- Robotics
- Effectively controls access to a work
- IA Manager
- Wireless LAN
- Hardware driver
- E-planning
- Information protection policy
- Limited rights
- Carrier hotel
- Facility bypass
- Like
- Anchor
- Access approval
- Critical Infrastructure Protection Cybersecurity program
- Information interoperability
- Change detection
- Equitable action
- Classification System
- Object of preservation
- Indecipherable
- Advanced geospatial intelligence
- Telecommunication priority services
- Intelligent reader
- Intentional hazard
- Exoskeleton
- Web farm
- Locational privacy
- Wiretapping
- Multilevel system
- Custom software
- CCTV
- Public sale
- Direct application access
- Integration
- Collation
- Tachometer
- Collocation site
- Telephone circuit
- Ubiquitous interconnectivity
- Procured product
- XML
- Criminal Justice Agency
- Incontestable
- Voiceover
- Code word
- Cryptographic boundary
- Threat focus cell
- Digital Terrain Model
- Mensuration
- Teardrop attack
- Multipoint distribution service
- Technology Manager
- Triangulation
- Feature bloat
- Direct damages
- Distributed processing
- DarkNet
- Group Rapid Transit
- Direct economic loss
- Cyber emergency
- Phone phreak
- Foreseeability
- Partial automation
- Light-emitting diode
- T.621
- Authoring
- Reasonable person
- Choreography
- Packetized voice
- Sensitive Compartmented Information Facility
- Screenshot
- Name resolution
- Payment system
- Low impact
- Information attack
- Robot
- Warning net
- Heuristics
- Driving while texting
- Programming
- Detection Error Trade-off Curve
- Fourth Amendment
- Audit strategy
- Genome-wide association study
- Cancellation
- Official fix
- Copyright Royalty Judges
- Counterinformation
- Automated license plate recognition operator
- Captive portal
- Identity and access management
- Header
- Health services research
- Continuous tone image
- E-business infrastructure
- .gy
- Splog
- Removable magnetic media
- Coding standard
- Vehicular telematics
- Leadership Profile
- Programmable read-only memory
- Information security
- Video device
- Micromanagement
- Individual reference services provider
- Issuing authority
- Multiple source intelligence
- Acoustic emanation
- Vacuum tube
- Mail Abuse Prevention System Real-time Blackhole List
- Virtual hosting
- Telephone bill paying
- Accuracy
- Support
- Benchmark
- Moblog
- Community network
- Strain sensor
- Civil law
- Technical threat analysis
- Active Network Intrusion Defense
- Cyber-based technologies
- Thumbnail
- Content license
- Customer gateway
- Fiscal Year 2014-2015 Guidance on Improving Federal Information Security and Privacy Management Practices
- Automated identification system
- High value asset
- Secure Dial-in
- Locked
- Terminal interface equipment
- Dismissal with prejudice
- Pron
- Archived media
- Cyber Assault
- Affirmation
- Breach of implied warranties
- Wirth's Law
- Certificate management authority
- Original electronic evidence
- CT2
- Internal fragmentation
- Drop-ship
- Temporary records
- Adjusted Peak Performance
- Asymmetric operations
- EUtility
- WAIS
- Legal name
- Sample
- Bar chart
- Instructions per cycle
- CSS key
- Subjective
- Negative option
- Collaboration application
- Cordless telephone
- Preferred Products List
- Operational suitability
- Statistical record
- Pre‐programmed
- Brontobyte
- Tolling agreement
- U.S. affiliate
- Interchangeable
- Macintosh
- Analog musical recording
- Community Address Updating System
- Information Highway
- Exit Interview
- Mobile wireless service
- Swipe
- Metadata
- Cyber risk profile
- Telework client device
- Aggrieved person
- Default settings
- XOR
- Likelihood of success on the merits
- Lessor
- Digital Content
- Modulation
- Rack jobber
- Nontransferable
- Analyze
- Customer premises equipment
- Computing power
- Image data
- Specialised services
- Geoscience
- Fixed mobile convergence
- General Counsel
- Deallocation
- Datacasting
- Nature of Authorship
- Backbone
- Automated Course of Action
- Machine perception
- Rating
- Orthophotograph
- Mobile geolocation information
- Bayesian (decision) analysis
- Information costs
- Thesaurus of Australian Government Subjects
- Content creator
- Local loop
- Seized media analysis
- TV band device
- E-textiles
- Industrial Internet of Things
- Real money transactions
- Commercial component
- Penetration study
- Dedicated network
- Criminal Intelligence
- Sinkholing
- Downloadable Content
- Image manipulation
- Control channel
- Photocopier
- Commercial item
- Reputation score
- Search-engine poisoning
- Signals analysis
- Voice print
- True altitude
- Human intelligence collector
- Or
- Workplace-as-a-Service
- Criticality assessment
- Recording artist
- Virtual proximity
- Cloud service level agreement
- Airborne alert electronic warfare
- CPS network manager
- Weakness
- Compute
- Letter contract
- Biological sensor
- Tactical market research
- GSA schedule contractor
- Information Security Program Plan
- Breach response procedures
- Enhanced Specialized Mobile Radio
- Technology service provider
- General military intelligence
- Encipher
- Software bundler
- Teleimmersion
- Administrative law
- MPEG-3
- Call processing
- Smart motor
- Consumer electricity usage data
- Veracity
- Cybersecurity Assessment and Risk Management Approach
- Dynamic signal analyzer
- Mission
- Telemetry
- Radiotelegraphy
- Migration
- Search Engine Optimization
- Google Apps
- Cloud auditor
- Project team leader
- Overhead
- BagIt Specification
- Critical energy infrastructure information
- Web document
- Analog video cassette recorder
- Fixed Endpoint
- Online dispute resolution
- Enhanced wireless 9-1-1 service
- Security intelligence
- Controlled area
- Efficacy
- Auditable event
- Geophysics
- Infrastructure-centric
- Virus signature
- Broadband digital subscriber line
- Material evidence
- Imagery support requirement
- Electronic tracking device
- Creative Commons License
- Fake antivirus
- Confidentiality service
- Hand geometry
- Semantic interoperability
- Computerized private branch exchange
- Transparency law
- Deliverable management
- Prurient
- Cloud service intermediation
- Warm site
- Photography
- Standard Industrial Classification
- Legal tender
- Bootkit
- Steel collar
- White hat SEO
- Authorized entity
- Fully-qualified domain name
- .gp
- Serial Port
- Functional requirements
- Cellsite on wheels
- BWF
- Megabit per second
- Deposit
- Key file
- U.S. Armed Forces
- Cybersecurity risk
- Security violation
- Clip art
- Image search engine
- IA Confidentiality
- Live capture
- File security
- False acceptance rate
- Misnamed file
- Joke Program
- Formal proof
- Videogame
- Digital tuner
- De-identified information
- False personation
- Information system security engineer
- Self-healing grid
- Virtual currency wallet
- Cluster
- Viewdata
- DNA source
- End-user piracy
- Infection chain
- Variable
- Depository
- Root directory
- Secure communication protocol
- Private cloud
- Logic
- Cryptographic hash function
- Matter of law
- Community Learning and Information Network
- Quality management
- Motion to remand
- Inoperable
- Input security
- Voting system
- Open shop
- Database Administrator
- Maritime security
- Revocation management
- Material
- Federal Chief Information Officer
- Threat signature
- Network security plan
- Mutual dependence
- Facial recognition
- Collection Support Brief
- Foreign counterintelligence
- Electronic key entry
- Secure communication channel
- Remote sensing system
- Unconstitutional
- Official publication
- Subpoena
- Internal Interception Function
- Hyperlocal media
- Government-unique standard
- Centrex
- Landline
- E-activism
- Intelligence quick reaction capabilities
- Thermal imagery
- Assured information sharing
- System Security Plan
- Mission assurance (cyberspace)
- Cloud client
- Spatial reuse
- Electronic storage device
- Anonymous identifier
- Free-rider problem
- Set
- Gambling
- Volatile
- Femtocell
- Simulative electromagnetic deception
- Anti-spoof
- Availability of data
- Audio signal
- Mandatory standard
- Information disclosure
- De minimis copying
- Expense
- Top ad
- Filename manipulation
- "Build Security In"
- Online behavioral advertising
- SSAE 16
- Emergency Action Plan
- Flog
- Anti-dumping duty
- Business area network
- Accuracy control
- Unmanned Aerial Vehicle
- Technology-enabled crime
- Scatternet
- CSS Automated Information Systems Interface
- Lockout
- Privacy awareness campaign
- Bluebugging
- Financial fraud
- Network Firewall
- Digital skills
- Human threat
- Fixed-price contract
- Direct data feed
- Memory location
- Abstention
- ACH Network
- Safer
- Federal Enterprise Architecture Framework
- National Military Command System
- Learning
- Address munging
- Value-based pricing
- Security domain
- Transport
- Attended
- Biometric validation
- Usability
- Solar photovoltaics
- Quality Assurance Plan
- Bookmark
- Think piece
- Switched digital video
- Public display
- Metasearch engine
- Application system owner
- Web services
- Chattel
- Decimal
- Security services
- Desktop videoconferencing
- Geodatabase
- Motion to reconsider
- Security profile
- Development-and-Test-as-a-Service
- Information security risk
- Patent hold-up
- Patent application number
- Valid data element
- Asynchronous Transfer Mode
- E-Science
- Fabric
- Autonomous
- Database program
- Ad Infinitum
- Walled Garden
- Check scam
- Witness
- Circumvention
- EO
- Georef
- Executive state
- Respond
- Web app attack
- Vehicle automation
- Privilege management
- Anomaly-based detection
- Internet core
- Product placement
- Principle
- Unintentional radiator
- Insurance policy
- Media scavenging
- Create
- Geodetic control
- Adaptive learning system
- Knowledge superiority
- Rights in technical data
- True accept rate
- Dissemination
- Product mark
- Geographic knowledge
- Logistical information
- Geospatial intelligence
- Diagnostic device
- Broadcast network
- Intelligent knowledge based systems
- Automated vehicle location system
- TrueSync
- Picture archiving and communications system
- Salt
- Cross ownership
- Hazard
- Cloud service interoperability
- Disclosive
- Wireless subscriber
- Down-converter
- CyFin initiative
- ATM cell
- Binding
- Reseller
- Delivery mechanism
- Procurement cost
- Active wiretapping
- Search index
- Identity management system
- Operational vulnerability information
- Product endorsement
- Data confidentiality service
- Fan Fiction
- Network services
- Tele-webbing
- Router
- Multiprogramming
- Direct attack
- Security functionality
- Stem
- Authentic message
- Information operations intelligence integration
- Cooperative agreement
- Unclassified sensitive
- Radio navigation
- Reporting
- Compose
- Data Center Infrastructure Efficiency
- White Pages Concept
- Data location
- Most favored nation clause
- Supply contract
- Protocol specification
- Technology development
- Disk operating system
- Originator
- .pro
- Teleservices
- Van Eck phreaking
- Interpreter
- Unpublished material
- Radio science
- Fuzzer
- Communications industry
- Loop
- Cablecasting
- Magneto-optical
- Domestic surveillance
- Key encryption key
- Condition test
- Data Item
- Media storage devices
- Technical Information
- Embedded customer-premises equipment
- .hr
- Privacy impact assessment
- Wireless phone service
- Control server
- Field length type
- Electronic emission security
- Juror
- Cyber risk management
- Nonconformance
- Virtuous cycle
- Electrical signal
- Rogueware
- Proof of concept
- ZigBee HomePlug
- Access product
- Public key system
- Remote-access cyberattack
- Ad valorem
- Serial communication port
- Visual line-of-sight UAS operations
- Self-checking code
- DVD Player
- Deficit
- Red/black concept
- Infrequently billed subscription
- Telephone company
- Likeness
- Wire
- Ajax
- Tailgating
- Cross-Examination
- Deployment
- Carrier refund rate
- Explosives trace detection
- Invention disclosure
- SMS aggregator
- Collective rights management
- Optimization
- TEMPEST hazard
- Data steward
- Shoulder surfing
- Spam honeypot
- Project monitoring and control
- Pop-up ad
- Injected advertising
- Overhead bit
- Smart antenna technology
- Federal Senior Intelligence Coordinator
- Internet Protocol cloud
- Human intelligence
- Waiver
- One-way satellite
- Access ISP
- Geoposition
- Best mode
- Cost Accounting Standards
- Uninterruptible power supply
- Network File System
- Work of the United States government
- User Interface
- Geospatial information
- On-demand streaming
- Automated materials handling
- Content-based image retrieval
- Network Connection
- Field Test
- Terrain intelligence
- Proprietary protocol
- Collateral
- Flight Simulator
- Electronic service delivery
- Law of nature
- Logical security
- Intrapreneurship
- Service agreement
- Automatic Location Identification
- Intelligent agent
- Connected governance
- Resource monitoring
- Control station
- Link churn
- Offline browsing
- Year 2000 compliant
- Placeblog
- Incumbent
- Paired spectrum
- Admissible evidence
- Chunk
- Mobile content advertising
- Security awareness
- Non-exclusive license
- Cartesian coordinates
- Web of Things
- Graphics terminal
- Remix
- Domotics
- Access control procedures
- Architecture viewpoint
- De-identified health information
- GSA schedule contract
- On sale
- Private currency
- Vertical scaling
- Supplies
- Data leakage
- War driving
- Intangible costs
- Role-based security policy
- Entire market value rule
- Button ad
- Star network
- Erx
- Availability controls
- Health data
- Formulation phase
- Privacy footprint
- Post Office Protocol
- Technical Security
- Accessioned record
- DHS Office for Civil Rights and Civil Liberties
- Logical network
- Gait recognition
- Misinformation
- Coordinate system
- Offensive Counter-Cyber
- User-accessible programmability
- Mobile augmented reality
- Operator precedence
- Virtual network link
- Normative analysis
- BCR
- Expected results
- Domain controller
- Switched circuit
- Monetary Policy
- Automatic data processing
- In Camera
- Cyber-extortion
- National Security and Emergency Preparedness Services
- Declassification authority
- Spatial law
- Separation of duties
- Online storage
- Search engine submission
- Data reuse
- Audio video interleaved
- Strategic objective
- Applicable Associated Markings
- E-mail service
- Neural network
- DVD writer
- WebTV
- Computer cluster
- Information Management Life Cycle
- Deceit
- Technical intelligence
- Electronically stored information
- Vertical portal
- Cryptographic information
- On-demand company
- Electronic warfare
- Adaptive
- E-government-as-a-whole
- Vanity search
- System flowchart
- Open network architecture
- Suitability
- Computer security specialist
- Tape recording
- Non-identifiable health information
- System integrity control
- Technology Readiness Assessment
- Video Capture
- Incident Command Management System
- Automatic call delivery
- Coder
- Unmanned aircraft system
- Daemon
- Gross profit
- System monitor
- Content access log
- Duplicate enrollment check
- Skyscraper
- Learning Curve
- Uplink
- Unfair acts or practices
- Unsolicited
- KST
- Open content
- Warranty disclaimer
- Parental control software
- Electronic calculator
- Access Control Enforcement Function
- Send
- Robot Exclusion Standard
- Ticket
- Token ring network
- Blind Attack
- Incident response plan
- Track and trace
- Brake-by-wire
- Cyber threat indicator
- Unregistered copyright
- Abuse of discretion
- Malevolent actor
- Acoustic conference room
- Measurement and signatures intelligence
- Frame grabber
- Electronic Product Code identifier
- Supervisory Control
- Web hosting service
- Entropy
- Data element access services
- Digital communications system
- Actual damages
- Pure alphanumeric
- Surveillance
- Command language
- Data item abbreviation
- Overwrite procedure
- Coarse groove disc
- Foot surveillance
- Static analysis detection tool
- Data sequencing
- Looking for Group
- VoIP spoofing
- Cybersecurity purpose
- Disposition program
- Foreign intelligence entity
- Alternative Futures
- Access rights
- Decision analysis
- Perimeter-based security
- Automated information resources
- Sleep Mode
- Intelligence process
- Computer-aided process planning
- Design and implementation
- Format migration
- Active defense
- Tangible
- Contract
- Primary account number
- Digital facility
- Multilateral computer matching agreement
- National Planning and Execution System
- In-game theft
- Basic Image Interchange Format
- Internet of Services
- Electronic theft
- Catalog music
- Genomic information
- .gu
- On-hook
- Grid
- Tweet
- Supplier
- Variable length record
- Core data
- Electronic component
- Microfilm
- Designated Approving Authority
- Distance education
- Data protection engineering
- Mouse button
- Knowledge
- Voice recognition
- Framework data
- Level playing field
- Network service center
- Biometric Intelligence Analysis Report
- Desktop-as-a-Service
- Self-propagating
- Thingbot
- Portable computer
- Pseudonymous data
- Playback
- Synchronization license
- Cognitive modeling
- Information security manual
- Internet protocol television
- Encrypt
- Data conversion plan
- High-speed digital subscriber line
- Content information
- Letter of agreement
- Downstream traffic
- Generative technologies
- CI/KR partner
- Sound masking system
- Usurp
- Coerced-sharing feature
- Assignee
- Start bit
- Imagery exploitation
- Babble jamming
- Robotic process automation
- Personal Identity Verification
- Special purpose system
- Trade secret
- Site exploitation
- Speculative
- Embedded file
- Unbundled network element
- One-time password
- Security System
- Acknowledged Special Access Program
- Alphanumeric String
- Good Faith
- Baud
- Pseudo-transparency
- Merchant
- Smart terminal
- ZeroAccess Trojan
- Malicious applet
- Motion for judgment as a matter of law
- Technical data
- Accreditation boundary
- Risk landscape
- Common token system
- Application virtualization
- Reduced scrutiny
- Denial of Service
- RFID
- Reference architecture
- Graphic output
- Net Worth
- Attack method
- Multipartite virus
- Single sideband
- Persona
- Interstate
- Transcode
- DS-1
- Persistent Littoral Undersea Surveillance Network
- Freeware
- Intelligence function
- Mail user agent
- Multiple Award Indefinite Delivery/Indefinite Quantity
- Mark
- .tar file
- Improvement patent
- Resource starvation
- Cyberspace
- Arin
- Social Engineering
- Information-related capabilities
- Cost-effectiveness analysis
- Black letter law
- Protection profile
- Predictive Modeling
- Checksum
- Long-Term Evolution
- Man-Machine Interface
- Autonomic system
- Infringer
- Detector
- Routing
- Inherently secure system
- Data-flow diagram
- National System for Geospatial Intelligence
- Bitcoin
- Data-under-voice
- Multitenancy
- DNA Analysis
- Non-destructive electronic warfare
- ELaboratory
- Anti-terrorism technology
- Stateful packet inspection
- Data curation
- Sequencing plan
- Document exploitation
- Flash
- Dial tone
- Load shedding
- Forum non conveniens
- Big data engineering
- Certificate creation
- Distinguishable information
- Force Majeure
- Satellite communications system
- Demand Response Availability Data System
- Proxy Attack
- Moderation
- Local access
- Decision technology system
- Cable system
- Incident investigation
- Electronic program guide
- Indemnifying bank
- Wired network
- Instant messaging redirector
- Technology diffusion
- Standardized health record
- Joint-interest imagery
- Unencrypted
- Gig worker
- BID
- Dumb terminal
- Criminal history records
- Software suite
- Hot swapping
- Communications and Electronics Operating Instructions
- Deletion
- Blacklist
- Extensible
- Solicitation
- Machine Readable Cataloging
- Overt collection
- Peripheral
- Electrical power infrastructure
- Text link
- Right of attribution
- Hybrid card
- Terrorist act
- Government-to-government
- Volunteered geographic information
- Applied Research
- Collecting and Communicating Audit Trails
- Critical intelligence requirement
- Access provider
- In-vehicle navigation system
- Griefer
- Table of Frequency Allocations
- Alpha version
- Malvertizing
- Recordkeeping requirement
- Connection Machine
- Inculpatory evidence
- Smart
- Tier 1
- Website defacement
- Statistical
- Continuous process control
- Security automation
- Microwave communication
- Load
- Technorati
- Data Reference Model
- Switched access
- Lawful authorization
- Public confidence
- Reverse domain name hijacking
- FM broadcaster
- Subpoena duces tecum
- Disruptive technology
- Cyberspace superiority
- Non-official publication
- Dedicated
- Government-furnished software
- Risk modeling
- Knowledge Management
- Common Air Interface
- Digital Humanities
- Handheld interagency identification detection equipment
- Video conference
- Balance of hardships
- Foreign Power
- Key size
- Recertification
- Data-dependent protection
- Sensitive Security Information
- Stop words
- Inference attack
- Vehicle to Grid Charging Station
- Cracking
- Targeted advertising
- Social interaction
- Typographical error
- Information system security control assessment
- Interface Control Document
- Zero-sum
- Address poisoning
- High-bandwidth Digital Content Protection
- Cybercorn
- Internet Access Tax Moratorium Act
- Customer
- Enhanced Safeguarding
- Business-to-distributor
- Screening
- IP block
- Intent to use
- Patent flooding
- Open Source Data
- Automated record linkage
- Swarm
- Personal protection drone
- Mutual authentication
- Intelligence
- Infocomm
- Duty of Care
- .om
- Virtual keyboard
- Psychographic data
- Radio button
- Security metrics
- Descramble
- Information infrastructure
- Virtual lifetime electronic record
- Military message handling system
- Authorized agent
- Security procedure
- Allocation
- Campus
- Watering Hole
- Tween
- Baseline configuration
- Data use agreement
- Skin pattern recognition
- Electronic medical record
- Emulation
- Printed circuit board
- Looking For More
- Personal identifier
- Unplug
- Affiliate station
- Voice Chat
- DNS table
- Ipso facto
- Return (ACH)
- Lifelogging
- Combat surveillance
- Nexus
- -aaS
- Copyright Office History Serials
- Mutual mistake
- Code injection
- Confidentiality-protected environment
- Incident of National Significance
- Thesaurus
- Receiver
- Parasite
- Mechatronics
- Data continuity
- Biosensing
- Single-purpose device
- Unregistered trademark
- Retweet
- Mixed reality
- Facet
- Cryptographic Message Syntax
- MIPS
- Telecommunications equipment
- Auto-correlation
- Password-only authentication
- Familial DNA search
- GPS coordinate
- Systematic attack
- Counterintelligence measures
- Commodity processor
- Area of intelligence interest
- Government information product
- Identity assurance
- Organized cyber intruder
- Scratchpad register
- Softphone
- Bond
- Wind Turbine
- Motion picture exhibition facility
- Traffic forwarding
- Privacy engineering
- Address bus
- Online message
- Commercial Internet Exchange
- Emergency plan
- Edge server
- Compartment
- Card Verification Method
- Service Control Point
- Data breach analysis
- Rogue program
- Cyber support
- Dumb reader
- Consumer account
- Emulator
- Call Admission Control
- Microimage
- Biometric Automated Toolset
- Data call
- Universal Service High Cost Program
- Offensive information warfare
- Internal accounting control
- First party behavioral advertising
- Imaging
- Kid-oriented search engine
- Cipher system
- Wideband Global SATCOM
- Information bomb
- Nonassertion letter
- Path-dependency
- Free software movement
- Generic
- Vertical restraint
- Pointing device
- Message Indicator
- Mean time to repair
- Benelux
- Endpoint
- Kernel
- Logical partitioning
- Public safety services provider
- Autodial
- Default account
- Neutral age-screen
- Person-to-Person Payment
- Serial
- Local network
- Place of public accommodation
- Technical specification
- User community
- Multiple-award contract
- ExaFLOPS
- Scattered Castles
- Loss potential
- Wearable computing
- E-money
- National infrastructure
- Free software
- Fully qualified domain name
- Mobile malware
- Computer-based patient record
- Domain name server
- Franchise
- .pf
- Compelling need
- Medical imaging device
- Video camera
- Mobile Satellite Service
- E-discovery Amendments
- Cyber system
- Evil twin attack
- Coalition/Multinational WAN
- Comparison shopping
- Printed matter
- Public communications network
- End Use Measurement Device
- Authorized Vendor Program
- Transaction testing
- Highly automated vehicle system
- Single-session technology
- Batch
- Paywall
- Network money
- Computing element
- Software modification
- External dependency management
- Reputation-based system
- Critical cyber asset
- BLACK optical fiber line
- Conformance statement
- Publishing
- Risk state
- Valuation
- Transitional program for covered business method patents
- Computer network defense
- Bitmessage
- Professional Audio/Video Schedule Contract
- Digital citizen
- Open systems environment
- Cryptologic
- Copyright claim
- Mesh network
- Gopher
- Interface Design Document
- Loading monitor
- Perimeter security mechanisms
- Visual information
- Reverse charge
- NSDI framework
- Disinformation
- Operational information
- Binary string
- Function key
- Controlled information
- Reputation cost
- Data Storage-as-a-Service
- Future Internet
- Proprietary standard
- Advanced Electronic Signature
- Automatic identification of outward dialing
- Collection requirement
- Zip file
- Tabulation
- Change control procedure
- Computer software
- Biometric identification
- Service Management System
- COMSEC facility
- Software Configuration Item
- Conformance testing
- Personalization content
- Ping sweep
- Communication link
- Data loss prevention
- Claim construction
- Numeric test
- Joint Operation Planning and Execution System
- Child exploitation
- Component
- Cooperative research and development agreement
- Peer Review
- Data re-identification
- Administrative vulnerability
- Counter-signature
- Reinstatement
- High technology
- Data retention
- Security target
- Identification disclosure risk
- Classifier
- Solution stack
- Qualitative risk assessment
- Threat condition
- Date-time group
- History file
- Digital phonorecord delivery
- Internationalization
- Word mark
- Mole
- DNS cache poisoning
- Plain arch
- Service contract
- Statement of work
- Electronic Data Interchange
- Assumed consent
- Prevailing party
- House mark
- Ancillary cryptography
- Collaborator
- Concept of secure function
- Anomaly
- Masquerading
- Memory cartridge
- Data mirroring
- Alternative payment system
- Covert identification
- Aerial surveillance
- Failure
- Concept search
- Cells-on-wheels
- Co-residence
- Data flow analysis
- NAND flash memory
- Search engine
- Assurance level
- Design phase
- Threat information
- Reverse auction
- Privilege-management infrastructure
- Active communications satellite
- Interactive service
- Perimeter firewall
- Moderate impact
- Computerized telephone system
- Nanocomposite
- Symmetric encryption/decryption key
- Logical failure
- Update
- Milliwatt
- Reconfigure
- Airwaves
- Internal page
- Strong user authentication
- Probe
- Major investment
- Payola
- 911 Governing Authority
- Satellite provider
- Server-Side
- Assurance case
- Digital Addressable Lighting Interface
- Online social hacker
- Inverse Address Resolution
- NS/EP telecommunications services
- Asymmetric digital subscriber line
- Computer Matching Agreement
- Binary information
- Classified configuration
- Pop-under advertisement
- Bug
- Breach of security
- Cloned tag
- Client-server model
- Policy decision point
- Acoustic security
- Software Development Life Cycle
- Privacy: Federal Law Should Be Updated to Address Changing Technology Landscape
- Communication
- Host operating system
- Open data and content
- Synchronous
- Hijacker
- Shrink Wrap
- Agile reader
- Total Quality Management
- Spammer
- Optoelectronic device
- Counterintelligence collection
- Broadband.gov
- Analog cellular system
- Free-riding
- PCII Program Manager
- Telecommunications Relay Service
- Market pull
- Audio file
- Augmented Reality
- DirectX
- Mobile content
- Additional resource costs
- Threat intelligence
- Copyright industries
- Voice-activated
- Conditionally trusted entity
- Gross revenues
- Patently false data
- SYN packet
- Plea bargaining
- Decipher
- Digital forensics and incident response analyst
- Social vulnerability
- Non-intrusive appliance load monitoring
- High-speed circuit-switched data
- Open system
- Composable secure system
- Repair
- Layered security
- Biometric record
- Executive Agent
- Direct memory access
- Consumer Internet of Things
- Representation
- URL
- Geolocation data
- Risk Management
- Critical electric infrastructure
- Out-of-band emission
- Re-identification code
- Non-routine border search
- Infrastructure risk
- Parallel test
- Cyber counterintelligence
- Open Home Area Network
- In-time Information Integration System
- Inertial navigation system
- Digital audio interface device
- Attention economy
- Clawback agreement
- Interference resolution
- Feed aggregator
- Car whisperer
- Computer network exploitation
- Cybernaut
- Easement
- Energy assurance
- High-skilled diaspora
- Compromise
- Industrial economy
- C3 protection
- Digital champion
- Boolean logic
- On-demand computing
- Direct marketing
- Joint intelligence
- Passive sensor
- Computer-aided software engineering
- Legislative history
- Brain-computer interface
- Kilobyte
- Wearable voice
- Simulation
- Initiate the transmission
- Tape library
- Demand Response Automation Server
- Positive feedback
- Policy of least privilege
- Insectothopter
- NOR flash memory
- Hosted application
- Human-perceptible
- Video signal
- USB token
- Archival storage conditions
- Pay-per-install
- Collection agency
- Contract performance
- Programmed
- Automated information
- Software correctness testing
- Electronic contract
- Telecommunications carrier
- Electronic protected health information
- Datum
- Jus in bello
- Medical information system
- Operations technology
- Uuencoding
- Automated testing
- Broadcast flag
- Counter-cyber
- Geoparsing
- Network Early Warning System
- Weak mark
- Artificial Neural Network
- Highly influential scientific assessment
- Cyberwarfare
- Acquisition management
- Defense message system
- Remote maintenance
- Autonomous operation
- High frequency
- Cash Flow
- Clock cycle
- Foreign agent
- Patriotic hacker
- Covert operations
- Digital-to-analog conversion
- Personal identification number
- Ringtone
- Cognitive radio
- Cell-site location information
- Credit
- Call Content Channel
- Safari
- IFTTT
- On-screen menu
- Onion Routing
- Prime number
- Broker
- Shared solution
- Shellac disc
- Path
- Development
- Information engagement
- Exploit kit
- CableCARD
- Topology
- Avonics
- Trade dress
- Harmless error
- Competition
- Troll
- Computational
- Horizontal accuracy
- Battery electric vehicle
- Electronic pedigree
- Renew (a certificate)
- Microcircuit
- Concurrent processes
- Broadband modem
- Questioned document
- Native instructions
- Scan line
- Interchange
- Object-oriented programming
- Defense Video and Imagery Distribution System
- Flame wars
- Offshore
- Cadastral data
- Evaluated Products List
- Information architecture
- System portability
- Resource behavior
- Political intelligence
- Off-site location
- Surveillance detection
- Prequalification
- Cached link
- Remote administration tool
- Intelligence gathering
- Software support
- Proactive
- Anti-virus software scam
- Secret key method
- Interdependency
- Flaw
- Inevitable disclosure
- Incident coordination
- Trusted recovery
- Break-even analysis
- Departmental intelligence
- Unshield
- Secret Key
- Computer Maintenance Management System
- 168 world
- Analytics-as-a-Service
- Electronic mail account
- Internet domain name
- Unbanked
- Hawalas
- Full Release
- Exploit
- Intelligence collection management
- Linkable information
- Decisional law
- Preparedness
- Internal website
- Policies and procedures
- Xerography
- Problem Statement
- Vertically integrated schedule
- Programming model
- Router flapping
- Variance
- Fork bomb
- Call data record
- Findability
- UDRP complaint
- Void for vagueness
- Subreddit
- Network virtualization
- Aggregated traffic
- Face-to-face
- Explosive detection system
- Nonfederal information system
- Parabolic antenna
- Logical migration
- Patentability opinion
- Concept of operations
- Purge
- Supplemental guidance
- Cyber network operations
- Blinding
- Grand jury subpoena
- Creative Commons Attribution-ShareAlike license
- Redundant control capability
- Fungibility
- .as
- Character Type
- Open format
- Celestial jukebox
- SMS Center
- Market power
- Secure state
- Operating income
- Access copy
- Geodetic
- Armed robotic vehicle
- Army Knowledge Management
- In limine
- Input
- Self-escrow
- Geoprivacy
- Bit error
- Software validation
- EMP attack
- Digital preservation
- External penetration test
- E-book
- Facilities and administrative costs
- Controlled access protection
- Nearshore outsourcing
- Unmanned
- Error correction
- Nonfederal organization
- Business Case
- Critical information system
- Asserting identity
- DNS spoofing
- Hazard vulnerability
- Current operational intelligence
- Symbolic speech
- Service level agreement
- Foundation data
- Electromagnetic battle management
- Degrees of freedom
- Software life cycle
- Prejudicial evidence
- Retail piracy
- Computer-stored evidence
- Read-only
- Impact value
- Inventiveness
- Duqu
- Printed publication
- Whiteboarding
- Principal Accrediting Authority
- Cloud broker
- Aleph
- Terrestrial transmission
- Real-time processing
- Power line communication
- Uncooperative user
- Content integrity
- Directory traversal attack
- Root account
- Child
- Readiness
- Suggestive mark
- Data author
- Dynamic filter
- Key management/exchange
- Linked information
- Electromagnetic spectrum management
- FIPS-validated cryptography
- Species claim
- Access control measures
- Contingency testing
- Cross-certificate
- Visual feedback
- Cost overrun
- Data standard
- User roles
- Proprietary rights
- XG
- Alternate work site
- Optical computing
- Internet service
- Security vulnerability
- Application owner
- Long-distance
- Mobile subscriber equipment
- Semi-autonomous
- Access to Knowledge
- Electronic article surveillance
- Critical and Sensitive Information List
- Piconet
- Internet freedom
- Emerging standard
- Cyber investigation
- Administrative search
- Voice over Wireless LAN
- Imputed knowledge
- Business-to-government
- Quality assessment
- Clicktivism
- Cost/pricing data
- Strategy
- Match
- Android
- Event flow analysis
- Network warfare
- Integration testing
- Storage virtualization
- Passive cyber defense
- Scoping guidance
- Data security breach
- Historically significant records
- Transmission security
- Electronic currency system
- File access permission
- Verifiable parental consent
- Digital Video
- Computer installation
- Postal code
- Performance management
- Exceeds authorized access
- Cellular air interface
- Early Adopter
- Block-chain
- Preventive intelligence
- Electronic warfare operations
- Battery Charger
- Geo-targeting
- Request for extension of time to file a statement of use
- Research and development
- Electronic support
- Literal copying
- Enterprise subsystem
- Inter-cloud computing
- Independent system operator
- TELNET
- Artefact
- Screen scraping
- Co-sourcing
- Exploit code
- Context information
- Sexagesimal coordinates
- Writ of fieri facias
- Policy-based access control
- Implementation profile
- Information security architecture
- .aif
- Near-space system
- First-party vendor
- Foundry
- Counterspace
- Carried device
- Mission Essential Functions
- Stateless
- Commercial mobile service
- Communications network
- Digital cable
- Domain name warehousing
- BridgeBlog
- Security classification designations
- Computer misuse
- Current indications
- Sound Surveillance System
- Biometric engine
- Special information operations
- Provenance
- Remote Procedure Call
- Wireless ad hoc network
- Spambot
- Custody
- Digital telephony
- Keying
- Touch-sensitive
- Mobile application management
- Dark Data
- Exclusion
- User Datagram Protocol
- ACID test
- Boot password
- Mouseover
- Intelligence, surveillance, and reconnaissance assets
- Geographic
- Official act
- Electronic Access Control or Monitoring Systems
- Indefinite quantity contract
- Unilateral contract
- Internet Storm Center
- Information network
- Testware
- Memetics
- Electronic guide
- Algebraic language
- Beta Testing
- Enterprise 2.0
- Teardrop
- Cryptographic module
- Digital preservation enabler
- Attribute provider
- Global Differential GPS
- Price protection
- Limited-feature operating system
- Perpetrator
- Coordinate
- Asynchronous Learning Network
- Disk array
- Created
- Spam trap
- Assessment findings
- Interconnected Voice Over Internet Protocol
- Financial Management Systems Software
- Open Data
- Protective intelligence
- Software crash
- Non-networked device
- Social impact
- Content spoofing
- Compartmented mode
- Adaptive maintenance
- Ground-referenced data
- Military grid reference system
- Smart appliance
- Abilene
- Postelection audit testing
- Bit-level preservation
- Scrambler
- E-thing
- Quadruple play
- Shuttle-Loop Transit
- Diagram
- IRC Channel
- Local access and transport area
- Blacker
- Record
- Cyber mobility
- Protective packaging
- Barcode reader
- CUI Program
- Variable name data element
- Data quarantining
- Infrastructure Reference Model
- Agent of the government
- Monolithic integrated circuit
- Attribute Certificate Revocation List
- Data bit
- Connected home
- Maximum tolerable downtime
- Fiber Channel
- Cloud computing service
- Conciliation
- Bootstrap
- Market
- Photo eye
- Republish
- Digital technology
- Volunteered personal information
- Physical access device
- Program
- Computing platform
- Title bar
- System interconnection
- Broadcast mode
- Operating budget
- Assemble to order
- Electronic Records Management Software
- Virtual child pornography
- Breach of confidence
- Information ecology
- Network monitoring
- Patent agent
- Network throughput
- Online communication
- Biorepository
- Whole genome sequence information
- Trademark
- Real World
- Compass
- Analog channel
- Address matching
- Computer security
- Settlement agreement
- Twisted Pair
- Spoofing
- Attorney's fees
- Crypter
- Bioterrorism
- Information defense
- Designated market area
- Local User Terminal
- Bit tax
- Maritime Mobile Satellite Service
- Electronic private automatic branch exchange
- Mesh topology
- Rogue security software
- Video card
- Geospatial information system
- Derogation
- Google Wallet
- Termination liability
- Bitmapped graphic
- Visitor Location Register
- Patent assertion entity
- Write-blocker
- Fraudulent concealment
- Analytics platform
- Emergency Services IP Network
- Special access
- Recovery
- Inter alia
- Computer control
- Wireless LAN controller
- Robust credential
- Infocomm security
- Computer-Aided Engineering
- Arbitrary
- Absolute risk
- Password authentication protocol
- Background vocalist
- COMSAT
- Cloud haven
- Shared Registration System
- Ticket-oriented
- Active window
- Threat inventory
- Chatter
- Action plan
- Time-sensitive
- Information security controls
- Hub-and-spoke
- Garbage
- Uncertainty
- Host-based authentication
- Information system-related security risk
- Public access
- Account hijacking
- Xbox
- Business model
- Attestation
- Laser intelligence
- Internal actor
- Cost Plus Incentive Fee
- Enterprise life cycle
- Droit moral
- Automated Vehicle Identification
- .bin
- Electronic tagging
- Critical infrastructure and key resources
- Lead time
- Unauthorized user
- World of Warcraft Gold
- Baud rate
- Online speech
- Public speaking
- Boot-up
- Contracting
- Whole person concept
- Moral turpitude
- Ancillary services
- Medium
- OpenNet Initiative
- Dismissal without prejudice
- Product security evaluation
- Google Reader
- Meterware
- Mobile Internet Protocol
- Letter of intent
- Roadworthiness testing
- Infrared imaging
- Parallel import
- Identity binding
- Authentication technologies
- Access contract
- High-value information
- Universal Internet
- Tablet device
- Security-aware resolver
- Filing date
- Competitive advantage
- Investigative source evaluation
- All fours
- Security hole
- Angel investor
- Capability set
- Computer Output to Laser Disk
- Intangible goods
- Verifier impersonation attack
- Discretionary access
- Slang
- System and Information Integrity
- BERD
- Digital currency
- Common controls
- Patent applicant
- Steganography
- TCP SYN flood
- Overlay
- Pan-European rating system
- Privacy data
- In transit
- Palm OS
- Audio message interface specification
- Fixed costs
- TAP
- PAL
- Decompile
- Copyright application
- Online retailer
- RPAS Commander
- Attribute
- Remote sensing satellite system
- Visualization process
- Qualified immunity
- Ephemeral key
- Anchor link
- News Feed
- Telemetry, tracking, and commanding
- Technical Performance Measurement
- Stimulus
- Temporally dynamic
- Wearable computer
- Lifestreaming
- Trial de novo
- Item of supply
- Preservation copy
- 911 system
- Platform
- Target architecture
- Payment card
- Universal Core
- Intervention
- Patent assignor
- Identity card
- GDP Price Index
- Systems of national interest
- Platform virtualization
- Miner
- Cryptographic material
- Broadband connection
- Noncommercial webcaster
- Discovery rule
- Smart dust
- Mission assurance
- General and administrative costs
- Confirmation service
- Other emergency communications service provider
- Offensive patenting
- Defense Satellite Communications System
- Information quality
- Master file
- Cyber incident response plan
- Network interface unit
- Analytics engine
- Wideband CDMA
- Consumer electronics
- Mailbot
- Location Data
- Reasonable Doubt
- Change of venue
- Emailer
- Archival record
- Major information system
- Verification and validation
- Delegate
- Counterintelligence support
- Scroll button
- Comparison decision
- Creative Commons Attribution-NonCommercial license
- Component test
- Request for Technical Proposal
- Local operational data
- .mov
- Application content filtering
- Remote deposit capture
- Distributed computing system
- Simplex operation
- Auditing tool
- Linear channel
- Cyber maturity model
- Protected Network Services List
- Demagnetize
- Pervasive computing
- Keyboard
- ITunes
- Hop
- Wireless sensor and actuator network
- Government record
- Screencast
- Public safety services
- Outsider
- Wheelwars
- Snail Mail
- Point-to-multipoint
- Public key
- Patent analyst
- Privacy incident
- Platform for Privacy Preferences
- Power Source
- Trojan clicker
- Call originator
- First party data collector
- Personal Locator Beacon
- Television network
- Documentation imagery
- Closed system
- Suspicious Activity
- Finger
- National cyber security
- Reconfiguration
- Electronic Administrative Procedure
- Residual risk
- Intelligence agent
- Covert channel
- Trend analysis
- Online agreement
- Information diving
- National Security Investigation
- Visible spectrum
- "Essential facilities" doctrine
- Junior user
- Semiconductor scaling
- Forward looking infrared
- International Standard Recording Code
- Cyberactivist
- False non-match
- Biometric performance testing standards
- Legal fiction
- Power management
- Digital communication
- Nationwide HIE
- Unauthorized use
- Information content
- Dynamic memory allocation
- Commercially reasonable
- Geopotential datum
- Fourth generation language
- Gadget
- Deliverable Expectation Document
- Telecommunications support services
- Skype
- IP everywhere
- DTMF
- Main storage
- Identity intelligence
- Clandestine intelligence
- Willful conduct
- Privacy protection
- System modification software
- Semantic model
- Statistical analysis
- Criminal mischief
- .gs
- Cyber disruption
- Blog control
- Receive-only terminal
- Advertisement
- Activity Monitor
- Computer data base
- Going private
- Manual
- Terrorist Screening Database
- Vector graphic
- Satellite navigation
- Full spectrum operations
- Circuit switching
- Container file
- Google Search
- Web forum
- Session key
- Forensic evidence
- Technology stack
- Encrypted data
- Television set
- Confidential information
- Cyber analysis
- Active pervasive attack
- Regulation Z
- Whitewashing attack
- BlackPOS
- Project team
- Data analytics
- Micropayment
- Letter of Credit
- National Geodetic Vertical Datum of 1929
- Voluminous writings exception
- Recommendation
- Forward Looking Infrared
- Lesson Learned
- Information resources management
- Rainbow Series
- Prototyping
- IMD-dependent program
- Authentic record
- Global Command and Control System
- Trademark rights
- Computer intrusion detection
- Field preemption
- Boolean search
- Camera-ready copy
- Intelligence source
- Security Token
- Paradigm Shift
- Technical due diligence service
- Fragmented literal similarity
- Termination Contracting Officer
- Cognitive load
- Fault
- Last 100 feet
- Operational readiness
- Cold hit
- Reputation economy
- Interstitial image ad
- Contrast
- Anonymous transaction
- Wide Area Augmentation System
- Search results
- In-the-wild virus
- File-based digital
- Map spamming
- Broadcast domain
- DVD-RAM
- Managed Security Services Provider
- Financial system
- Cloud consumer
- Audio recording device
- Common Attack Pattern Enumeration and Classification
- Query response time
- Department of the Army Cryptographic Access Program
- Identifiability
- Envelope header
- Internal vulnerability
- Absolute link
- Detailed manufacturing or process data
- Host intrusion prevention
- Rotary camera
- Encrypted network
- National Cyber Alert System
- Orchestration
- Traffic classification
- General purpose reloadable card
- Provider of electronic communications to the public
- Cyber-protest
- Connectivity testing
- Authentication bypass
- Scanner
- Microscale
- Classified document
- Steering
- H.350
- Software publisher
- Deductive logic
- Intelligence application
- Integrated Drive Electronics
- Musician
- Self-driving vehicle
- Governmental Cloud
- R-commerce
- Media Player
- Unsigned data
- Threat consequence
- Corroborate
- Polygon
- Infringement
- GuardNet
- Internet access tax
- Web-based
- Radiodetermination
- Raines' Rules
- Everything somewhere
- Anti-malware software
- E-mail address
- Defamation per se
- Privacy protective behavior
- Opportunity cost
- Computer network attack operational preparation of the environment
- Pro rata
- Acrobat
- Classified computer security program
- Information sector
- Corruption
- Case law
- Mean time between repairs
- Control requirements
- Factory acceptance test
- Short form notice
- Pairing
- Virtual
- Pass-the-ticket attack
- Reed's Law
- Shredder
- Multitasking
- Condition precedent
- Constructor
- False match rate
- Industrial Automation
- Twitter-jacking
- Ephemeral
- Stack mashing
- Mature standard
- Feature phone
- Qubit
- Exaflood
- File integrity monitoring
- Automated vehicle
- Minimal risk condition
- EDS White Pages
- Scope change
- Inventory control
- Commercial misappropriation
- Forensically clean
- Ushahidi
- Vehicle-to-infrastructure technology
- .aero
- Covered Business Method
- Zone of Control
- Remote crew member
- Source selection
- Technical complexity
- Fat client
- Mirror
- Audiovisual production
- Analytic system
- Private entity
- Back-Up
- Hacking back
- Private-sector standards
- IA Availability
- Passive Optical Network
- Shell account
- Definitization
- Portable music player
- De‐anonymization
- Written information security program
- Assurance evidence
- Optical-mark-recognition equipment
- Interactive computer graphics
- Digital workplace
- Computer-integrated manufacturing
- Player key
- Complexity
- Blue Pages Concept
- Quantitative assessment
- Information operations vulnerabilities
- Mobile ad network
- Message switching
- Manufacturer
- Total possible available time
- Card Clash
- Grey propaganda
- Access control information
- Wi-Fi Protected Access-2
- Member of the European Parliament
- Audit and monitoring control
- Competent evidence
- Controlled access area
- Social widget
- Internet of Things botnet
- Risk
- Hijack attack
- Data asset
- Digital content industry
- Working papers
- Data Generation
- Commodity IT services
- Electronic impulse
- First-to-file
- Cable Modem
- Database query
- DCID 6/3
- Operational
- Acquisition device
- Safety System
- Quantum meruit
- Offload
- 3.5D
- Actual Cost of Work Performed
- Black Box
- Turnkey system
- Database
- One-time tailoring
- Federal Advisory Committee
- Radio frequency countermeasures
- Tandem switch
- Diversity
- LINPACK Benchmark
- Electrical
- Alienation
- Computing resource
- Satellite network
- Communications system
- Single intelligence environment
- Geographic entity
- Right to be forgotten
- Cyberhacktivist
- Configuration management
- Viability
- Network security manager
- Nanotechnology
- Anchor text
- Designee
- Financial feeder system
- Workflow diagram
- Teleprocessing
- All-hazards
- Inquiry notice
- Internet Protocol Version 4
- Outsourcing
- Multiple-factor authentication
- Portable Network Graphics
- Symbol
- User-interactive service
- Docking
- Program infector
- Rules-based program
- Emergency dispatch providers
- Counterintelligence operations
- Geomagnetic storm
- Core
- Digital storage media
- Video calling
- Need to know determination
- Industrial Revolution
- ASIC miner
- Computer equipment
- Secure File Transfer Protocol
- Proprietary technology data
- Beeper
- Online grooming
- Mobile
- WinZip
- Behavioral targeter
- Change Control Board
- R&D services
- Classification challenges
- Least privilege analysis
- Controlled unclassified information
- BRB
- Base map
- Home Automation
- Risk mitigation
- PCMCIA card
- Regional intelligence center
- Brevity code
- Audit review
- Terabits per second
- WANK/OILZ worm
- Poor Man's Copyright
- Teletext
- Browser modifier
- Tear line
- Facial detection
- Counterthreat operations
- Mobile vendor
- Type 1 product
- Equal access
- Smart card
- Notice of Inquiry
- Tortfeasor
- Remote diagnostics
- Actual authority
- Technological change
- Controlled sharing
- DoD Electronic Biometric Transmission Specification
- Net-centricity
- Media server
- Crisis Management
- Hybrid attack
- Moore's Law
- Srsly
- Lab-on-a-chip
- User account
- Bionics
- Streisand effect
- Computer espionage
- Ad hoc
- Contextual advertising
- Unstructured data
- Compromising emanations
- File format
- Cartographic records
- Printout
- Interoperability standards
- Energy management device
- Feedback
- Power Outage
- Technical penetration
- Government purpose rights
- Monte Carlo simulation
- Broadband service provider
- Nigerian 4-1-9 fraud
- Binary
- Videodisc
- Recompile
- Federal information
- Nuclear EMP
- Business email compromise
- Mbit
- Intentional threat
- Access control function
- Photo sharing
- Data enclave
- E-learning
- Health care organization
- Downstream
- Information Warfare Defense
- Chatham House Rule
- Electronic decision support system
- Appropriation
- Computer process
- Detection
- Access Overload Control
- Tiered pricing
- Security perimeter
- On-demand scanning
- Cross-subsidization
- Electronic data
- Voicetone
- Logical access
- Information technology manager
- Timeline
- Internet industry
- Control plane
- Address box
- Clean pipe
- Laser printer
- Electronic control unit
- Performance audit
- Cyber agitation
- De facto
- Weapons system
- Crimeware-as-a-Service
- Digital Local Agenda
- Bespoke
- System restore
- Computer facility
- Virus writer
- Law of Accelerating Returns
- Risk index
- Pseudonymisation
- Interactive Multimedia Instruction
- Virtual environment
- Video compression
- Consensus standard
- Anonymous login
- Client appliance
- Provisional patent application
- Person Data Exchange Standard
- Open Systems Interconnection
- Broadcaster
- Digital engagement
- Internet of Things device
- Nonfungible goods
- Deal memo
- Identity of Things
- Bioinformatics
- Projected threat
- Official Gazette
- Clickstream data
- Bot-herder
- Guerilla Marketing
- Secondary use
- CT1
- Digital line graph
- Ingestion
- AZW
- Physically isolated network
- Sub silentio
- Master cryptographic ignition key
- Scientific method
- Named user license
- Ballot marking device
- Lock
- Dual use
- Dynamic adaptive routing
- Business continuity test
- Clearing House Interbank Payments System
- Scope of work
- Analog data
- Routing algorithm
- Storage Area Network
- Search neutrality
- Agent of a foreign entity
- Biometric data
- Password cracking program
- Inter-enterprise subsystem
- Georegistration
- Eight Ingredient Framework
- Government enterprise services
- Interoperability testing
- Threat recognition
- Verifier
- Point-to-point topology
- Commodity
- Subjective territorial jurisdiction
- American Community Survey
- Proxy server
- Payment Application Data Security Standard
- APL
- Internet of Things middleware
- Common Relevant Operational Picture
- Clinical research information system
- Software asset management
- Ageing
- Software item
- Externalities
- Configuration settings
- Symmetric key cryptography
- Interested copyright party
- Postroll
- Intelligence synchronization
- Whiteboard
- Forensic and biometric intelligence
- Abuse of functionality
- Open license
- Recycled
- Pictorial, graphic, and sculptural works
- Preroll
- Emergency medical services
- Affirmative confirmation
- Computer room
- Software architecture
- Standard of care
- Multinational
- Digital reproduction
- Mission-essential functions
- Unauthorized disclosure
- Open Source Information
- Counterintelligence special operations
- Authentication process
- strong user authentication
- Tabular reporting
- Mobile payment
- Network management
- Situational awareness
- Passive tag
- Data mapping
- Demand-side platform
- Explicit georeferencing
- Wired
- Multimedia computing
- Home to Grid
- Mobile Switching Center
- Distributed intelligence
- Area reconnaissance
- Hackerspace
- Government-owned, government-operated laboratory
- Domain name industry
- Organizational independence:
- Physical address
- Demurrer
- Emergency data services
- Network Service Provider
- Telecommunications law
- Bagger
- Declassification
- Intelligence Community Assessment
- ACH fraud
- Voice firewall
- Systematic error
- Local area network
- Call tree
- Collection management authority
- Pay as you go
- Voice over broadband
- RFID card
- Intangible benefits
- Tumbling
- Transaction
- Results-based management
- Impossibility
- Memorandum
- Technical barriers to trade
- Cryptographic access
- Direct inward dialing
- Reband
- Decentralized virtual currency
- Program description
- UDP flood attack
- IRC user
- Distributed network
- Boundary protection technologies
- Geosynchronous earth orbiting satellite
- Cascading menu
- Process Server
- Directed-energy protective measures
- Best value
- Game platform
- Virtual data storage
- Class action
- Channel operator
- Packet switching
- Global Security
- Predefined contract
- Wireline communications
- Asymmetric algorithm
- Declassification guide
- Cross-border
- Black holing
- Image compression
- Predominant purpose test
- Law enforcement information
- Layered system
- Component ISSM
- Intelligence-related activities
- Archival storage
- Direct distance dialing
- Hot swap
- Advercasting
- Internet protocol number
- Radio network
- Real-time pricing
- Index
- Digitizing
- Assembly
- Rewritable optical disk
- Hardware firewall
- Repost
- Perimeter security
- Human intelligence source
- Tradecraft
- Prejudgment interest
- Avatar
- High-performance computer
- Cloud service owner
- Actual cost
- PKI certificate
- Interface
- "Red button" interactive TV
- Specified dissemination
- Vendor
- Contract evaluation
- Zone file
- Risk response
- Vulnerability audit
- Store loyalty card
- Cutover
- International mobile equipment identity
- Upstream
- Overt digital attack
- Distributed antenna system
- Radio Frequency for Consumer Electronics
- Text-mining
- Court of law
- Disparage
- Original classification
- Frequency drift
- Whitelisting
- Cyber situational awareness
- False negative
- Contracting Officer
- Emission Control Policy
- Incident Report
- Research virus
- Independently understandable
- Buffer
- Identity registration
- Television program
- Physical access control
- ICT supply chain threat
- Direct-To Home
- Individual-to-Community
- Electric storage technologies
- Speech
- Security event
- Spread spectrum system
- ROM
- Digital curator
- Hyperencryption
- Graphic data
- Vulnerability assessment
- Clear mode
- Digital data service
- Hijacking
- Economic, social, and cultural rights
- Witness impeachment
- Cellular Digital Packet Data
- Keystroke monitoring
- Ecosystem
- Reference implementation
- Database server
- Umwelt
- Single-factor authentication
- IPhone
- Security support structure
- Depository library
- "Sneak and peek" warrant
- Thing-to-person
- Internet information location tool
- Universal Product Code
- Information strategy
- Permanent access
- Connected device
- Wholesaler
- Classified
- Executive agency
- Estimate
- Anti-automation
- Online government services
- Deductive reasoning
- License application
- Navigation Bar
- Secure Sockets Layer
- Nominal scanning resolution
- Wiping
- TV whitespace
- Indictment
- Civil society
- Satellite receiver dish
- Sensor fusion
- Automatic flight control system
- Fixed-price incentive contract
- Amazon Prime Air drone
- Contractor owned, contractor operated
- Petaflop
- Feed-in tariff
- High-Speed Downlink Packet Access
- Privileged command
- Automatic train operation
- Teraflop
- Network-centric technologies
- Security plan
- Processor register
- Solvency
- Cable service
- Disk mirroring
- Benefit
- Genotyping
- Hash value
- Raw data
- Privacy tipping points
- Registrar administration tool
- E-neighbourhood
- Integrated Project Team
- Financial statement
- Shall
- Autonomous vehicle test driver
- Ethernet
- View
- Emergency support services
- Geographic separation
- Radio link
- Moving map display
- Y2K problem
- Emergency cyber action
- Legislature
- System Failure
- Burn Notice
- Warning system
- Vector supercomputer
- Library
- Prime contractor
- Manipulative communications deception
- Safety
- Design specification
- Defensive patenting
- Step-and-repeat camera
- Colorable imitation
- Encryption component
- Fully autonomous aircraft
- Confidentiality-protected data
- Tangible asset
- Field Intelligence Model
- Stand-alone system
- Promotional
- Web-native media
- Audio CD
- Cost-of-living index
- Precedence-Based Assured Service
- Tribe
- Distributed password cracking
- Receipt
- NTCA–The Rural Broadband Association
- Electronic Directory Services – People & Organizations
- Computerized physician order entry
- Acoustic jamming
- Application generator
- Online banking credentials
- Visual surveillance
- Shamoon
- WebMoney
- Repacking
- Call hold
- Card reader
- Cross-compiler
- Blacker Front End
- Infrastructure Assurance Advisory Group
- Graphics software
- Picosatellite
- Zoning
- Music lockering service
- Numbered Air Force
- Click to call
- Chat bot
- Credit protection services
- Nanostandards
- Federal Reserve System
- Next-Generation Air Transportation System
- Bing
- Electronic notary
- Amplitude
- HUMINT Operational Communications Network
- Public network
- Removable media
- DCC chat
- Cyber content management
- Aircraft earth station
- Intelink-TS
- Gerd
- SLAPP
- Net authentication
- IT System Security Officer
- Indications and warning system
- Closed security environment
- EU-15
- Install
- Financial management system
- Wireless service
- Video Chat
- Port number
- Lossy compression
- Information Exchange Requirements
- Option
- Defense Communications System
- Executive Order
- Network front-end
- Signer
- Non-volatile storage
- Formatted information
- Exception report
- Mergers and Acquisitions
- Dynamic Host Configuration
- Remote pilot
- Low-impact system
- Business use
- Birds of a Feather session
- Bundling format
- Bass
- Credentialed
- Geocoded image
- Law enforcement intelligence
- Critical peak pricing
- Homeland Secure Data Network
- Whaling
- Website Design
- Adverse environment
- Service
- Meteorological data
- Life-casting
- Ripping software
- Double Blind
- Certificate Signing Unit
- Bugbear
- Boilerplate
- Sense of Community Memo
- Malicious Intent
- Inference
- FOSDIC
- Console
- Arcade game
- Service observation
- Pixelation
- User data
- Polymorphic virus
- Stove-piped
- Inevitable discovery exception
- NetBus
- Paid prioritization
- Immersion
- Contraband
- Data Security
- Agent of a foreign power
- Manual key transport
- Status message
- Wide area situational awareness
- Automated Teller Machine
- Operational acceptance test
- Molecular Memory
- Cybersecurity threat
- Stakeholder requirements
- Edited aggregator
- Literary character
- Live test demonstration
- Database segment
- Responder
- Contractor attributional/proprietary information
- Computer performance
- Keyword spamming
- Standing wave
- Parameter List
- Malfunction
- Web analytics
- Pagejacking
- Keyword search
- Two-dimensional
- Mid-range system
- Diagnostic data management
- EBITDA
- NanoTube
- Intrastate service
- Degauss
- Fraudster
- Collective use
- Dual-connect attack scenario
- WordPerfect
- Chargeback
- National Intelligence Officer for Warning
- Technotainment
- Preservation master
- Electronic order of battle
- Digital forensic analysis
- Principal electronic warfare activities
- Podcasting
- Temporary record
- Consensual monitoring
- Dedicated circuit
- Enterprise roadmap
- Sidebar
- National security system
- Narrowband channel
- Natural language
- Self-recognition procedure
- Magnetic sensor
- Frequency Modulation
- Virtual asset
- Inferred data
- Protected health information
- Virtual social world
- Recordable format
- Absolute address
- Signaling System 7
- Application developer
- Paraphrasing
- Middleware
- Ubiquitous computing
- Virtual agency
- STOP! Initiative
- Electromagnetic environmental effects
- Microdata
- Fair Information Principles
- Enterprise software agreement
- Abuse of process
- Dial-up connection
- Intermediation
- Technical obsolescence
- Subscript
- Environmental control system
- Archival value
- Panchromatic image
- CyberSpy
- Download Speed
- Critical electric infrastructure information
- Dynamic authentication
- Deregulation
- Business resumption team
- Unlicensed spectrum
- Tactical information
- Unified Capabilities
- Malicious insider threat
- C round
- Reconversion
- FBI scam
- Tax credit
- Master agreement
- Security inspection
- Comprising
- Data communications
- Array
- Running
- Biometrics methods
- Time Compression
- Clear and conspicuous
- Biometric Information Record
- Internet access point
- MMO
- Extended binary coded decimal interchange code
- Brute force attack
- Volume
- Damage assessment
- Flatbed scanner
- Raw unstructured data
- CUI Categories or Subcategories
- Phonic ringtone
- Controller Area Network
- Bid rigging
- Microservices
- Crisis
- Repository
- Citizen-to-government
- Automated driving system
- Cancellation proceeding
- RAM scraper
- Fixed price contract with prospective price redetermination
- Personal surveillance
- DeCSS
- Parity bit
- Distribution line
- Information system architecture
- Text box
- Break-wire detector
- Secondary use of data
- Privacy policy generator
- Preservation data
- Viewport
- Software vulnerability
- Likejacking
- Business impact analysis
- Sensitive personal information
- Health record
- All-hazards preparedness
- Cable channel
- Integrated communication, navigation, and identification
- Home page
- Special Access Program
- Delimiter
- False rejection rate
- Referral
- Ephemeral literature
- AM broadcaster
- Physical record
- Termination charge
- Geographic information systems software and hardware
- Observables
- Automatic noise suppression
- Cyber risk tolerance
- Affirmative defense
- Cloud service level agreements life cycle
- Independent service organization
- Dedicated radio-frequency spectrum
- Automatic Repeat reQuest
- ZOOM
- Time division multiplexing
- Mass market
- User authentication
- National Security Letter
- Directed-energy device
- Portability
- Nonrecord material
- Local loop unbundling
- Caller ID spoofing
- Remote Authentication Dial-in User Service
- GPS satellite
- H.323
- Filtering router
- Information type
- Periodical
- Interception measure
- Technology platform
- 2-factor authentication
- Proprietary specification
- Server license
- Initial Public Offering
- Document camera
- Teleprinter
- Computer
- Exclusive territory
- Energy information
- Bankruptcy
- Keyword in context
- Cylinder recording
- Dual use certificate
- Lightly evaluated raw intelligence
- Face Recognition Vendor Test
- Quantum cryptography
- Privacy disclosure
- Domain authentication
- Exchange Network Facilities for Interstate Access
- Insider attack
- User ID
- Algorithm transition
- Protocol entity
- Duty of confidence
- Control loop
- Drum scanner
- Abnormal termination
- Mobile aggregator
- Nanogenerator
- Two-way communication
- Online traffic
- Desktop environment
- Back-up generations
- Desourcing
- Debit Card
- Song
- Online Computer Library Center
- Contingency contracting
- Bill payment
- Money launderer
- Maintainability
- Storage Key
- Pattern Recognition
- Server room
- Control Zone
- Non-dramatic literary work
- Data Link Layer
- Wikipedia
- Data protection authority
- Distributed denial-of-service attack
- Chatting
- Notice of allowability
- Misdemeanor
- Grover’s quantum algorithm
- Select/Control/Evaluate approach
- Communication error
- Genetic discrimination
- Actionable Intelligence
- Partitioned security mode
- Sector Coordinating Council
- Intelligence collection plan
- Information security systems and software development specialist
- Risk acceptance
- Digital encoding
- Hidden data
- Stay
- Clearance Level
- Roving wiretap
- Lacquer disc
- Filename
- Plowing
- Frame-by-frame
- Essential functions
- Collocating
- Shrinkage
- Full bit emanation
- Magazine
- Multi-label
- Human resources information technology
- Cyber offense
- Classified automated information system
- Departments and agencies
- Cybercrime-as-a-Service
- Termination security briefing
- Click and collect
- Incapacitation
- User endpoint
- Commerce Control List
- Server-based filter
- Quality of service
- Stereophonic sound
- Tactical Interoperable Communications Plan
- Credentials Service Provider
- Data element name
- Interdiction
- Mobile Web
- Business process model
- Security compromise
- Image exchange
- Symmetric key
- Lottery scheme
- Programmability
- LandWarNet
- Global Information Grid (GIG) Technical Guidance
- Trading partner
- Costs
- End-of-file marker
- Behavioral retargeting
- Desktop software
- Distribution intelligence
- Meridian (geography)
- Flash cookie
- Cyber analytics
- Failure-to-warn
- Security control assessor
- Machine language
- Reasonable accommodation
- Cybersecurity signal
- Free Space
- Covered Information
- Filter bubble
- SOUTHCOM
- Temporary access eligibility
- Database connection
- Enhancement
- Ad tags
- Cyberslacking
- Physical process
- .asia
- Eligible telecommunications carrier
- Interconnection charge
- Pulse-code modulation
- WHOIS
- Copy protection
- ADP system
- De minimis non curat lex
- Division
- Media source analysis
- Compulsory
- Geospatial Intelligence Knowledge Base
- Counterintelligence insider threat
- 802.11 network
- Mission function
- Blogosphere
- Broadcast programming
- Specialized formats
- Spam zombie
- Transborder data flow
- Security advisories
- Log-on banner
- Trial template
- JSTOR
- Settlement arrangement
- Miniaturization
- Source metadata
- Common Biometric Exchange Formats Framework
- Second
- IT security architecture
- Foreign affiliate
- Archie-Like Indexing in the Web
- Authentication and authorization infrastructure
- Host-based intrusion detection and prevention system
- Unfair competition
- Computer System Security Officer
- Satellite telephony
- Circuit
- Artificial Intelligence
- Legislative information system
- Network security mechanisms
- Irrevocable
- Remittitur
- Remote desktop access
- Digital subscription
- Active record
- Digital imaging
- Regressive tax
- Field sensing
- Corrective advertisement
- Cybergriping
- Information asset
- Response Time
- Energy harvesting
- Information Warfare
- Sound Effects
- Equitable relief
- Operations code
- TRACEROUTE
- Key escrow system
- Interconnection fees
- Biosurveillance enterprise
- Database management system
- Distance Learning and Telemedicine Loans and Grants
- Red Team
- Minimalist cryptography
- Validation
- Cyberspace force application
- Biometric property
- Nation state
- Ambient intelligence
- Fixity information
- Self-selection
- Automated data collection
- Window
- Heterogeneous data
- Advanced analytics
- Consistency
- Turing machine
- Smartphone
- Mapping
- First-party cookie
- Research intelligence
- Traffic filter
- Gmail
- Cyberthief
- Speed tiers
- IP telephony
- Burn
- Military deception
- Nondependent instruction
- Physical entity
- Personal communications device
- Records creation and maintenance program
- Transactional email
- Red signal
- Vendor-neutral
- Sub-band
- Friction ridge
- Online cryptosystem
- Behavior
- Code of conduct
- Scan
- Computer network attack
- Authentication mechanism
- Industrial sensor
- Contextual threat intelligence
- Six Sigma
- Fidelity
- Asymmetric
- Masquerade attack
- Credit card authorization services
- Business interruption insurance
- Wire communication
- Ratter
- Security standards
- FERPA block
- Prerecorded message
- Quash
- Collision avoidance system
- Specificity
- Ambient device
- Milestone B
- Network topology
- Broadcast-controlled air interception
- Collection requirements management
- SOCAN
- Amendment clause
- Card personalization
- Security model
- Event
- Flexibility
- Full virtualization
- Negative option feature
- Executable code
- Parent application
- Bailment
- Information assurance
- Cyber espionage
- Breach of warranty
- CD-ROM drive
- Sweepstakes
- Emanation
- Bar code font
- Circumstantial evidence
- Doppler Radar
- Cause of action
- Standard Operating Procedure
- E-Gold
- Moderate confidence level
- Pure alphabetic
- Disk image
- Trivial File Transfer Protocol
- Machine learning and evolution
- Sensitive compartmented information
- Acoustics
- Data monetization
- Ground-based sense and avoid
- Lost link
- Multilevel
- Dump-restore program
- Unifying Intelligence Strategies
- Satellite phone
- Technical threat indicator
- Hypermedia
- Glyph
- Word processor
- Information policy
- Market research
- Volatile memory
- Touchpad
- Virtual network
- Unfair Commercial Practices Directive
- Print suppression
- Interface Message Processor
- Facilitative technology
- Imagery-derived product
- Reverse Engineering
- Medical technology
- Transnational
- Presidential records
- Trusted identification forwarding
- Altmetrics
- Unidirectional social media application
- Bitmapped character
- Wide-area telephone service
- Security by default
- Wireless portable electronic device
- Business Plan
- Digital information
- National security information
- Communications infrastructure
- Hold harmless
- TWiki
- Profiling
- Resolve
- Vehicular ad hoc network
- Sender Policy Framework
- Answer
- Alerting and Coordination Network
- Joystick
- Traffic analysis
- Instruction count
- Virtual classroom
- Acoustic
- Copyright paradox
- Economic security
- Voluntary
- Ad Hoc 206
- Satellite operator
- F.O.B.
- Manual of Patent Examining Procedure
- Ancillary Terrestrial Component
- Cyber resilience
- Long-arm statute
- Plurality
- Access list
- Cybernetics
- Identified visitor
- Transclusion
- Cost Evaluation Panel
- Alphabetic character set
- Recording contract
- Audiobook
- Defense-in-breadth
- Cellular Message Encryption Algorithm
- Push
- Type II cryptography
- Accounts payable
- Root compromise
- Remote server
- Geospatial referencing
- Cryptographic access for use
- Usage rate
- Authoritative name server
- Business process
- Business information
- Cryptology
- Memory latency
- Preliminary design review
- Electrically-Erasable Programmable Read-Only Memory
- Data File
- Ad network
- Spatial diversity
- Digital mobility
- Directory assistance
- Information portal
- Walled garden filter
- Classified defense information
- Duplicate image
- Code vocabulary
- Target intelligence
- Mail transfer agent
- Schedule
- Interactive information system
- Intercept subject
- Permanent deletion
- Call setup data
- Approximate matching
- Program development process
- Liability cap
- Behavioral biometric
- Motion to dismiss for failure to state a claim
- Cybersecurity controls
- Data broker
- Generic claim
- Disclosure control
- Internet Complaint Search and Investigation System
- Click through
- Use Case
- Improper means
- Medium confidence
- Bullet
- Firewall environment
- Dialer
- Feature pack
- Tor browser
- Deduplication
- Behavioral biometric characteristic
- Business application
- Personally identifying information
- Access mode
- Load balancer
- Card-not-present
- Untrusted
- Multilateral
- BMP
- Mobile commerce
- Activities
- Test environment
- Public/private partnership
- Information network infrastructure
- Computer sabotage
- Incident response process
- Computer telephony integration
- Card issuer
- Ergonomics
- Metropolitan Statistical Area
- NERC Critical Infrastructure Protection (CIP) 002-009
- Report on New System
- Copyright Office In-Process System
- Digital non-secure voice terminal
- Compile
- IDevices
- Video Surveillance-as-a-Service
- Preferential trade arrangement
- Key validation
- Abstract
- Control systems
- Business Reference Model
- Cyber Monday
- Wireless telegraphy
- Comparative advertising
- Alphanumeric data
- Risk data
- CUI categories or subcategories
- Interexchange service
- Patent protection
- Multi-Use Radio Service
- Genetic information
- Signature dynamics
- Blackmail
- Access control policy rules
- Downtime
- Sensitive data
- Satellite data
- Electronic Check Presentment
- Free Software Foundation
- File signature
- Information dissemination management
- Investigator
- GPS receiver
- Binocular
- Pure numeric
- Concurrent user license
- Multinational corporation
- Broadcast media
- Platform IT interconnection
- Amplitude Modulation
- Contention ratio
- Negligent misrepresentation
- Health Technology Assessment
- DBS operator
- Incident action plan
- Test assumptions
- Multi-hop relay topology
- Catalogue
- Video
- Anti-tamper
- National Television System Committee
- 10BaseT
- False non-match rate
- Horizontal scaling
- Lithography
- Online TV
- False representation
- Digital information object
- Size correlation attack
- Radio broadcasting
- Something everywhere
- Gag Order
- Systemic risk
- Logistics Data Interchange
- ANSI/NIST-ITL
- Affiliate website
- Chemical sensor
- Comparative advantage
- Single loop controller
- Abandoned invention
- AM broadcasting
- SNA
- Blackhat search engine optimization
- Technical infrastructure
- Peer-to-peer
- Goodwill
- USDA Internet Access Network
- Voice user interface
- Graphics Device Interface
- Computer-aided system engineering
- Sampling rate
- Registered location
- Effectiveness
- Agency Federal Records Officer
- Physical access control system
- Crowd funding
- Explicit knowledge
- Disposition
- Digital audio workstation
- Log file
- Authentication authority
- Restricted portal
- Ultra high frequency
- Data compression facility
- Comment spam
- File wrapper estoppel
- Spatial analysis
- Non-convertible virtual currency
- Smart television
- Bytes per second
- Soft copy
- Shouting
- EWIR data
- Millennia Lite
- Radiotelephony
- Skywave
- Managed Network Services
- Access point
- Worst-case scenario
- Interest rate
- Loudspeaker
- FAQs
- Freeloading
- White list
- Two-person control
- In-database processing
- Computational speed
- Milstar
- Rate rebalancing
- Microform
- Business process application controls
- Biomedical computing
- Boot sector
- Washington Treaty
- Geostationary transfer orbit
- ROFL
- Video Cassette Recorder
- Cyberattack
- Tagged data element
- Detection tool
- Fraud on the Patent and Trademark Office
- Wireless services
- Patentability
- Billing quantity data
- Digitized goods
- Operational controls
- Sensitive but unclassified
- National security clearance
- Wireless Sensor Network
- Call splashing
- Automated Clearing House Operator
- Data Sharing and Security Framework
- CNP fraud
- Unmanned underwater vehicle
- Multi-functional card
- Autonomic networking
- Academia
- Average Revenue Per Paying User
- Modular software
- Minimization
- Kilometer
- Document tracing
- Distribution Management System
- Notice-and-choice model
- Biometric application
- Willful infringement
- Small Unmanned Aircraft System
- Network map
- Pay-per-listen
- Enrollment
- Hierarchical database
- Decisional privacy
- Distribution system
- E-electioneering
- Incident handler
- Hand Scan
- Systems Under Evaluation
- Small Unmanned Surveillance Aircraft
- Over-the-air
- Study phase
- Native scanning resolution
- MS-DOS
- EDP auditor
- Acceptance criteria
- International terrorism
- Requirement
- Logical expression
- Case sensitivity
- Trunk
- Beagle
- Bound metadata
- High-speed
- Redirection
- Mission IT services
- Abductive inference
- Public switched telephone network
- CA facility
- MHealth
- Reliance
- Metaverse
- Agent handler
- Wafer
- Distributed ledger technology
- Near Field Communication
- Bit rate
- Procurement fraud
- Calling party
- Terrorist attack
- Value-added network service
- Check digit
- Re-enrollment
- Customer energy management device and system
- Rebroadcast
- EU acquis
- Attribution
- Data point
- Third-party cookie
- Home computer network
- Forum shopping
- Wireless internet service provider
- Chief Security Officer
- Endpoint address
- Personal use
- Digital preservation service provider
- Integrated Development Environment
- Technoethics
- Password-generating token
- Computer-managed instruction
- User initialization
- Indoctrination
- Command, control, communications, computers, and intelligence
- Intermediate scrutiny
- Telecommunication channel
- Hit
- Electronic countermeasures
- Recovery time objectives
- Category-3
- Government
- Traditional data mining
- Personal digital assistant
- Access threat
- Service bureau
- Background performer
- Social Web of Things
- Yottabyte
- Continuation application
- RF energy
- Frame Rate
- Incident management
- Bolo
- Requirements baseline
- Legislation
- Automation
- Friend Request
- Export license
- Strategic assessment
- Fee
- Confirmation of information
- Content-neutral
- Operational cyberwar
- Google hacking
- Lyrics
- System of Systems
- Full-text search
- Special Master
- Petition for certiorari
- DS0
- Pro-competitive
- Generally Accepted Accounting Principles
- Logical access control
- Category-5
- Frequency instability
- Disclosure limitation method
- Internet surveillance
- Burglary
- Manual data
- Astronautics
- Direct recording electronic
- Code refactor
- Destruction
- Prominently disclosed
- Analytics
- Access for interstate long-distance services
- Return information
- Transport layer encryption
- Nonstructural mitigation
- Relay
- Sensor data
- Blackboard
- Pass phrase
- Telemonitoring
- Stack
- First sale exhaustion doctrine
- Drop
- High-confidence
- Smart toy
- Incidental damages
- Autonomous weapon system
- Fast flux
- Transformational outsourcing
- Technical countermeasure
- Networked Readiness Index
- Permanent license
- Information Dissemination Management
- Volatile data
- Cybercafe
- Cable service provider
- Cognitive IoT
- Ciphertext
- Probability
- Disassemble
- Time and materials
- Functionality doctrine
- Self-help
- Enhanced Messaging Service
- Conference call
- Information Awareness Officer
- Qualitative method
- Amortization
- Open-loop prepaid card
- Advanced key processor
- Menu
- Refreshment
- One-click shopping
- Governmental authority
- Virus
- Networking and Information Technology
- Pinterest
- Back Orifice
- Surveillance data
- Net revenues
- Freestanding GPS device
- Digest
- Cheat code
- Cryptographic key management
- Privacy preserving data publishing
- Pay-per-impression
- Feasibility
- Electronic Bill Presentation and Payment
- Downgraded cookie
- Ultramercial
- Email alias
- Geostationary satellite
- Latent data
- Apparatus claim
- Contingency
- Data representation
- Health care provider
- Radio Transmitter
- Platform as a Service
- Bleeding edge technology
- Scope creep
- Process claim
- Hot storage
- Fixed service
- Between merchants
- Asynchronous
- Sponsored
- Basic scientific research
- Contingent liability
- Computer-generated work
- Write-once, read-many
- Optical computer
- Preexisting material
- Cryptanalysis
- Terminal equipment
- Cyber governance
- Common Alerting Protocol
- Software-defined radio
- GeoMAPP Geoarchiving Business Planning Toolkit
- Pro forma
- SMiShing
- Blue Screen of Death
- Knowledge transfer
- Potential impact
- Backhaul network
- Call blocking
- Over-classification
- Motion Capture
- Virtual Currency Business Activity
- Compromised evidence
- Tax clause
- Offline
- AM/FM streaming
- Balance sheet
- .ao
- Patent license
- Account-based system
- Exploit tools
- Fixed Price plus Incentive Fee
- Protect
- Network access point
- Unclassified matter
- Common Information Model
- Passenger Name Record
- Feasibility study
- Valid audit trail
- Resource Management
- Constitution
- Walkie-Talkie
- End-to-end
- Forensic investigation
- Element
- Trade deficit
- Relational database management system
- Risk management-based intelligence
- User privacy
- Department of Defense intelligence production
- Transformative use
- Joint Information System
- Forward Error Correction
- Interstitial video clip
- Data link
- Puffery
- Presidential Directive
- Profile
- Application system
- System owner
- Gaming fraud
- Panoramic camera
- Global commons
- Investigative service provider
- Sexual act
- Biographic data
- Digital forensics
- Qualified products list
- Foreign exchange rate
- Test scenario
- IMD management
- Handshaking procedure
- Manipulation
- Payment processing
- Letter of understanding
- Supply chain vulnerabilities
- Piggybacking
- Public Land Survey System
- Stereo photographic coverage
- Helper application
- Computer-output-on-microfilm
- Economic data
- Keystream
- Georeferenced information objects
- Autocorrect
- Company or business identifiable information
- Industrial automation and control system
- Data system
- Radio signal
- Cyber ecosystem
- Audio conferencing
- Passenger screening
- File association
- Psychological warfare
- Automated license plate recognition end-user
- Granular
- Uniform Contract Format
- Broadcast transmission
- IP network
- Billboard
- Conclusion
- Real-time data
- Book
- Toner cartridge
- Authenticator
- Voice
- Silent commerce
- Siting
- Search and Rescue Processor
- Amazon.com
- Product activation
- Ad-supported
- Transit ISP
- Service delivery platform-as-a-Service
- Attribute authentication
- Form, fit, and function data
- Magnetic core memory
- Telephone
- Interstitial video ad
- Monitoring
- Undetectability
- Built-in security
- Privileged access
- Critical infrastructure
- Fixed length record
- Capstone Policies
- Soft bounce
- Abandonware
- Cardholder data environment
- Life cycle stages
- Short-range UAV
- Transportation
- Computers and the Law
- Common Channel Signaling network
- Audiotext
- Commission Implementing Decision of 12.11.2013 amending Commission Decision 2008/294/EC
- Cellular technology
- Archival microfilm
- Deception
- Configuration Control Board
- Quantitative
- Nibble
- Recipient
- Secondary status
- Portable electronic device
- Operating system (OS) fingerprinting
- 702 Target
- Strong authentication
- GoogleBot
- Health information technology
- Copyleft
- Global, surveillance, reconnaissance, and targeting system
- Financial analysis
- Intelligence gap
- Wetware
- Out-of-band authentication
- Latency
- Electronic security
- XDSL
- Prior use
- E-mail campaign
- Geophysical location tracking
- Computer security subsystem
- Geocoding
- Access type
- Industrial espionage
- Access attempt
- E-ombudsman
- EXPonential Growth
- Electronic network
- Pseudonym
- Lag
- Secure Storage
- Host-based intrusion prevention system
- Deleted file recovery
- Declaratory judgment
- Intelink
- Horizontal scanning
- MAC Address
- Abstract Communication Service Interface
- Certificate of Authenticity
- Purchase order
- Computer-aided design
- Merger
- Common Configuration Enumeration
- Backup procedure
- Obscured data
- Website publisher
- Pixels per inch
- Currency Transaction Report
- Facial recognition technology
- Fud
- Algol
- Perfective maintenance
- Shared IT Service
- Accent mark
- Inadmissible
- Environmental data
- FiOS
- Robot Combat
- Perturbation
- Vandalism
- Unevaluated raw intelligence
- Business process application level
- On-access scanning
- Appropriate local emergency authority
- Flat-panel display
- Fuzzy search
- Blocking
- Pirated copyright goods
- Secure coding
- Authorized person
- Computational Linguistics
- Defensive cyberspace operation response action
- All-source intelligence
- Security theater
- Hardware manufacturer
- Bellwether trial
- Automatic Train Control
- Hot-potato routing
- Impairment
- Procedural due process
- Byte tax
- Control algorithm
- Signal strength
- Computer media
- Multiple dependent claim
- Connected vehicle technologies
- Administrative metadata
- Directed-energy weapon
- Mandatory access control
- Electronic document management system
- Ad Hoc HIE
- Information extraction
- Privilege elevation
- Vice Versa
- Agile robotics
- Gross Domestic Product
- First person view
- Recreational hacking
- Undue experimentation
- Criminal justice information
- Precursor
- Picture Archiving and Communications System
- Access control technologies
- Oceanographic data
- Data item name
- Business interruption
- Online predator
- End-to-end principle
- Tactical Sensitive Compartmented Information Facility
- Redaction
- Channel coding
- Pay with data
- Internet Marketing
- .travel
- Signals intelligence
- Critical resource
- Single publication rule
- Human resource management
- Essential clinical performance
- Halftone
- Electronic security perimeter
- Aggregate information
- Risk timeframe
- Digital data
- Trusted computing base
- One-time password device token
- Unmanned ground vehicle
- Telephone number
- Tactical digital information link
- Risk-based pricing
- Physical vulnerabilities
- Fractional T1
- Biographical information
- Heuristic
- Patent attorney
- Up-to-date
- Vertical information
- Acquisition life cycle
- Software library
- E-discussion
- Document management
- Electronic Serial Number
- Automated system
- Distributed learning
- "Drive-by" ransomware
- Infrastructure Data Management
- Information system security
- Sponsored generic TLD
- Federal advisory committee
- File virus
- Flight sim
- Industrial commons
- Adolescent
- Automated information system
- Tragedy of the Commons
- Unclassified
- Videogame developer
- International standard H.320
- Bulletproof
- Character encoding system
- File Allocation Table
- Backlist
- Web Search
- Word length
- Open test
- Aeronautical mobile-satellite service
- Clear desk policy
- Independent economic value
- Off-the-shelf
- Root of Trust for Storage
- Compact cassette
- Copy control technology
- Material breach
- Digital health
- Abduction
- MitMo
- Fiber-to-the-home
- Part 15
- Scripting Language
- Barratry
- Geotagging
- Security Breach
- Insider
- Bilateral agreement
- Vor
- Radio transmission
- Communication channel
- Duplication
- Criminal intelligence information
- Jus ad bellum
- Mobile app
- Local exploit
- Performance measurement
- New media
- Chief technology officer
- WordPress
- Boot process
- DNS hijacking
- Semi-passive tag
- Advertiser
- Sampling
- Affective computing
- Electronic communication service
- Deepnet
- Presumption
- Absolute altitude
- Web Server
- Interactive media
- System security
- Routable
- Issue-specific policy
- Creditworthiness
- Integrated master plan
- False accept
- Objective expectation of privacy
- Communication deception
- Aerial photography
- Stateful inspection
- Binary-to-text encoding
- Agency Certification Authority
- Time Division Multiplexing
- Multiposting
- Geospatial data
- Comprehensive Facility Report
- Encrypted tunnel
- Data-capturing device
- Proactive network defense
- Elasticity
- Patent assignment
- Receivership
- Ultra-broadband
- Camera
- Spaghetti code
- Facility certification
- Viral email
- Consumer data
- Ferret
- Major vulnerability
- Integrator
- Multicasting
- Cloud distribution
- Kiosk
- Killer App
- Carbon nanotube
- Personal communications service
- Degradation
- Data protection impact assessment
- Multi-tenancy
- Preexisting subscription service
- Telephonic Dissemination
- Election management system
- Neuroinformatics
- Regression testing
- Geodetic data
- Plotter
- Electromagnetic signature
- Peer production
- PayPal
- Sorting
- Telework center
- Deep packet inspection
- Magnetometer
- License plate reader
- Merchant account
- Misc 34
- Smart device
- Defense Media Activity
- Data custodian
- Compressed file format
- The IT Law Wiki
- Network advertiser
- Identifiable
- Vendor lock-in
- Administrative privileges
- Conversion
- Telecommunications operator
- Integer overflow
- Strategic information warfare
- Encryption algorithm
- Data write
- Application controls
- Photographic copies exception
- Tying product
- Nonrecurring intelligence production requirement
- Dumb network
- Attack vector
- Cyber critical infrastructure protection
- Mission support information
- Perishable data
- Toponym
- Undecipherable
- Enterprise patch management tool
- Euro
- Mosaic effect
- Collectively produced web content
- Data actions
- Randomizer
- Complexity theory
- Accepted interference
- Degrade
- System security administrator
- Mail exploder
- Kill stealing
- Acoustic warfare
- Foreign national
- Crosstalk
- Service engine
- Question of fact
- Shovelware
- .hn
- Automated identification technology
- Work factor
- Integrity checking
- Image tagging
- Browser cache
- Improper usage
- Bytecode
- Hybrid topology
- Potential threat
- OEM
- Read Access
- Configuration manager
- Cryptoanalysis
- Quantum dot
- Fixed operating costs
- Production standard
- Print
- Standard data
- Anomaly detection
- Significant change
- DNS root zone
- Eavesdropper
- Healthcare Common Procedure Coding System
- DivX
- Responsive web design
- Operating time
- Telewriting
- Resource utilization
- Featured performer
- Import duty
- Technology Readiness Level
- Identity provider
- Performance Reference Model
- Radiodetermination-Satellite Service
- Signature capture
- Data transmission
- Real-time protocol
- Geographic information system data
- Private information
- Video sharing
- Intelligence fusion cell
- Penetration attack
- Outside threat
- Satellite
- Custodian
- Technology push
- Access control
- Proof of correctness
- Database as a Service
- Availability
- Predictability
- Access control roster
- Mechanical rights
- Selfie
- Cross-licensing
- Business area
- Memory corruption
- Integrated Energy and Communications System Architecture
- Website owner
- Tasking
- Network survivability
- Bare metal virtualization
- Facial challenge
- Targeted attack
- Bridge and network hub
- Customer insight data
- Digital curation
- Intercity
- IT outsourcing
- Biometric identifier record
- Pan-European
- Macro
- Evaluated data
- OpenDocument Format
- Bit-by-bit
- Statutory royalty
- Transmission path
- Classified visit
- WashFax
- Deceptive trade practices
- Single page aggregator
- Fast Ethernet
- Mobile data storage media
- Personal identification
- Quantization
- Cell on wheels
- Information Technology Procurement Plan
- Cyber mall
- Auditability
- Cyber incident management
- Halal internet
- Insecure
- Confidentiality-related threat
- Real dollar
- Command-line interpreter
- Alert memorandum
- Open Source Definition
- Mobile wireless telephony
- Overblock
- Biometric process
- Direct identifier
- Tacking
- Action lists
- Auto delete
- Document
- Expert testimony
- Shareware
- Symbol mark
- Windows Address Book
- Spyware file
- Direct digital marketing
- Key fob
- Secondary data
- Wireless network adaptor
- Identity credential
- Remote code execution
- International standard
- Counter-hacking
- Remote connect/disconnect
- Accreditation authority
- Single signals intelligence battlespace
- Retailer
- Mail merge
- Digital media file
- Intrusion prevention
- Cloud
- Child enticement
- Supervisory control and data acquisition system
- Packet forwarding
- Bulk email
- Key assets
- Background Check
- Social innovation
- Operational analysis
- Security categorization
- Image processing
- Cloudstorming
- Network segment
- Logistics
- Cost Plus Percentage of Cost
- Guestbook
- Airborne imagery
- Applicant
- Wireline
- Conclusion of law
- Entity
- Geospatial information objects
- Restricted Area
- Beauregard claim
- .jpg
- Foreign exchange transaction
- Cyber defense
- Adverse event
- Implant
- Information report
- Surveillance Camera
- Public health informatics
- Special records
- Private mobile radio
- High-definition television
- Identity history data
- Logarithm
- Privilege escalation
- Indefinite delivery/indefinite quantity contract
- Sister stations
- Mobile wireless provider
- Transponder
- Subcontract
- Analog compression
- Contributory infringement
- Forfeiture
- Classified removable electronic media
- Hand-Off
- Numerical control
- Gross Revenue
- Air traffic control
- Bird
- Server farm
- .eu
- Help desk
- Policy
- E-zine
- Crypto wars
- White Hat
- Packing slip
- ISO 9000
- Propagate
- Wide area network
- Point of Interaction
- Digital transfer rate
- Health insurance information
- Underbanked
- DSL service
- Disk-to-disk copy
- Loophole
- Telecommunications
- Commercial electronic message
- Personal identity verification card
- Consumerization
- Ultra-wideband
- IT virtualization
- Network segmentation
- Seal
- Botnet infiltration
- Biometric passport
- Exclusive
- Analog preservation
- Hardware compatibility
- Electronic eavesdropping
- Carriage return
- Muse
- D Block
- Production
- Contributory trademark infringement
- Pay-per-click
- Internal Web 2.0 technologies
- Resourcefulness
- Stock-keeping unit
- Proximity payment
- Georeferenced information
- Geodata
- DoD Information Enterprise
- Indications and warning
- Acceleration
- Back-up file
- Screen reader
- Bilateral
- Exabyte
- Bodily integrity
- Digital preservation infrastructure
- Domain name dispute
- Pseudo Automatic Number Identification
- Authored amendment contract
- Pretexter
- Navigation countermeasures
- Least privilege
- Waggle
- Computer evidence
- Think tank
- Database Definition Language
- Arbitrage
- Economic stimulus scam
- Packed numeric
- Automatic Identification System
- Incremental value
- Cyber threat intelligence
- Foreign author
- Identity-based security policy
- Degree
- Data science application
- Web TV
- Security label
- 2G
- Overt channel
- Signal recognition
- MPEG-2
- Control Center
- Inventive step
- Identity domain
- Asymmetric key
- Cybersecurity architecture
- Contingency procedure
- Range
- Transport protocol
- Positional
- Protocol
- Greenwich meridian
- Total Force Management
- Teaching away
- Obscurant
- Trusted digital repository
- Critical security parameter
- Junk fax
- Information explosion
- Heterogeneous network
- Existing data study
- Scoring products
- Image enhancement
- Authentication key
- Overlapping rights
- Order of Magnitude
- Back channel
- Sensitive but unclassified information
- Anonymized record
- Digital recording
- Object identifier
- Subjective expectation of privacy
- Process e-commerce
- Concurrent jurisdiction
- Prototype
- Perception management
- Clickjacking
- Information privacy
- Biometric capture device
- Broadband service
- Cyber Observable eXpression
- Combat camera
- Architecture trade-off analysis
- Conflict of Interest
- Storage capacity
- Phase coherence
- Device attack
- Operational technology
- Operations security assessment
- Telephone call accounting
- Cover-coding
- Up and running
- Pinball Machine
- Bill presentment
- Global content producer
- Erlang
- Registry operator
- Census data
- Participative web
- High-interaction honeypot
- Small Unmanned Aircraft
- Spherical zone of control
- Cycles per second
- Password sniffing
- Microcomputer software
- Kilobit per second
- Peering point
- Cyber infiltration
- Recovery controls
- Remote patient monitoring
- Application Programming Interface
- Outbound traffic
- Exit relay
- Publicly disseminated
- Signature block
- Video format
- Penetration testing
- Gross National Product
- Cryptocurrency Security Standard
- Third party data collector
- Octet
- Dragnet clause
- Fisher-Pry model
- Terabytes per second
- Pro hac vice
- Consumer product
- Comprehensive Large Array-data Stewardship System
- Correspondence Management System
- Apogee
- Crash avoidance technology
- Outsourcing agreement
- Web application proxy
- Charging Cradle
- Internet access provider
- Airspace
- Price fixing
- Risk executive
- Megabytes per second
- Diacritical mark
- Cyber information exchange
- Mining
- IMNSHO
- Program of record
- Cloning
- Automated communications management system
- Third-Party Standards
- News media
- Destroy
- Net assets
- Out-of-the-box solution
- Data code
- Subjective reputation system
- Closed-flow virtual currency
- Collect
- Intelligence amplification
- Venture Capitalist
- Amicus curiae
- Guarantee
- Latent fingerprint
- E-audio
- Satisfaction
- Information life cycle
- Express contract
- Gross National Income
- Commercial advertising messages
- Quiet enjoyment
- Field of use
- Beta Site
- Technology Infusion
- Intelligence requirement
- Office of the Comptroller of the Currency
- Formulary
- Chrome
- Cybersafety
- Global spatial data infrastructure
- Property damage
- Torrent
- Default password
- Georeference system
- Sensitive health information
- Clean
- System high security mode
- Cross domain solution
- Software engineering
- Recordkeeping system
- Computerized patient record
- Digital exhaust
- Estoppel by acquiescence
- Mixed system
- Financial management
- Under circumstances in which that individual has a reasonable expectation of privacy
- Delegation of authority
- Rule 11
- Whole genome sequencing
- Information requirements
- Anti-signal spoof
- Strategic imagery
- Drop account
- Technical surveillance
- Subsystem
- Intelink-C
- Blurring
- Liquidation
- Automatic Dialing Unit
- App vetting process
- Nanoscience
- Mobile application store
- Non-conforming Mailing List
- Patent pool
- Voter-verified paper audit trail
- Software defect
- E-prescribing
- Authorization key
- .nz
- Text command
- Haptic interface
- Certification authority
- Implicit
- Television antenna
- Computer science and engineering
- Network Address Translation
- Recoverable encryption
- Search-wizard feature
- Information interchange
- Future and Emerging Technologies
- Connected toy
- Creative Commons Attribution 2.5 Australia Licence
- Unicode
- Advanced telecommunications capability
- Egosurfer
- Culpability
- Backup plan
- Service Layer
- Primary transmission
- Data trail
- Core‐reference data
- Per quod
- Georeferencing
- Adequate disclosure
- Emergency coordination
- Non-transferable
- Records having permanent historical value
- Watch officer
- Mass-injection attack
- Detection by interception
- Electronic text message
- Linkbait
- Deadware
- Overbreadth doctrine
- Baseline architecture
- Self-regulation
- Continuing Education Unit
- Mobile operating system
- Vulnerability monitor
- Data limitation
- Call Detail Information
- Address space layout randomization
- Consent decree
- Photosensitive
- Deactivation
- Development, modernization, and enhancement
- Broadband Internet access
- Royalties
- Deviation
- Static block
- Counterintelligence aspects
- Defense critical infrastructure
- Trusted operating system
- In rem jurisdiction
- Cloud computing forensic science
- Untethered
- Active deception
- Physical access
- Solution architecture
- Tailoring
- Extract, Transform and Load
- Imitative communications deception
- Information encapsulation
- Critical design review
- Account document
- Customs union
- Disrupt
- Wireline broadband Internet access service
- Unbundled warranty
- Debt
- Reference information
- Lock and key protection
- Anti-signal fingerprint
- Actionable
- DTV receiver
- Fixed
- Money
- PC card
- Visher
- Tarnishment
- Joint Deployable Intelligence Support System
- Claim limitation
- Electromagnetic receiver
- Low-level language
- Certification authority workstation
- E-consultation
- Component Privacy Officer
- Circuit-switched network
- Anti-forensic techniques
- User privileges
- Monetization
- Cyber indicator
- Internet law
- Supplemental Register
- Vulnerability
- Spyware detection and removal utility
- Customer confusion
- Broadband Internet
- Double Jeopardy
- Multi-frequency network
- View data
- Assurance testing
- Drive-by download
- Clickable
- Browser hijacking
- Interactive technology
- Evaluation
- Indirect user
- Data source
- Computer network defense response actions
- Harmful interference
- Over‐collection
- Safeguarding Statement
- Predictive analytics
- Information system service
- Client-based filter
- Ping
- Nanomaterial
- Level
- Outsider threat
- Edge
- Distributed computing environment
- Explicit consent
- Whaling attack
- Topography
- Incriminating Evidence
- Image mining
- Gompertz model
- Patent owner
- Fortuitous conductor
- Controlled access program
- Virtual disk
- Autonomic computing system
- Law enforcement agency
- Computer-supported cooperative work
- Slap fingerprint
- Capacity testing
- Underserved area
- Security filter
- Digital Access and Cross-Connect System
- Independent software vendor
- Buffer memory
- Meme
- Video Relay Service
- Publisher
- Hydrographic data
- Information rights management
- End user license agreement
- Physical server
- Annotation
- User manual
- Personal Rapid Transit
- Limitation of claim
- Teaming agreement
- Cradle
- Electronic recordkeeping system
- EDI trading partner
- Data attribute
- Virtual criminality
- Countersurveillance
- Information leak
- Government publication
- Processor
- Freedom to connect
- Generic mark
- Witting
- Crime analysis
- Standard Deviation
- Computer matching
- Risk Assessment
- Direct mail
- Dat
- Channel service unit
- State Law
- Machine authentiction
- Vehicle-to-vehicle technologies
- Non-repudiation of origin
- Treason
- B2B
- Radio
- Trusted broker
- Information Technology Disaster Recovery Plan
- Biosphere
- Terahertz
- Joint Application Development
- Adult
- Nofollow
- Steady-state
- Mobile medical app manufacturer
- Risk assumption
- Biometric sample
- Counterfeiting
- Machine readable zone
- Identity proofing
- Durability
- Child luring
- Bank secrecy information
- E-advocacy
- Cost-risk analysis
- Cyberwarrior
- Competitive intelligence
- Partitioning
- Geospatial information technology
- Audience
- Operating revenue
- Service spoofing
- Scenes à faire
- Foreign filing date
- Discussion Forum
- Personal information
- Rights holder
- Data manipulation
- Web measurement and customization technologies
- Competitive procedures
- Decision Making
- Symmetric digital subscriber line
- Bind
- National Air Space
- Industrial process
- Syndicated programming
- Electronic music
- TTY
- Data extraction
- Administrative account
- Third-party software
- Digital infrastructure
- Voice over Wi-Fi
- Information environment
- Signal security
- Stored-value card
- Marking
- DVD+RW
- Visit duration
- Bait and Switch
- IA product
- Operability
- Emergency services
- Computational portability
- Echo
- Financial crime
- Television broadcast channel
- Family of Systems
- Internet connectivity
- Deconstructives
- SubSeven
- Gateway firewall
- Personal device
- Foreign Policy
- Pocket calculator
- Distributed Energy Storage System
- Injection flaw
- Statistically valid
- World memex
- Computer Labs
- Secure disposal
- Primary purpose
- E-Marketplace
- Computer display
- Pioneer patent
- Emerging markets
- Indemnity
- Expertise sharing
- Hacking
- Subscriber line charge
- Core competencies
- Mosaic theory
- Unwanted emission
- Accounting legend code
- Asynchronous communications
- FacE REcognition Technology program
- Correct
- Megabit
- Advanced Technology Attachment
- Cybernetworking
- Log-out
- Digital forensic workstation
- WYSIWYG
- Human Factors Engineering
- Cascading Style Sheet
- Address resolution protocol
- Integrity-protected data
- Advanced Mobile Phone System
- Grey hat
- Precision
- Statewide default answering point
- Defragmentation
- AdWords
- Remote site
- Patent assignee
- Synchrophasor
- Life-cycle mission data plan
- Decryptor
- Firecall password
- Repeater
- Dynamic analysis
- Data Validation
- Physical Evidence
- Anticipatory standards
- Lease with the option to purchase
- Advance pricing
- Dedicated security mode
- Coin-operated videogame
- Driver assistance
- Warfighter
- Capability
- Data management system
- Magnetic Ink Character Recognition
- Goods
- Female breast
- Game World
- Infrastructure services
- Similarity score
- Web measurement
- Electronic communications system
- Demodulation
- Administrative expense
- Tweeting
- Wireless Emergency Alert
- Process evaluation
- Law of the case
- Host OS
- Backend-as-a-Service
- Satellite telecommunications
- Network data
- Collaborative robotics
- Aeronautical chart
- Intruder
- Digital multimedia broadcasting
- White literature
- Extraction
- Phone book
- General Controls
- Code Division Multiple Access
- Procure
- Petition
- Keystroke dynamics
- Received version
- Accidental threat
- Web Trojan
- Offensive electronic warfare
- Administrative access
- Strategic Perspective Series
- Disaster preparedness
- Special needs doctrine
- Psychological media
- Nonexclusive licensee
- Graphics processing unit
- Technology Development phase
- Content Management System
- Clock signal
- Romance scam
- Data Quality
- State-of-the-art
- Genotype
- Initial Privacy Assessment
- America OnLine, Inc.
- Civil Liberties Impact Assessment
- Emanations analysis
- Homeland Security Enterprise
- Identity federation
- Advanced Audio Coding
- Language Translator
- Regional HIE
- Panopticon
- Role-based access control
- Conflict-of-interest escalation
- Trustworthy computing
- Compromising of confidential information
- Dramatic work
- Electromechanical
- Engineering Change Notice
- Advisory standards
- Mission-critical information system
- Joint venture
- Fixed wireless service
- Guest operating system
- Opinion
- Bank
- Litigation PAE
- Keyboard Shortcut
- Optical receiver
- Video motion detection
- Bullet-proof hosting
- Business intelligence
- Digital modular radio
- Audiovisual recording device
- Adjudication
- Initialize
- Office automation system
- Fixed voice and broadband service
- Agency Information Management Strategy
- Risk Identification
- Alternate method
- Electronic printing
- Computer forensics
- Settlement system
- Practice
- Passive tracking technology
- IMHO
- Car hacking
- B2G network
- Telebroadcast
- Archive file
- Web Browser
- Proprietary technology and economic information
- Behavior blocker
- Computer engineering
- High confidence level
- Adaptive neural network
- YouTube channel
- Cyber tasking order
- H1-B visa
- .af
- Dialing and signaling information
- National Security Emergency Preparedness Telecommunications Services
- Tethered technologies
- Mobile Telephone Switching Office
- Upload
- Subpoena ad testificandum
- Reception
- Jughead
- Data signal
- Transient failure
- Delegation of Procurement Authority
- Misuse
- Audio output
- Airborne alert defense suppression
- Anonymous web browsing
- Data correlation
- Mask work notice
- Privacy sensitive system
- False match
- Approved security function
- Unjust enrichment
- Other emergency communications service
- Mobile communications
- Hoteling
- Experimental data
- Critical infrastructure protection program
- Test
- Readiness testing
- Snooping tool
- Procedure
- Trustworthy system
- Economic loss doctrine
- Webcam
- Commercial electronic mail message
- Immersive technology
- Active knowledge system
- Non-infringement
- Burst length technology
- Preamble
- Embedded computing
- Spectrum allocation
- Contractor records
- Online harassment
- Data component
- Usage allowance
- Subscriber list information
- Stovepipe system
- Conduit
- Wristop
- Cloud service aggregation
- Secure Multipurpose Internet Mail Extensions
- Capacity planning
- Transportation demand management
- Mobile mapping
- Novation
- Whitelisting software
- Page Layout
- Moderate-impact system
- Flash crowd
- Directional microphone
- Asymmetric key pair
- Root of Trust for Integrity
- Vehicle-to-vehicle communication
- Evolutionary Program Strategies
- Connection approval
- Moscow
- Intelligence Sector
- Cavity infection
- Cultural intelligence
- BWL
- Tariff
- Alarm
- Content of Communication
- Readme file
- Polygraph
- Unsuccessful call attempt
- Collection emphasis
- Statement testing
- Grid computing
- Tuning
- Digital transition
- Disk-to-file copy
- Beaconry
- Location-based advertising
- Workflow
- Enterprise resource management
- Priority date
- Ready for patenting
- Disconnected, Intermittent and Low‐bandwidth
- Seismological data
- Official DoD information
- Trusted system
- Network card
- Machine cognition
- Constitutional
- Missing Middle
- Consent injunction
- Presence information
- Above the fold
- Mobile Banking
- Data communication equipment
- Cross-Domain Situational Awareness
- Automatic weapons defense system
- First mile
- Subscriber Identity Module
- EService
- Security Content Automation Protocol
- Mobile medical app
- Key escrow
- Security attribute
- Phablet
- Voice messaging system
- Effective scanning resolution
- Implicit georeferencing
- Library of Congress measurement
- Electronically transmitted
- Webmercial
- Programmable communicating thermostat
- Transitory documents
- Operational testing
- Brochureware
- Fusion
- Secure Telephone Unit
- Clean desktop principle
- Reversibility
- Virtual sensor
- Communications security monitoring
- Tablet computer
- E-mail system
- State secrets privilege
- Risk and Vulnerability Assessment
- Security flaw
- Waveform
- Automated system verification
- Physical resources
- Wearable technology
- Call transfer
- Front office
- Magnetic Card
- Trusted process
- Multipurpose Internet Mail Extension
- Mobile wireless
- Process control
- Cell ID
- Life Cycle
- Interaction
- Microelectronics
- Hybrid integrated circuit
- Network authorization
- Predictive analysis
- Block reward
- Qualified U.S. contractor
- Mouse
- Federal acquisition process
- Out-of-pocket expenses
- Digital hyperconnectivity
- External Modem
- Manual filing system
- Program file
- Biometric information
- Surveillance information
- Partitioned mode
- Application gateway
- Freedom of Action
- Posting
- Honeymonkey
- Crimeware code
- Field programmable gate array
- Veronica
- Trusted certificate
- System environment
- Flops
- Document and media exploitation
- Deleted file
- ADRP 2-0
- Wired device
- Universal Mobile Telecommunications System
- Contract law
- Behavioral privacy
- Internet appliance
- Geoarchive
- Regression
- IP log
- Private content
- Biometric template
- Information security assessor
- Cryptosystem
- Map
- Operation Firewall
- Fixed Price Incentive (Successive Targets)
- Rebound effect
- Likelihood
- Pantomime
- Security Concept of Operations
- Actual malice
- Deterioration
- Intelligence analyst
- Trustmark
- First-in first-out
- Shield
- Attribute data element
- Hybrid network
- Preexisting work
- Thing-to-thing
- Browser-based casual games
- Perigee
- Law Enforcement
- Homeland security advisor
- Resilience
- Volume baseline
- Mobile broadband
- Appellate jurisdiction
- Deceptive
- Internet Protocol
- Privacy-impact audit
- Master copy
- Downgrade
- Cellular service
- Mental steps doctrine
- Content generator
- Microtransaction
- Border security
- Cryptography
- Call
- Intelligence reach
- Returned check
- Delisting
- Tabular
- BitTorrent client
- Content API
- Adverse information
- Knowingly
- Outbound sharing
- Latent sample
- Inventor
- Patent application
- Incompatible
- Translator station
- Network warfare operations
- Computer resource management
- Black propaganda
- Homeland Security Stakeholder Community
- Malware propagation vector
- Smart machine
- Store and forward
- Compact Disc
- Subroutine
- System component
- Target audience
- Information cascade
- Gigabit
- Direct load control device
- Escrow
- Geographic Information Officer
- Ferroelectric RAM
- Add Grace Period
- Broadband connectivity
- Bounce
- Advanced television services
- Interchange format
- Directed verdict
- Wireless transmission
- Portable media player
- Work load
- Autonomous vehicle
- Buffer overflow attack
- Leeching
- Mirroring
- Runtime library
- Machine-generated
- Trusted Digital Repositories and Audit Checklist
- Non-commercial
- Parameter
- Reservation of rights
- Traffic data
- Serving cell site
- Connected car
- Multispectral image
- Configuration Item Change Request
- Linear topology
- E-mail program
- Ubiquity
- Infomercial
- Electronic transaction
- Special Access Program Facility
- Planned obsolescence
- Software maintainability
- Data Manager
- Transaction tax
- Secure Erase
- TV booster station
- Live-streaming video
- Aperture card
- Course of performance
- Sealed disk drive
- Ciphony
- USB connector
- Journalist
- Server push
- Entertainment law
- Encryption product
- External security testing
- Trend
- System security requirements
- Private peering
- Wireless device
- Carding forum
- Network readiness
- Carver
- Access
- HiperLAN
- Child molester
- Homeland security information
- Bartering
- Association
- PL/1
- Intrusion detection
- Common Data Element
- Act of God
- Network Control Protocol
- System life cycle
- ASCII character set
- Access path diagram
- Final research data
- Digital services
- Business process management
- Pan-European Game Information system
- Government contractor
- En banc
- Trier of fact
- Social Bookmarking
- BlackHole
- Post-selection
- Air surveillance radar
- Multithreading
- Read
- PCMIA
- Single log-on
- Local exchange service
- Authorization key identifier
- Bus topology
- Undue hardship
- Mission-critical computer resources
- Or transported
- Civil system
- Fiber-optic cable
- Carder
- Rapid elasticity
- Conventional encryption
- Platform IT
- Average revenue per user
- Mobile game
- Indicator
- State Compact Officer
- Stored program controlled
- Offshore insourcing
- Space surveillance
- Deployable Air Land Exploration Robot
- Health technology
- Social Contract
- Standby time
- On-board
- Connected vehicle research
- Scienter
- Time frame
- Cyber reconnaissance
- Security relevance
- Release
- Priority message
- Sensing and actuating device
- Strategic market research
- Mutuality of agreement
- NASA computer systems
- Age rating
- Backdoor trojan
- IPSec
- Regulation
- Application service provider
- Interconnectivity
- Security flow analysis
- Land information system
- Graph
- Verified data
- Tolerance
- Remote control software
- Cloud polling
- Automatic call distributor
- Most favored nation
- Public Safety Answering Point
- Vocoder
- System recovery
- Unintended Consequences
- Hand geometry recognition
- Preservation description information
- Back-pressure sensor
- XaaS
- Back order
- Computing environment
- Sexually explicit
- Bulk data
- Consolidated local telecommunication service
- Mobile data
- Drop-down menu
- Information Technology: Federal Information Systems Remain Highly Vulnerable to Fraudulent, Wasteful, Abusive, and Illegal Practices
- Content and Application Provider
- Permalock
- Online contract
- Biological data
- Purchase information
- Reinstall
- Heritage technology
- Tagging
- Security Threat and Risk Assessment
- Biometrics Enabling Capability
- Net domestic product
- Flat fingerprint
- Transit
- Procedural failure
- Digital object
- Performance Monitor
- Global Positioning System
- Service robot
- Multi-processing
- Application firewall
- Warning banner
- Loss of consortium
- Cyber electromagnetic activities
- Protection philosophy
- Favorite
- Core knowledge
- Mathematical expression
- Automated message handling system
- Response
- Memory
- Environment of operation
- Constitutional retaliation
- Trade secret holder
- Unicorn
- Doorway domain
- Database design
- Failure of others
- Control
- Geospatial
- Limited access
- First Customer Shipment
- Authenticated Encryption with Associated Data
- Residual data
- Electronic
- Marketing innovation
- CD recorder
- Global communications infrastructure
- Conditional statement
- External storage
- Incident records
- Advance shipping notice
- Deliverable
- Publicly available data
- Non-cyber PII incident (physical)
- Information practice statements
- Source IP address
- Capital planning and investment control process
- Contextual interoperability
- Affiliate
- Image Archive
- Discovery mode
- Incident response
- Strategic sourcing
- Remote-sensing satellite
- Authorized investigative agency
- Secure communications center
- Multiport repeater
- Shared symmetric key
- Steganalysis
- High level language
- Network congestion
- Virtual training device
- Fiber-to-the-building
- Contested cyber environment
- Information theory
- DNS server
- A priori
- Authentication period
- Random Number
- Special Information Operations
- Uneconomic bypass
- Time-Based Rate Program
- Internet Control Message Protocol
- Parallel processor
- SEIM
- .ph
- Deep link
- Economic loss
- Crash
- Collection management
- First-party tracking
- Continuity of operations plan
- Blank character
- Digital watermark
- Optical disc
- Antecedent
- Trap purchase
- Critical cyber system
- Garnishment
- RF subsystem
- Disaster management
- Data integrity
- Active Directory
- Friendly force information requirement
- Network cable
- Licensed software
- Outage management
- Forward channel
- Mobile operator
- Person having ordinary skill in the art
- Low confidence
- Fiber-to-the-premises
- Soft token
- Technical field
- Informational Flexible Deterrent Options
- Coordinate geometry
- Export control document
- Data element source
- Scanning line
- Electronic money
- Customer interface
- Service-oriented architecture
- Fault injection testing
- For The Loss
- Intelligence summary
- Schema-on-read
- Warez
- Common control
- Special notice
- Disaster Recovery-as-a-Service
- Permalink
- Blocking patent
- Vehicle-to-vehicle
- Systems testing
- Software wrapper
- Enhanced Driver's License
- Sensitivity assessment
- Digital Audio Broadcasting
- Advanced persistent threat
- Data theme
- Astro compass
- Location system
- Check truncation
- Software-of-unknown-pedigree
- Gamevertising
- Information system resilience
- Nonintrusive Defensive Countermeasures
- Deperimeterize
- Restraining Order
- Addressability
- Public Good
- Reproducibility
- Equitable defense
- Daubert method
- Crisis management test
- Blood pulse measurement
- Social access cyberattack
- Delta point
- Compare
- Security architect
- Exhibit 53
- Statement
- Segmented advertising
- Singulation
- Data structure
- Output
- Cross-site scripting vulnerability
- TEMPEST test
- Analysis and design phase
- Mobile platform
- Server software
- Enforcement Integrated Database
- Machinery of government
- Return Policy
- Government Information Exchange
- Infrastructure protection
- Contribution to collective work
- Privacy system
- Master recording
- Advertising injury
- SLT
- Caching
- OC-3
- Maturity
- Many-to-many
- Positional data
- Protected information
- Cable Television Relay Service
- Camera sensor
- Packet trace
- Anonymization
- Insolvent
- Control engineering
- Home network use
- Denigration
- Data-driven attack
- General support system
- Blackbox test
- Digital signature
- Substantive test
- Geophysical Data
- Open relay
- Biometric software
- Custodian of records
- Elicitation
- Optical scanner
- Scope
- Unclassified data
- Network security incident
- Hub
- Safeguarding
- Internet poster
- Very-large-scale integration
- File slack
- Continuity planning
- Lata
- NIST Special Publication 800-97
- Quantitative method
- DNS Root Server System Advisory Committee
- Root zone file
- Microwave radio relay
- Remote capture
- Blind link
- Internationalized domain name
- Cannibalization
- Dead
- Anti-virus tool
- Unique identifier
- Digital labor
- Enciphering
- AFC
- Circular intelligence
- Inertial Measurement Unit
- Adaptive threat
- Cyber Situational Awareness
- Data Mining
- Cyclical redundancy check
- Substantive due process
- Deleting
- Immediate message
- Item of Interest
- Innovation process
- Satellite remote sensing
- Civic media
- Monopoly
- Bring Your Own Cloud
- Storage medium
- Bankwire
- Contract of sale
- Scale
- Earned value management
- Clearance certification
- Satellite Master Antenna Television
- “Free rider” problem
- Prosecutor
- Typing pattern
- Smart card reader
- White Team
- Broadcast station
- ICT infrastructure
- Critical Infrastructure Warning Information Network
- Fanciful mark
- Trade transparency
- Software development
- Changeability
- Operational key
- Public Key Cryptography Standard
- Interactive voice response
- M2M device
- Attribute-Based Access Control
- Not invented here
- Gigabytes per second
- Cyber raid
- .info
- Status Quo
- Digital switchover
- Commoditization
- Animated GIF
- Broken Link
- BTW
- Boot block
- Artificial life
- Controlled mode
- CM Planning and Management
- Vision Statement
- Webcast
- Internet voting machine
- Fiduciary duty
- ASK
- Private sector
- Subdirectory
- Nano
- Exascale computing system
- Omission
- Password space
- Implement
- Terrorist threat
- Spectral occupancy
- Crowdfunding
- Assessment objective
- Department of Defense Intelligence Information System
- BES Cyber System
- Host-based security
- Pulse dialing
- Frequency-hopping spread spectrum
- Traffic sensitive cost
- Information-processing standard
- Directory service
- Global System for Mobile Communications
- Syndromic surveillance
- Physical security policy
- Publicity
- Greylist
- Delay
- Geographic information
- Inspector General
- E-mail attachment
- Security countermeasures
- Financial record
- Consequence assessment
- Radio waves
- Instruction-level parallelism
- Barrage jamming
- Cryptographic algorithm
- Trespass
- Cyberforensics
- System administrator
- Cryptanalytic
- Walk-in
- Geomagnetic
- Consumption tax
- Data-carrying device
- Shared resource
- Sunset
- RADIUS log
- Backsourcing
- Cyber Crime marketplace
- Non-commercial use
- Rules of Engagement
- Net control station
- Bid siphoning
- .bmp
- Stration
- Special character
- Conformity assessment
- Information-in-warfare
- C&P
- Data-at-rest
- Cyber vehicle
- Data passing
- Soundtrack
- Financial intelligence
- Registrant Name Change Agreement
- Global mobile personal communications by satellite
- AskCALEA
- Maple Story
- Asynchronous mirroring
- Bell Operating Company
- Cellular data service
- IA Certification and Accreditation
- Electromagnetic Field
- Stipulation
- Exclusive jurisdiction
- System architecture
- Systems analysis
- Benchmarking
- Geospatial metadata
- Cryptologic data
- Joint electromagnetic spectrum operations
- Voice biometrics
- Action
- Closed transmission path
- Low probability of intercept
- Print server
- Regional Playback Control
- In-house BPL
- Magnetic storage
- Integration of informatization and industrialization
- Space Bar
- Arbitrator
- Classless Inter-Domain Routing
- Website or online service directed to children
- Implied authority
- Remote penetration attack
- Common-user network
- Basic registration
- Electric meter
- Forensic image
- Rule of reason
- Low confidence level
- Interpret
- Cybersquatter
- Burst
- CM Program Library
- Trademark applicant
- Rolled fingerprint
- Access Control Decision Function
- Prepaid debit card
- Message externals
- Resident virus
- Cryptographic device
- Implementation plan
- Duplicate file
- Internal cloud
- Semiosis
- Extensible Messaging and Presence Protocol
- Distributed generator
- Bluejacking
- Check
- Make PII available
- Particularity
- Organizational security
- Stand-alone computer
- Gray literature
- Methodology
- Account management
- Wireless link
- Positive externality
- Implementation phase
- Controlled Access Program
- Challenge-response token
- Arson
- Analog-to-Digital
- In-band
- Responsibility
- Address book
- Headline connection speed
- Computer Resources Life Cycle Management Plan
- Soft biometric trait
- Redirector
- Image Recognition
- Information Security: Complete and Accurate Information Needed in Social Security's Automated Name and Number Files
- Like-gated promotion
- Griefing
- E-tourism
- CyberScope
- Communications-related services
- Management process
- Organizational data breach
- Platoon
- Prurient interest
- Imposter base rate
- Import
- Personal identification card
- Storage
- Video navigation device
- Text string
- Mobile agent
- Solid-state
- Joint Information Bureau
- National intelligence
- Medical spectrum-sharing device
- GPS augmentation
- Gameplay
- Intrastate commerce
- Superuser
- Unsubscribe
- Failover
- Autonomous system
- Full Authority Digital Engine Control
- Technology Infrastructure
- Shared service center
- Device
- Memory Leak
- System developer
- Hybrid encryption
- Activity security manager
- Driver
- ClassNet
- Grid coordinates
- International relations
- Project management
- Offer
- Request for Comment
- Dark-side hacker
- Electronic purse
- Acquisition Category
- Home-integrated technologies
- Unenforceable
- Removable electronic media
- Data Analysis
- Policy enforcement point
- Trackback
- Cloud application
- Information owner
- Asynchronous Communications Device Interface
- Medical information
- Interconnected system
- Administratively restricted information
- Open-ID
- Directed-energy warfare
- Second generation outsourcing
- Online contact information
- Compensating controls
- Windows Media Audio
- Practical utility
- Banner ad
- Plug-in hybrid electric vehicle
- Packet loss
- Identification rate
- Program records
- Internet literacy
- Operating system virtualization
- Scavenging
- Computer vision
- .tel
- Procure 2 Pay
- Lit fiber
- Tunneled password protocol
- Population
- Sexually explicit conduct
- Video output
- Authoritative source
- GameOver Zeus
- Autocasting
- Critical Infrastructure Risk Management Framework
- Single board computer
- Deterministic modification
- Network traffic
- Bang
- Order confirmation
- Hierarchical organization
- Call Data Channel
- Substantial nexus
- Security control effectiveness
- Instant Messaging
- False designation of origin
- Persistence
- Data disclosure
- Calibration
- A private area of the individual
- Event tree
- Direct Access Storage Device
- Credential Lifecycle Management
- .aw
- Visual authentication
- M-learning
- Knowledge spillover
- Disassembler
- Pseudonymized data
- Challenge question
- Cash accounting
- Business data
- Physically protected communications media
- E-book reader
- Unique data
- Single sign-on
- Disaster
- Time-dependent password
- Bit-for-bit copy
- Trusted baseline
- Information commons
- Assurance of domain parameter validity
- Watt
- Business identity theft
- Intelink-U
- Software Development Kit
- Still-image camera
- Press
- Regional Computer Security Officer
- Kill Switch
- Good practices
- TV broadcast
- Root of Trust for Reporting
- Data organization
- Defense critical electric infrastructure
- Rendering
- Typography
- Replication
- Independent development
- Secret test
- Googlebomb
- Social media
- Jargon
- Authorship statement
- Absolute novelty
- Navigation warfare
- Transaction block
- Latency-sensitive data
- Navigation
- Monitor
- Imputability
- Archival service
- Cadastre
- Inline frame
- Franchisee
- Information integrity
- National Association of Government Archives and Records Administrators
- Sanitize
- Advancement Degree of Difficulty
- Voice Call Continuity
- Illustrative evidence
- Security risk assessment
- Electronic letter bomb
- "Zero day" strategy
- E-mail generator
- OEM contract
- Fractional frequency deviation
- Material objects
- Chip card
- AI winter
- Building Automation System
- Typewriting
- Systems security engineer
- Preservation metadata
- Visual verification
- Information system life cycle
- Asset validation
- Call center
- Brain dump
- Inductive logic
- Operational countermeasure
- Architectural work
- Binary file
- Spear-phishing
- Non-line-of-sight signal propagation
- Preventative Measures
- Critical program information
- Online advertiser
- Smart token
- Data trend
- Comment
- Writable
- Pervasive attack
- Dial phone
- Sniff
- Redhibition
- Hosting
- Crosscutting segment
- Classification guide
- Last-in first-out
- The Energy Detective
- Session Initiation Protocol
- Lease term
- Automated Threat Analysis System
- Building management system
- DVD-ROM
- Meter Data Management System
- Passing off
- Adware
- Removable hard drive
- DSL
- OpenGIS
- Emanation security
- Password cracker
- Forensic computer expert
- Defensive Counter-cyber
- Anomalous activity
- Legal hold
- Geographically descriptive
- Senior enterprise management
- IEC 60601
- Drivers' license
- Intelligence preparation of the battlefield
- Mature system
- Hoax
- Reverse English auction
- Vertical cloud
- Surrogate Remotely Piloted Aircraft
- Sale of goods
- Economies of scale
- Protocol run
- Internet user
- Call-identifying information
- Exploitation
- Biometric sensor
- Automated engineering
- Duopoly
- Activism
- Approach
- Type II error
- Everything over IP
- Digital reputation
- Bin
- Biomedicine
- .ar
- Software versioning
- Debit entry
- DRM-free
- Legal deposit
- Presolicitation
- Cyber manipulation
- Communication technology
- Device fingerprint
- Cyber sovereignty
- Serial call forwarding
- Seizure disk
- Visit
- Mobile virtual network operator
- Vicinity card
- Dicta
- Netizen
- Integrity service
- Error-correcting code
- Herd
- Generally Accepted Privacy Principles
- Sniffer
- Computer numerically controlled machine
- Remote seller
- T-commerce
- Insertion order
- Peak load leveling
- Cyber-physical system
- Interstitial advertisement
- Cybersmearing
- Communications media
- World Wide Web Consortium
- Mode of operation
- Speech recognition
- Computer-psychological operations
- Dibit
- Personal memex
- Risk control
- ADP System Security Officer
- Manufacturing technology
- Transparency
- Risk-Adaptable Access Control
- Smart watch
- Quantitative analysis
- Force protection intelligence
- Federated identity management
- Customization
- Brigade
- Utilization
- Network effect
- Port replicator
- Intelligence Officer
- Internal name
- Privacy seal program
- Malicious prosecution
- Wiegand
- Arcade video game
- Collective understanding
- Anonymous technology
- EDTV
- Method claim
- Knowledge flow
- Master recording right
- Text processing
- Infrared sensor
- Telex
- Active security testing
- Energy management and control system
- Authentication controls
- Failure to state a claim upon which relief can be granted
- Intergovernmental organization
- In-house
- Risk treatment
- Online Store
- Digital resources
- Imitative electromagnetic deception
- Computer error
- Support IT services
- Software reuse
- Restricted data
- Data minimization
- Process dictionary
- Joint procurement
- MX Record
- Repossession
- Active data warehouse
- Passphrase
- Broadcast dissemination
- Network hub
- Network attack
- Tented arch
- Logistic support
- Market price
- Forensic Specialist
- Cryptocurrency
- Hashtag
- Communications profile
- Monopsony
- Denial
- Alter
- Mobile device security policy
- Nontraffic sensitive costs
- Resistance
- Machine-to-machine
- Default setting
- Segmented marketing
- RISC microprocessor
- Multidisciplinary counterintelligence
- Productivity
- Electro-optical-infrared countermeasure
- Folder encryption
- Mobile code technologies
- Privacy leakage
- Public procurement
- Criminal analysis
- Outbox
- Television
- Tortious interference with prospective business relationship
- Functional unit
- Non-facilities-based carrier
- .ae
- Nanotechnology, Biotechnology, Information Technology, Cognitive Science
- App security requirement
- Digital Subscriber Line Access Multiplexer
- Telecom hotel
- Interactive computing
- Botmaster
- Intelligence reports officer
- Interactive video data service
- Password protection
- Teletel
- Indirect effect
- Paid search results
- Contractual relationship
- Greenlight
- Multi-signature address
- IEEE P1363
- False reject
- Joint Capability Area
- Franchise tax
- Adversary collection methodology
- Malicious logic
- Back link
- Hybrid reputation system
- Interception subject
- Advergame
- Reality mining
- Easy access
- Biometric lock
- Man-made deliberate threat
- Analog video
- Information goods
- Accounting system
- Toll fraud
- Biometric data block
- Technical controls
- Watering hole attack
- Record linkage
- Script
- Boxing
- Software Defined Network
- Data signaling rate
- Bug fix
- ABA Digital Signature Guidelines
- Telco
- Increment
- Spectral efficiency
- Deposition
- Transaction cost
- Smart charger
- Security policy
- Requirements contract
- System integrity
- PERT chart
- Dead Reckoning
- Network time protocol
- Terrorist Screening Center
- Track 1
- Ethernet card
- Control network
- Network protocol
- Modem over IP
- Campus area network
- Earth station
- Article
- Strategic assets
- Intrastate
- Significant code
- Master Program
- Execute
- DNS lookup
- Machine-to-machine communication
- Deny
- Information box
- Derivative
- Logical preservation
- Access control mechanisms
- Critical Path
- Console videogame
- Frequency offset
- Video link
- Cooperative Engagement Capability
- Translucency
- Interjurisdictional intelligence system
- Digitized signature
- Exhibit
- Teleworker
- Decision superiority
- Kiosk internet voting
- Power of attorney
- Procurement technical evaluation
- Cost of goods
- Clear screen policy
- Section 15 declaration of incontestability
- Balance of harms
- Hostname lookup attack
- Field separator
- Mobile device management
- Authentication protocol
- Dynamic bandwidth allocation
- Implied covenant of good faith and fair dealing
- Cooperative user
- Film maker
- Physical privacy
- Consent judgment
- Approximation
- Regional network
- Individual Participation Principle
- Downlink
- Physical testing
- Bulk-power system
- Check clearing
- Claim of identity
- Checkout process
- Positive identification system
- Floppy disk
- Classified information
- Signaling
- High-integrity data link
- Recording medium
- End user
- Three-Dimensional
- Personal papers
- Biographical intelligence
- Mandatory declassification review
- Access eligibility determination
- MPEG
- 6LoWPAN
- Modification of information
- Disaster recovery plan
- Supply chain-related threat actor
- Critical Intelligence Communications System
- Multiple access rights terminal
- Interstate commerce
- Electronic Access Point
- Rules of Behavior
- Cyber incident response
- VHS
- Decrypt
- ISO 20000-7
- Writ of attachment
- Facilities-based provider
- Personally identifiable justice information
- Core attributes of digital assets
- System privilege auditing
- Transactional or relationship
- Remote backup service
- Remediation costs
- Static authentication
- Redundant
- DumpSec
- Meter Data Analysis System
- Flexible light electronic attack system
- Offensive Cyber Effects Operations
- Authority level
- Terminal identification
- Integrated Enterprise Portal
- Dynamic purchasing system
- Assured time
- User-generated content
- Daily intelligence summary
- Pay-by-phone system
- CPS domain
- Network resilience
- Power line carrier system
- Cyberinfrastructure
- Theft
- Web archive
- External information system service
- E-engagement
- Milestone
- Security best practices
- Privacy mode
- Personal name
- Cache poisoning
- Forensic copy
- Internet peering point
- Photoelectric light sensor
- Boolean expression
- Cryptanalytic function
- Distortion
- Cyberbully411
- Acoustic spectrum
- Intelligence product
- Isochronous
- Driver-vehicle interface
- Root domain
- Data breach notification
- Multilateration Location and Monitoring Service
- Star pagination
- USB device
- Part 90 Bands
- Module test
- Third-party provider
- INCOTERMS
- Cable Television
- Regional Internet Registry
- Link farm
- Watchtone
- Push technology
- Australian Government Locator Service
- Biometric device
- Secure product development practice
- Electroacoustic
- Text-messaging service provider
- DVD screener
- End-to-end bypass
- Von Neumann architecture
- Client-server architecture
- Legibility
- Contact hour
- Federal Telecommunications Service
- Medical Device
- Clean file
- Globalization
- Timeliness
- Secret key cryptography
- User
- Information technology infrastructure
- Digital Camera
- Hive computing
- CAPTCHA
- File layout
- Sound
- Infotainment
- Splinternet
- Submission
- Related data mining
- Single‐session measurement
- Government Smart Card
- Cyclic redundancy code
- Load balancing
- Child sexual exploitation
- Common law copyright
- External party
- Digital repository
- Information Superhighway
- Cross site request forgery
- Security audit
- Confidentiality function
- Obstructed Device
- Command Cyber Readiness Inspection
- Bokode
- Interoperable communications
- Tamper-resistant
- Distinguish
- List broker
- Cardano’s grille
- Justifiable reliance
- Application level general controls
- Assumption
- Experimental use defense
- Transistor
- General device
- Minimum treatment
- BackOrifice
- Single channel ground and airborne radio system
- Double opt-in
- Electronic signal
- Assured communications
- Call by location
- Open standard
- Biometric identifier
- Electrical meter
- Electromagnetic spectrum
- Header information
- Concealment
- Clipper Chip
- Intelink-S
- .xls
- Mass dataveillance
- Openness Principle
- QuickTime
- IA Product
- Sharing economy
- Password guessing attack
- Log clipping
- Teleoperation
- Infrastructure Data Warehouse
- Generic Interface Definition
- Want To Trade
- Public/private key establishment pair
- Military Intelligence Digest
- Data entry field
- Gigabit per second
- Tag Talks First
- Standard-essential patent
- Aggregate
- By means of the World Wide Web
- Geodesy
- Enterprise data management
- Technical transfusion
- Observe, Orient, Decide, and Act
- Encryption research
- Social Mobile Analytics Cloud
- Proximity card
- Jukebox
- Adaptive capacity
- Network service worm
- Accessibility of Rich Internet Applications
- Human-readable
- Privacy control
- Object and Event Detection and Response
- Contract award
- Needs assessment
- Geocoding precision
- Off-line attack
- Proprietary technology
- Real-time
- Unmanned Systems Integrated Roadmap FY2011-2036
- CD+G
- Login alias
- Arbitrability
- Plantar
- Direct current erasure
- Windows
- State management tool
- Eligible nonsubscription transmission
- Variety
- Card operating system
- Application layer firewall
- Java compiler
- Field Intelligence Report
- Third generation language
- Access service
- Data subject
- Enterprise network
- Fault tree
- Vehicle probe
- Authentication service
- Classification plan
- 911 emergency call system
- Privity of contract
- Offeror
- Boundary protection
- Master Address File
- Per incuriam
- Secure DNS
- Graphical object
- Boundary protection device
- Fifth generation language
- State agency
- SPECTRUM
- Record layout
- Refresh rate
- Technical leveling
- Criminal negligence
- Secure electronic commerce
- Electronic warfare coordinator
- Television broadcast
- Internal Market
- Network security
- Document imaging
- Supply chain management
- Risk factor
- Transit agreement
- .museum
- Physical Access Control System
- Electronically maintained
- False Advertising
- Knowledge-embedded goods
- Multichannel video programming distributor
- Handshake tones
- Digital Elevation Model
- Authoritative data source
- Brand advertising
- Terabit
- Mobile blogging
- Nanoplate
- Enterprise architecture products
- Preliminary examination
- Message replay attack
- 9-1-1 system
- Intelligence core competencies
- Micro browser
- Compatibility-limited requirement
- Information Technology Security Evaluation Criteria
- Decoy file
- Telephone banking
- Computer Reservation System
- Snoop
- MiniDisc
- Relying party
- Numerical
- Phases
- Worm and virus writer
- Efficiency
- Observational data
- Glassbox test
- Trademark assignment
- Telephone toll service
- Height
- Modified off-the-shelf software
- Video capture device
- Remote location
- Military Intelligence
- Equipment sabotage
- Character Generation
- .exe
- Discriminatory tax
- Mastertone
- Clean system
- Conflation
- IoTivity
- Extortion
- Edge network
- Automated information system securiy
- Information structuring
- Management and operating contract
- Gaming
- Confinement
- Dynamic Frequency Selection
- Fraud by concealment
- Archive
- Control objective
- Maritime
- Electronic jamming
- Local Multipoint Distribution Service
- Presidential Daily Brief Memoranda
- Computer Security Incident Response Team
- ICS-CERT Advisory
- Presentation application
- Widescreen
- Binding operational directive
- Filter failure
- Breach response policy
- Automatic data collection
- Nondelegable duties
- Firefox
- Network service
- Robustness
- Consortium
- Authored contract
- Public road
- Backup software
- Data collection tool
- Secure Shell
- Commodity IT
- Key logger
- Computer-mediated communication
- Identity governance
- Punctuation
- BitTorrent protocol
- Local
- Card Management System
- Parcel courier email scheme
- Storage object
- Unmoderated
- Roll-On Beyond Line of Sight Enhancement
- Crowdsourcing
- Intangible
- Security evaluation
- Biometric
- Intelligence production requirement
- Disclosure avoidance
- Supercomputing system
- File allocation unit
- Protocol suite
- Customer authentication
- Claimed signatory
- Key derivation function
- Authentication function
- Multi-user dungeon
- Demography
- Pertubation
- TABOO frequencies
- Cybersecurity
- Information Systems Security
- Controlled technical information
- National security position
- Clean data
- Product liability
- Combined Information Infrastructure
- DVD-RW
- Subsidy
- Application programmer
- Emergent Behavior
- Red Force biometric data
- CD Player
- Cost of goods sold
- Full service network
- Critical Peak Pricing
- Criminal information
- Ppmm
- Business continuity strategy
- Intelligence cycle
- Operations security process
- Access software provider
- Circumvent a technological measure
- Cure notice
- Interface testing
- System security plan
- Public Sector
- Internet of Medical Things
- Policy violation
- Project
- Add-on security
- Intelligence mission
- Technology adoption
- Off-site storage
- Direct deposit
- Obiter dicta
- Write access
- Degausser
- Genotyping data
- Regional Bell Operating Companies
- Application internal controls
- Vehicle-to-X connectivity
- Microfluidics
- Official certification
- BES Cyber System Information
- Platform neutral content
- Internal security controls
- Packet delay
- Business method
- Air Traffic Controller
- Physiological biometrics
- Pathname
- AdSense
- EDS Green Pages
- Wrap
- Client software
- Online publisher
- Hostile act
- Photo interpretation/Map interpolation
- Ad unit
- Internet Protocol Captioned Telephone Service
- Patent grant
- Coupon
- Hierarchical system
- Interactive health communication
- Audit report
- Data sink
- Third Agency Rule
- Universal Serial Bus token
- Possession
- Record length
- Present value
- Vertical blanking interval
- Security infraction
- Command injection
- State-sponsored
- Advanced Computing
- Public communications
- Online conference
- In-sourcing
- InterLATA
- Cybersecurity risk management
- Tor network
- Trickery
- FRCS-80
- Flat rate pricing
- Intelligence Community Brief
- Patient record
- Mobile giving
- Authentication information
- Error message
- Re-identify
- Patent breadth
- Income
- TEMPEST equipment
- Cloud access
- Networking device
- Global information management system
- Surveillance by design
- System integrator
- Public access to information
- Fail safe
- Zettabyte
- FTP client
- Security Administrator Tool for Analyzing Networks
- Spatial data infrastructure
- Decompression
- Computer-generated
- Upload speed
- Dingbat
- Planetary camera
- Credentials
- Appeal
- Architecture view
- Proclamation
- Abandoned call
- Paste
- Archie
- Default value
- Recession
- Scripting virus
- Digital permanence
- Multi-session technology
- Electronic filing
- Monopoly power
- Default
- Wireless neighborhood area network
- Hertz
- Internet forum
- Secure e-mail
- Computer fraud
- War Game
- Web injection
- Format
- Embedded device hacking
- Covert intelligence
- Active electronic protective measures
- Parity bit check
- Electronic data delivery system
- Legal estoppel
- Acoustic coupler
- Baseline
- Anti-jamming system
- Role-based security
- Call setup information
- Replication device
- Right-to-know
- Actionable knowledge
- Remand
- Internet radio
- Message header
- Content targeting
- Void ab initio
- First-mover incentive
- Ground alert electronic warfare
- Warrant canary
- Ephemeral copy
- Case working file
- Emulate
- Incentive contract
- For The Win
- Audit program
- Automated information security
- Adaptive learning
- Hyperlink
- Seed capital
- Semiconductor packaging
- Public diplomacy
- Production requirement
- Data integration
- Catastrophic degradation
- Substantial issue information
- Will
- Key pair owner
- Mirror site
- Infrastructure Survey Tool
- Data user
- Reverse passing off
- Key recovery agent
- DIAP
- Legacy information system
- Pedophilia
- Federal community cloud
- Emergency
- Administrative security
- Keyless Signature Infrastructure
- Supplementary registration
- Spagetti code
- Form factor
- Mainframe
- Probative value
- Audit reduction tools
- Law Enforcement Monitoring Facility
- Piloted
- Cryptographic chaining
- Clone phishing
- Reasonable Attorney's Fees
- Emissions security
- External cloud
- Discovery
- Control self-assessment
- Arbitration tribunal
- Communication service provider
- Nuclear intelligence
- Postcode
- Circuit peak load management
- Control link
- Blueprint
- Bivens claim
- Performance information
- True reject rate
- Obfuscate
- Agency procurement request
- Front End
- Private key cryptography
- Digital Video Transport System
- Online gambling services
- "Natural expansion" doctrine
- Collectively produced Web content
- Fully connected topology
- Cryptomaterial
- Land parcel data
- Block check character
- Friction ridge image
- Blended funding
- Government purpose
- Nanosecond
- Interstate service
- Token backup
- Commercially exploit
- Procedural security
- System-specific policy
- Homeland Security Infrastructure Program
- Rogue device
- Denial and deception
- Internal escalation
- Distribution management system
- Original jurisdiction
- Document management system
- Sua sponte
- Data proliferation
- Front-end processor
- Pitale v. Holestine
- Mailing List
- Intrusion vector
- Time stamp
- Boot
- Innocent purchaser
- Operations management
- Homeland Intelligence Report
- Deceptive jamming
- Future view
- Consumer reporting agency
- Risk escalation
- Skipjack
- Attack tree
- Interactive
- Computer service provider
- Bar code
- Access port
- Technical architecture
- Res
- Semiconductor chip product
- Sub nomine
- Purchase
- Automated guideway transit
- Mnemonic significance
- Thermal imaging
- Racketeering
- Digital work
- Privileged
- Burden of Proof
- Data consistency
- Stealth Mode
- Context accumulation
- NIST Special Publication 800-94
- Twitosphere
- Call forwarding
- Dialup users list
- Cybersecurity incident
- Virtual local area network
- Time-synchronized token
- Secure data handling
- Command processor
- Police information
- Electronic probing
- Page views per visit
- Couterterrorism Division
- Inline link
- Enclave
- Radio communication system
- Contrast ratio
- Concurrent processing
- NASA classified information
- Reverse showrooming
- Constrained network
- Certification
- Home area network
- Digital aerial data
- Multipurpose device
- Telecom
- E-intensity
- Commercial Mobile Alert System
- Procuring Contracting Officer
- Effectively protects a right of a copyright owner under this title
- Transitional phrase
- Machine readable data
- Distributed Energy Resources
- Mainline
- Criticality
- Passive measurement tool
- Psychological consequence
- Leashed cookie
- Subnetwork
- Acquisition organization
- Composite mark
- Numerical data
- Phasor Measurement Unit
- Spoken word recording
- Handoff
- Venture Capital
- Software package
- U.S. National Standards
- Option to purchase
- Phantom traffic
- Market value
- Consumer rights
- Business analyst
- Audio-visual
- Threat action
- Fixed wireless
- Wireless man-in-the-middle attack
- Comprehensive testing
- Application Protocol Data Unit
- Vendor‐neutral
- Mass-market software
- Mission-essential information system
- Macro-prudential risk
- Routing table
- Adequate security
- Simplex communication
- Point-of-sale skimming
- Software testing
- Acceptable Risk
- Media assets
- Enhanced data rates for GSM evolution
- Non-communications emitter
- Information source
- Favicon
- Section 333 exemptions
- Cyber collection
- Malware-as-a-Service
- Ownership
- Subject sensitivity level
- Lock Down
- Defensive patent aggregator
- Satellite terminal station
- Personal handyphone system
- National Essential Functions
- Intimate sensing
- Accretion
- Broadband Integrated Services Digital Network
- Test plan
- Telecommunications industry
- Copyrightable
- Obsolescence
- Edge router
- Border Gateway Protocol attack
- Component Data User
- Fiber-to-the-cabinet
- Blank disk
- Embedded metadata
- Ab initio
- Giga
- Pseudonymity
- Last-mile broadband access
- Input validation
- Renewal registration
- Contextual data
- Risk-based decision making
- Wrongful acquisition
- Home Gateway
- Video analytics
- Ransomware
- Objective
- Foreign Ownership, Control, or Influence
- Data pedigree
- Tamper
- Acoustical surveillance
- Management Control Agreement
- Creative Commons Attribution-NoDerivs license
- UUCP
- Transformative technology
- Hybrid virtual currency
- Bearer services
- Disintermediation
- Network operations
- Industrial, Scientific and Medical band
- Cognitive computing
- Synchronization right
- Public performance without commercial advantage
- Fair Electronic Exchange
- AMBER Alert
- Ground control station
- Critical infrastructure information system
- Submarine cable
- Trojan Horse
- Geography Markup Language
- Open Archives Initiative
- Cell site
- Authentication Tag
- Semi-active tag
- H.264
- Secure Hash Algorithm
- Reboot
- Linked text
- Smart label
- Due care
- Intentional cyber assault
- BEXT
- Link encryptor
- Sinclair, Klepper, and Cohen's Synthesis
- Progressive scan
- Software
- Integrated Justice Information System
- Linkback
- Ephemeral copy exception
- Soundex
- Information model
- Push/pull technology
- Network management log
- Copyrighted
- Meter communications network
- Analog-to-Digital converter
- Partial-uninstall feature
- Engineering Change Order
- Archival appraisal
- Employability
- Electronic check conversion
- Type I cryptography
- Visual line-of-sight
- Videogame publisher
- Mobile broadband service
- Governing Security Requisites
- Call barring
- Service Pack
- Natural person
- Managing Consent Directives
- Arbitrary mark
- Passive attack
- Audit risk
- Computerization
- Risk communication
- Unit cost
- Internet intermediaries
- Automotive crash recorder
- Affected employee
- Traitor
- Pass-the-hash attack
- Access control label
- Implicit consent
- Right-of-way
- Baseline security
- Global Information Grid Network Assurance
- Web presence
- External link
- Information management officer
- Infomediary
- Material fact
- Federal Acquisition Regulation
- Trojan.POSRAM
- Human capital
- Modernization
- Public computer center
- Decryption key
- Software management
- .gt
- Automation network
- Recovery Information Management System
- Electronics security
- Unsponsored generic TLD
- Carrier frequency
- Systolic array computer
- Raw structured data
- Bric
- Capital
- Identity Protection Personal Identification Number
- Intercarrier compensation
- Home Service Area
- Call Detail Report
- BAK
- Reliability
- Network device
- Non-match
- Enterprise
- Telecommunications device
- Television broadcasting
- Kindle
- Automated access control system
- Security design review
- Eye-in-hand system
- Intelligent system
- Card initialization
- Courseware
- Electronic time-stamp
- Hubbing
- Joint Polar Satellite System
- Trade diversion
- Information assurance vulnerability alert
- Test script
- Discretionary processing
- Microfiche
- Symmetric
- Connectivity
- Arbitration
- Secondary service area
- Government Smart Card Interoperability Specification
- Conference bridge
- Fully-integrated
- Break-even point
- De-identify
- Free/open source software
- Security artifact
- Operational imagery
- Biometric system
- Interactive Remote Access
- Common carrier
- Watermark
- Enabling services
- Diskette
- Persistent surveillance
- Vetting
- Larceny
- Bibliographic data
- Root Zone Maintainer
- Binding Contract
- Remote terminal unit
- Global Information Society
- Micron
- Battlespace spectrum management
- Criminal justice integration
- Cognizant Security Agency
- Public Trust position
- Access authority
- Fantasy baseball
- Hardware token
- Point of novelty
- Songwriter
- CP/M
- Cellular priority access service
- Exclusive licensee
- Consumer information
- Group Identifier
- Connected Office Automation System
- Animation
- Bankcard company
- Computing security methods
- Action button
- Unserved area
- Cyberharassment
- Seismic sensor
- Time and materials contract
- Home and Energy Management System
- Connection points
- Deemed Export
- Shut Down
- IT topology
- Risk sharing
- International Date Line
- Impersonate
- NTSC standard
- Power strip
- Classification guidance
- Infrared Scanner
- Superencryption
- Behavioral information security
- Network synchronization
- Computed Tomography
- Extranet
- Signal processing
- Terms of use
- Direct debit
- Responsible individual
- Expert system
- OS/2
- Biometrics enabled intelligence
- Data Over Cable Service Interface Specification
- Issuance
- Anti-terrorism
- Communications session
- Classification label
- Fixed device
- Video content
- Consumer-facing
- Player vs. Player
- Official name
- Flooder
- Value chain
- Virtual learning environment
- Encrypted
- Churn
- Type III(E) cryptography
- Infrastructure
- Credit bureau
- Digital forensics system
- Computer data
- Voice over frame relay
- Semiotics
- Text editor
- Wabbit Virus
- Penetration
- Attacker tools
- Environmental information
- Protocol exploitation
- PubSubHubbub
- Listening port
- Alert tone
- Bypass
- Anticipatory computing
- Enterprise social networking
- Writer
- Degaussing
- Commercial email
- Pre-installed software
- Aggregate customer information
- Assurance
- Supporting Information Assurance Infrastructure
- Front-end verification
- AM/FM webcaster
- Browser history
- Privacy settings
- Cost-per-sale
- IP Camera
- Optical signal
- User Requirements
- Electronic Access
- IT-related risk
- Scanner data
- Still image
- Geolocation technologies
- Deep Web
- Static content
- Arch
- Public peering
- Open eBook
- Machine sensing
- Computer security incident response capability
- Speakerphone
- Group registration
- Controlled access
- Fault-tolerant computer
- Server administrator
- Address element
- Petabyte
- Advertorial
- Alert center
- Tape drive
- Distance education course
- Fingerprint scanning
- Non-excludable
- Imagery management
- Health information system
- Acquittal
- Protected work
- Sole source
- Smart Car
- Optical scan voting system
- High-performance computing
- Security objective
- Low-earth orbiting satellite
- Information security assessment
- Data standardization
- Default classification
- Business Executive Scam
- Data center scientist
- IT manager
- Zero-day vulnerability
- Divert
- Sensitivity
- Inductive reasoning
- Categories
- Child Abuse
- Bug sweeping
- Wireless local number portability
- Augmented reality device
- Web beacon
- Website development
- System resources
- Bit loss
- Loss containment
- Black Swan
- Video Capture Card
- Data processor
- Interoperability
- Radio frequency/Electromagnetic pulse intelligence
- Compensating control
- Targeted system
- Scoping Guidance
- Voice message
- Cyber 9/11
- Metadata architecture
- Frequency deconfliction
- Point of sale
- Oral agreement
- Low power wide area network
- Portable terminal
- Necessary bandwidth
- Spillage
- Human Internet of Things
- Source document
- Telecast
- Invisible Internet Project
- Transaction information
- Proprietary software model
- Credit Card
- Authorized external entity
- Spectrum license
- Forward
- Percentage of timely service provisioning requests
- Mobile earth station
- Flat panel display
- Emergency notification
- Amazon Tax
- Full-duplex
- Export
- Peripheral component interface
- Initiator
- Duress
- Brick-and-mortar
- Physical device
- Department of Defense information network operations
- Healthcare identifier
- External user
- Common Short Code
- Pointer index
- Anonymous poster
- Nonidentifying personal information
- War dialer
- Equipment lease
- Direct-sequence spread spectrum
- Talk-time
- Versioning
- LZW
- Ground truthing
- Trade creation
- Super-communicator
- Exchange
- Foreign intelligence agency
- Antedate
- Medical identity theft
- Intelligence support element
- Non-overwriting virus
- Copycat
- Independent source doctrine
- Net-Ready Key Performance Parameter
- Cyber Issue Team
- Programming tool
- Network path
- Bill-and-keep arrangement
- Radiation
- Inherently distinctive
- Ubiquitous positioning
- Exclusive remedy
- Initialization vector
- Valley
- Weapons intelligence
- Input device
- Keyword
- Blink message
- Constraint
- Interchangeability
- Mobile ID device
- Clip
- Objectives
- Dram
- Resources
- Identification system
- Civic Information
- Remote access tool
- Innovation pipeline
- Data Quality Principle
- Roadmap
- Heuristic filter
- Social network service
- Save as
- Timestamp
- Intersymbol interference
- Closed-loop prepaid card
- Out-of-band
- Xvid
- Dedicated line
- Grooming
- Transportation Routing Analysis Geographic Information System
- Behavioral effect
- Controlled Access Protection
- Lyricist
- Telerobotics
- Multimodal Biometric System
- Knowledge discovery
- Anachronism
- Customer proprietary network information
- Unclassified but Sensitive Internet Protocol Router Network
- Link encryption
- Computer Virus
- Rule-based security policy
- Alarm surveillance
- Screensaver
- Fiber-optic lines
- Message authentication
- Government end-user
- Telework security policy
- Financial institution fraud
- Meaningful use
- Type I error
- Tied product
- Amortization schedule
- Adaptability
- Transportation security incident
- Inherent risk
- Computer-generated imagery
- Rapid prototyping
- Proprietary viewer
- Multi-user system
- Preventive Maintenance
- Adverse consequence
- Open Geodata Interoperability Specification
- Vacuuming
- Alive
- Advocacy advertising
- People powered aggregator
- Delayed send
- Data liquidity
- Writ
- Defense Information Infrastructure
- Atlas
- REC
- Risk profile
- Source-directed requirement
- Threat Assessment
- Fortran
- Integrity flaw
- Second source
- Service orchestration
- Verified name
- Open storage
- Solar radio burst
- Memory mismanagement
- Load time
- Abend
- Night Vision
- Floating-point operations
- Vulnerability scanning
- Identity medium
- Biometrics-enabled intelligence
- Connection fee
- Network access controller
- Multiple component
- Threshold
- Electromagnetic compatibility
- Privatizing
- Performance validation
- Electronic information
- Trust Factor
- Transaction e-commerce
- Sensitive PII
- Filtered ISP
- Information Sharing and Analysis Center
- Doe v. Friendfinder Network
- Branding
- Acquirer
- Relational database
- Satellite System
- Automatic dialing and recorded message player
- Dropped domain
- External Web 2.0 technologies
- Foreign commerce
- Patent term
- Access device
- Metered use
- Automatic license plate recognition
- Communications common carrier
- Digital terrain elevation data
- Negroponte flip
- Intersatellite link
- E-mail service provider
- Non-person entity
- Direct effect
- Authorization policy
- News server
- HAVEX
- Broadcasting Satellite Service
- Electromagnetism
- Core Identity Attributes
- Long haul transmission
- Valley of Death
- Failure control
- High Impact
- Insufficient disclosure
- Asynchronous attack
- Derived data
- Accredited standards development organization
- Pop behind advertisement
- Product claim
- Message authentication code
- Autonomous Intelligent Network and Systems
- Integrated circuit chip card
- Incident Response Team
- Difference Engine
- Chronometry
- Machinima
- Nonreciprocal preferential treatment
- Ping flood
- Breach notification
- Junk Mail
- Resource Public Key Infrastructure
- Electronics Manufacturing Services
- Smart building
- Peripheral node
- Pericomputer
- Reciprocal links
- Formal acceptance
- Certification Practice Statement
- Community cloud
- Access to Information
- Federal Public Key Infrastructure Architecture
- Civil War amendments
- Security Assertion Markup Language
- Closed captioning
- Fault management
- Browser window
- Memory chip
- Data record
- Jepson claim
- Indirect attack
- Google Suggest
- Data independence
- Effect
- Online payment service
- IP Address
- Latitude-longitude
- Filtering software
- Domain name slamming
- Open Archival Information System
- Instant messaging attack
- Musical work
- Electronic intelligence ocean reconnaissance satellite
- Quick reaction requirement
- Code
- Remote administration tools
- Cursor
- Lulz
- Emergency public information
- Infrastructure Security
- Critical employee
- Entitlement transparency
- Active attack
- Audioconference
- Store
- Governance
- Logical volume
- Broadcast digital radio
- Roshal Archive
- Virtualized system
- Best efforts clause
- Capacity management
- De Novo
- Gyroscope
- Outage Management System
- Structured walk-through test
- Fax Machine
- Middle relay
- Retaliation
- Enumerated powers
- Disaster Response
- 3-factor authentication
- Cybersex
- Traceability matrix
- Launch
- Technology maturity
- Trademark application
- Mechanisms
- Tender
- Cognitivism
- Echo reply
- Community
- Trust Zone
- NAD 1983
- Bootloader
- Continuity of government
- Point-and-click
- Hybrid fiber microwave
- Common Law of Trade Secrets
- SNGMSG
- Consumer health informatics
- Agency records
- Physical piggybacking
- Picture processing unit
- Cloud service provider
- Writ of Execution
- Soft Power
- Configuration Management Plan
- Dynamic Host Configuration Protocol
- Aerospace
- Consumer
- Named area of interest
- Management information system
- Real-time transport control protocol
- Real Time Gross Settlement system
- Vulnerability scanner
- Data distillation
- Probable
- Barrier
- American Radio Relay League
- Trust Framework
- Multi-purpose prepaid card
- Long-term assessment
- Broadcast television
- Master Data
- Consisting of
- .an
- Wireless Internet
- Duplicate copy
- Base standard
- Copyright Office History Documents
- GNU Free Documentation License
- Single stream aggregator
- Interrogatories
- Insufficient authentication/authorization
- Qualified privilege
- Operations security indicator
- Electronic publication
- U.S. v. Thomas
- Apparent authority
- Internet retailer
- Spectroscopic intelligence
- Mere conduit
- Virtual reality
- Software Assurance
- Untargeted attack
- Critical national assets
- Metadata registry
- Rival goods
- Easter Egg
- Ad hoc network
- CPM
- Genomics
- Data element abbreviation
- Cat-5e
- Word
- Cost/performance ratio
- Pingback
- PDF
- Fixity checking
- Aiding and Abetting
- Asynchronous data replication
- Covered contractor information system
- Information processor
- Definite-quantity contract
- Digital battlefield
- Graymail
- Enterprise mobility
- Electronic warfare operational support
- Telecommunications service
- Convergent media
- Community building
- Compulsory license
- Kilogram
- Host
- Restoration
- Cybersecurity plan
- Command-and-control channel
- Commercial database
- Modus operand
- Data inconsistency
- Coordinated Universal Time
- Computable contract
- Classification markings
- FTP server
- CUI Framework Standards Registry
- Voice traffic
- Democracy
- Headset
- Virtual sit-in
- Hot list
- Invitation for bid
- Substantial noninfringing use
- Analyzer server
- Cut
- Risk evaluation
- Disparity
- Cloud platform
- Dynamic data
- Incident Object Description Exchange Format
- Ad exchange
- EPUB
- Sensitivity level
- Digital data forensics
- Oligopoly
- Physical compromise
- Outage
- Perpetual license
- Tactical communications system
- New matter
- Renewal application
- Business process application
- Voidable
- Referring URL
- Escalation procedure
- Federal Laboratory Consortium for Technology Transfer
- Web node
- Accounting
- Role-playing game
- Virtual currency system
- Player
- Digital storage
- Multi-homed
- Clinical information system
- Chart
- Line of business
- Pull technology
- Operational security policy
- External Identity Provider
- Privacy management
- Authentication token
- Curation
- Machine-independent
- Identity claim
- Disaster recovery
- Stickiness
- Disk read/write head
- Behavioral data
- MiniDuke
- Owned
- Risk-informed decisionmaking
- Binary file virus
- C++
- Indirect identifier
- Online collection
- Physical security
- Signature-based sensor
- Module
- Numerosity
- Debit
- Extensible HyperText Markup Language
- Access privileges
- Robocall
- Back Slash
- Data Retrieval
- Geospatial preparedness
- Rescission
- Biometric identifier information
- Discrete speech recognition system
- Trust anchor
- Business process re-engineering
- Root hints file
- Electronic prescribing
- Threat data
- Et seq.
- Optionally piloted aircraft
- Post cut-through dialed digits
- Network infrastructure
- Conceptual object
- Trusted computer system
- Intelink-P
- Bill of materials
- Mash-Up
- Watering-hole technique
- Electronic Codebook
- Medical telemetry equipment
- Linux
- Multispectral imagery
- Intangible asset
- Identity
- Addressee
- Messaging standards
- Inter-cloud service broker
- Foreign relations
- Hyperspectral imaging
- United Nations Rules for Electronic Data Interchange for Administration, Commerce, and Transport
- Cybersecurity Compliance Validations
- Quarantine
- PBX
- Confidence
- 2D image
- Wireless telecommunications carrier
- Work of visual art
- Target information center
- BIOS
- Execution information
- Jewel case
- Emoji
- Webisode
- Alternate facility
- Interior firewall
- Discount Rate
- Forecasting
- Nordhaus’s synthesis
- Iterative software development
- MP3 tone
- Input/output
- Internet Group Management Protocol
- Metric
- Broadband channel
- Elliptic curve cryptography
- Inconspicuous
- Digital system
- Computer architecture
- .mpg
- Grandfather Clause
- Data verification
- Constructives
- Remote Access
- Spatiotemporal data
- Redirected website
- Non-disclosure
- Data creep
- Online database
- Forward collision warning system
- E-payment
- Public technology
- Abuse team
- Non-nuclear EMP
- Subject
- Technical surveillance countermeasures
- Consumer confusion
- Integrated data management
- Over-the-top
- Georeferenced image
- Music
- Generally Accepted Auditing Standards
- Depreciation
- Downstream speed
- Software reliability
- Alphabet
- Special Effects
- Audit plan
- Personally identifiable financial information
- Preservation Order
- Recording equipment
- Collaborative computing
- DoD imagery
- Front load
- Identifier broadcasting
- Voice recording
- Electronic surveillance
- Hardware
- Deny by default
- Drive-by malware
- Fractional bandwidth
- Integrated Digital Environment
- Shopping cart abandonment
- Works of authorship
- Cryptanalytic item
- Electronic communications service
- Link rot
- Distributed Data Framework
- Risk reduction
- Reverse confusion
- Computer-based training
- Techspeak
- Inward-looking sensor
- Composition of matter
- Personal Health record
- Guarded frequencies
- Research Projects/Papers
- Widely distributed media
- Point-to-point
- Cyberculture
- Blanket purchase agreement
- Data-Center-as-a-Service
- Mutual Legal Assistance Treaty
- Electronic dissemination
- Value-added
- Maintenance hook
- Multi-label secure system
- Areal density
- Rule
- Non-volatile data
- Capability Maturity Model Integration
- Covert surveillance
- Mean Time to Failure
- Mental Anguish
- Archival data
- Hidden node
- Data linkage
- Protocol transparency
- Unsecured PHR identifiable information
- Data collection instrument
- OFDM modulation
- Multichannel Multipoint Distribution Service
- Anonymous person
- IP masking
- Anonymous communications system
- Counterfeit trademark goods
- RFID reader
- Upfitter
- Long-term
- Stylized mark
- Independent contractor
- Usenet
- Commercial online service
- Cyber security technical infrastructure
- Offensive countermeasures
- Collecting bank
- Communications protocol
- Quick Response code
- Forum trolling
- Data pass transaction
- Context-aware computing
- Intelligence project
- Telework day
- Technology obsolescence risk
- Failure to enroll rate
- Aspect Ratio
- Certificate Revocation List
- Access control token
- Injector
- Infection
- Peak load
- Terrorism information
- Encrypted virus
- End-to-end processing
- Know-how
- Design review
- Digital asset
- Ethernet device
- Seller
- Application platform as a service
- Risk-based management
- Aggregation
- Authentication, authorization and accounting
- Active consent
- Automatic download software
- Digital geographic information
- Contingency and disaster recovery planning
- Administrative analysis
- Nickname
- License exception
- GATT registration
- Dynamic attack surface
- Trawling
- Vision
- Satellite Communications
- Cryptoprocessor
- System acquisition
- Finger demon
- Machine vision
- Virtualization software
- Cloud migration
- Radio channel
- Secure token
- Grid security emergency
- Password generator
- Still photography
- Rogue access point
- Address data format
- Senior procurement executive
- Covered product
- National policy
- Remote Viewing
- Check box
- Assumpsit
- Code room
- Stovepipe warning
- Receiver Operating Characteristics
- Strategic warning
- Graphics file
- Repurpose
- Cyber effect
- Origination
- Reuse
- Forward English auction
- Bar code printer
- Information Resources
- Illicit transshipment
- Cellular Market Area
- Integrated network
- Senior Executive Memoranda
- .mil
- Spatial data management
- Teleconsultation system
- E-literacy
- Undercover investigation
- Fusion center
- Keyword search term
- Session locking
- Likelihood of dilution
- Malicious reconnaissance
- Cloud communication
- Michelangelo virus
- Arithmetic operator
- Sustainability
- Reasonable
- Hard token
- Medical screening system
- Instruction set
- Predatory pricing
- Narrowband
- Environmental threat
- Policy Enforcement Point
- .gr
- Trap and trace device
- Examination
- Keypunch
- Department of Defense Intelligence Components
- System outage
- Logic Bomb
- Regional standard
- Meta cloud
- Kilowatt
- Anaglyph
- Major Automated Information System
- Network architecture
- Commodity Jurisdiction
- Risk monitoring
- Leapfrog attack
- User identifier
- MPEG-1
- Emotional distress
- USB memory stick
- On-demand commerce
- Materiality
- Bad-faith intent to profit
- Bankcard
- Software monitor
- Category
- Cryptochannel
- Competitiveness
- Obvious to try
- Fixed assets
- Chip and PIN
- Partnership intermediary
- Cmyk
- Privacy Incident Response Team
- Cradle-to-grave approach
- Lex lata
- Preventive mechanism
- Vehicle telematics
- Serious game
- Security container
- Soft law
- Digital citizenship
- Dynamic content
- Cheating
- Protected Cyber Asset
- Banner view
- Special category
- Rule of Law
- Landing page
- Ambiguity
- Corrective advertising
- Business disparagement
- Advanced meter reading
- Atmospheric drag
- Telemarketing
- Tag
- Hazard mitigation
- Gesture
- Computer program
- Scroll
- Ultrafiche
- Data intelligibility
- Standards development organization
- Risk analysis
- Distant signal
- Auto-manual system
- Voicemail
- Warning intelligence
- Break
- Cartography
- Distributed generation
- Direct bank
- Hacker tool
- Incomplete parameter checking
- Automated security monitoring
- Joint work
- Bit stream back-up
- Patent monetization entity
- Writ of certiorari
- Attack path
- Consumer device
- Paid inclusion
- Card-present
- Picocell
- Micro
- Criminal Justice Agency User Agreement
- Wireless Application Protocol
- Program policy
- Personal Firewall
- Electronic masking
- Estimated source lines of code
- Customer facing
- Cash register
- Automatic data link
- Waveguide
- Egroup
- Satellite navigation system
- User code
- Capital planning and investment control
- Web integrity filter
- Commercial
- Prima facie
- Presentation Layer
- Trademark assignor
- Web 3.0
- Business-Process-as-a-Service
- Pre-selection
- Acquisition strategy
- Binary compatible
- Free-to-view broadcasting
- Multilevel mode
- Switched point-to-point
- PowerPoint
- Track 2
- Pedestrian dead reckoning
- Freelance
- Web syndication
- Impact
- Network outage
- Buzzword
- Directly identifying variables
- Medical data
- Need-to-know
- Packet filtering
- Counter
- Data acquisition
- Memory Stick
- Unauthorized
- Audiovisual clip
- Issue of fact
- Automated highway system
- Wireless Priority Service
- Suitable for minors
- Signature recognition
- Online public record
- Electronic seal
- Affiliate program
- Thought process
- Cyberphysical system
- Last Tactical Mile
- Goes down
- Automatic
- National security intrusion
- Hosted virtualization
- Best Practices
- Operational record
- Linked Data
- Jury Trial
- Significant cyber incident
- Private sector council
- Developmental testing
- CT0
- Remote-sensing imagery records
- Attacker toolkit
- Account-to-Account Payment
- Bulletproof hosting
- Pseudorandom
- Geoengineering
- Identity Ecosystem
- Arbitration agreement
- Inventorship
- Network switch
- Standards audit
- Baselining
- FOIA request
- Automated Train Information Display System
- Provisioned IT service
- Cyberdeterrence
- Cybersecurity policy
- Password stealer
- Privacy compromise
- Internet kill switch
- Public policy
- Cloud subscriber
- Computer resources
- Situational information
- IOS
- Exponential technologies
- RADARSAT
- Medical Imaging
- Expeditionary intelligence
- Cloud service derived data
- Digital representation
- Anonymous email
- Requirements analysis
- Ratification
- Multimedia player
- Content exfiltration
- National Security/Emergency Preparedness Communications
- Patient-centric
- Residual value
- Dictionary attack
- Data circuit
- Do Not Target
- External escalation
- Critical infrastructure owner and operator
- Et al.
- Intelligence integration
- Thumb Drive
- Due diligence
- Individual accountability
- Test tool
- Technology architecture
- Home satellite dish
- COBIT
- Web accessibility
- Electronic credentialing
- Chief Privacy Officer
- Federal mandatory standard
- Suppression
- 3Vs
- Microcontroller
- Colocate
- Information classification
- Virtual property
- Soft deletion
- Line of code
- Compromise of integrity
- GBAORD
- Intellectual asset
- Extremely high frequency
- Personal digital collection
- Causation
- Epoch
- Purchasing power parity
- Creator
- Wide-area situational awareness
- Lifecycle Management
- Provider of physical transport
- Facility accreditation
- Judgment debtor
- Match-on-card technology
- Transnational crime
- User Error
- Information retrieval
- Data path
- Energy services interface
- Replevin
- Electronic postmark
- Motion to suppress evidence
- Data lineage
- Jaz drive
- Recorded information
- Proprietary Information
- Burn-in
- Remote Archives Capture
- Internet key exchange
- Risk-informed decision making
- Administrator rights
- Intelligence-based warfare
- Fetch protection
- Graphics tablet
- Electronic camouflage
- Acceptance test plan
- Exclusive dealing
- Collecting society
- Composer
- Continuous monitoring program
- E-commerce site
- Resolver exploit
- Flash Mob
- Credit freeze
- National intelligence cell
- Service bypass
- Negative identification system
- Intentional
- Human area network
- Harm
- Alternate format
- Monoculture
- Scheduling software
- Netsky
- Game controller
- False imprisonment
- Utility computing
- Impact level
- Anonymous remailer
- Cyber threat actor
- Cam
- Broadband infrastructure
- Vertical integration
- Micro-electro-mechanical system
- Emerging literature
- E-mail list
- Rickroll
- Technology
- Product acceptance test
- Computer System
- Clagger
- Silicon Valley
- Misattribution
- Shill bidding
- Low power TV station
- Key management framework
- Security recovery
- Financial information
- Reader Talks First
- Insurance Risk
- Normalization
- Collection operations management
- Domain hijacking
- Wireless-enabled device
- Routine updates and patches
- Desktop publishing
- Wireless local loop
- Industry to Grid
- Security program
- Log off
- Broadband data system
- Telecommunications Industry Ombudsman
- Internet Telephony
- National Terrorism Brief
- Unlimited rights
- Aerial photograph
- Dynamic allocation
- Optical integrated circuit
- Plausible deniability
- Accept a certificate
- Intentional infliction of emotional distress
- Incident of security concern
- Gigahertz
- Pen register
- MultiProtocol Label Switching
- Multi-tasking
- Encryptor
- Severity
- Molecular electronics
- WiVi
- Telephone bill payment
- Adventure
- Card slot
- ZIP+4 code
- Plug and play
- Assured availability
- Discrimination
- Back-up site
- Invent around
- Video file
- .ai
- Network Centric Warfare
- Product innovation
- Type III cryptography
- Electronic neutralization
- Recording Device
- Freeze
- Defensive measure
- Anti-spyware
- Operand
- Primary data element
- Cyber threat information
- Disconnection
- IRC Network
- Service profile information
- Normative reference
- Computing architecture
- Continuous crawl
- Acquisition Program Baseline
- Algorithmic transparency
- Synchronization protocol
- Independent source exception
- Communications security
- File transfer
- Market surveillance
- E-mail distribution list
- Geographic coordinates
- Digitalization
- E-mail server
- Crossposting
- Distributed shared memory
- Critical data point
- Nordic countries
- Application program interface
- Business continuity
- Laser
- Shared driving
- Originator Controlled
- Author
- Born digital
- Security penetration testing
- Balance of equities
- Intrusion detector
- Sequential access
- Integrated Digital Enhanced Network
- Federal information system
- Gamma Testing
- Call content
- Want To Sell
- Data commons
- Trusted distribution
- Integrity-protected environment
- Mobile ad hoc network
- Cognitive domain
- Accreditation
- Protected as restricted data
- Clarification
- Reimbursement
- Cell
- Directory
- Sonet
- Priest-penitent privilege
- Address resolution
- Federated search
- Open to public inspection
- Category Killer
- Embedded device
- Volatile media
- Marketing buzz
- Direct broadcast satellite
- Fiscal year
- Active sensor
- Hard Copy
- 24/7/365
- Secret seed
- Application streaming
- Personnel security
- BAU
- Cyber activism
- Opt-in
- Temporary data
- Information ratio
- Registered Mail
- Racketeer
- Information security laws
- Wargaming
- About box
- Buried code
- Handover
- Automated guideway vehicle
- Musical Instrument Digital Interface
- Sensitivity attributes
- Permanent storage
- Millimeter
- HTTP
- Character
- Electronic recordkeeping
- Encapsulate
- Security log
- Mobile Identification Number
- Random Access Memory
- Re-keying
- Quality Assurance Surveillance Plan
- Collusion
- Espionage
- Health information exchange
- Spamdexing
- Strategic
- Electric transportation
- Space control
- Vehicle interface unit
- Position categorization
- Information on demand
- Static page
- Revenue
- Binary Large Object
- Remnant
- Search engine spam
- Sensor message
- Creative Commons Attribution license
- Software token
- Reversible
- Curtilege
- Chief Enterprise Architect
- Visual depiction
- Security change management
- Human knowledge
- Charter
- Patent troll
- Last mile
- Collection source evaluation
- Zebibyte
- Shared service
- Frequency hopping
- Passive network
- Fold
- Case file
- Automatic hyphenation
- Acquisition policy
- Airborne sensor
- Fraudware
- Conspiracy
- Moving image
- File protection
- Biometric Intelligence Resource
- Instrumental input
- Failure of consideration
- Local number portability
- Memory-scraping attack
- Acceptable quality level
- Digital Imaging and Communications in Medicine
- Subject security level
- Authorized vendor
- Modernized Integrated Database
- Vehicle to Grid
- Entertainment
- Sandbox
- Legislator
- 10BASE–T
- Output device
- Common Gateway Interface
- Online
- Standard form contract
- Vault
- Corroborating evidence
- Encryption software
- Parallel Processing
- Apache
- Vehicle-integrated technology
- Blind traffic
- Online reputation
- Performer
- Leased line
- Attribute certificate
- Content-control software
- Mobile radio
- Cost plus
- Trademark registration symbol
- Framework
- Arrest warrant
- DNS forwarder
- Stand Alone
- Basic cable service
- Hard infrastructure
- Bit string
- Contract administration
- Source routing
- Non attributable internet access
- Videocassette
- Domain Name System black list
- Computer operator
- Community risk
- Compromised
- Control Unit
- Supplemental jurisdiction
- Red Book
- Biometric database
- Zero-knowledge cryptography
- Assignment in gross
- Adaptive radio
- Digital text
- Cyber participant
- Competitive Local Exchange Carrier
- Strategic planning
- Moderated newsgroup
- Capital lease
- Gamification
- Pro Se
- Universal Declaration of Human Rights
- Computer-aided manufacturing
- Web browser plug-in
- Wireless home area network
- Integrity
- Symmetric bandwidth
- Zeroization
- Cross-site request forgery
- Service provider portability
- Newsvine
- Employment agreement
- Imitation game
- A/D
- Fraudulent misrepresentation
- Lease-purchase
- Internet forum jam
- Blackhat hacker
- Estimative intelligence
- Field length
- Challenge-response protocol
- Intelligence methods
- Inference control
- Multicast
- Handshake protocol
- Physical failure
- Cyber hygiene
- Win-Win
- Dolby noise reduction
- Voir dire
- Decibel
- Mobile device ID
- Health IT Toolboxes
- Intelligence Database
- Broadband communications
- Countervailing duty
- Terrorist
- Hosting ISP
- Emergency Locator Transmitter
- Optical switching
- Bookmarklet
- Place
- Advance force operations
- Tiger team
- Attack Sensing and Warning
- Structured message text
- Agency IT security program manager
- One-time password device
- Email forwarding
- Coding
- Non-resident alien
- SCSI
- Translation software
- Copy Control Information
- Trade secret owner
- Code group
- Direct finger reader
- Remotely Piloted Aircraft Commander
- Critical tasks
- International Record Carrier
- Subdomain
- Login control
- Clutter data
- “Natural expansion” doctrine
- Videophone
- Intended effect
- Sensor field
- Centralized mobile device management
- Collision
- Open communications
- Multi-hop problem
- Social technologies
- Backup Copy
- Affirmative consent
- National Information Exchange Model
- Networthiness certification
- Interconnect
- Third-party service provider
- Emergency responder
- Information collection
- Foreign government information
- Anonymous file transfer protocol
- Digital Commons
- File infector virus
- Terminator
- Known-plain-text attack
- Awareness
- Clear
- Corporate records
- Informal application
- Social media host
- Information system security controls
- Military information environment
- Brand monitoring
- Fraudulent intent
- Specialized Mobile Radio
- Computer performance evaluation
- Trademark examiner
- Point-of-sale terminal
- Multilevel security
- Constitutional rights
- Dependent tasks
- Universal serial bus modem
- Spam run
- Commercial Crime Bureau
- Dark Web
- Game Theory
- Scam
- CrossPlatform
- Toponymic data
- Web 1.0
- SPAM
- Battlefield surveillance
- Reinforcement Learning
- Internal name certificate
- Limited user account
- Data communications protocol
- Free flight airspace
- Edit box
- Communications service provider
- Access control policy
- Segregation of duties
- De-identified data
- Provenance information
- Computer programming
- Zone surveillance
- Records retention
- Positive film
- Mobile computing
- DoD critical infrastructure security information
- Fusion Center Guidelines
- SMT
- Digital signature algorithm
- Search service
- Unauthorized transaction
- Virus hoax
- Privileged process
- Polish Notation
- High-altitude electromagnetic pulse
- Image authentication
- Proprietary operating system vendor
- Pretexting
- Gray mail
- Unicast traffic
- Software security
- Encryption object code
- Intellectual property right
- Noncommercial use
- Terrorist Identities Datamart Environment
- Inactive information
- High-bandwidth
- Intermediate data
- Analysis and production
- Transborder
- Congressional district
- Data format
- Human-information behavior
- In-the-wild
- U.S. Government publication
- General jurisdiction
- Pi
- Extended collective licensing
- Confirmed opt-in
- E-care
- Qualitative assessment
- Information security continuous monitoring
- Root of Trust for Update
- Local penetration attack
- Independent creation
- Geopbyte
- Per curiam
- International Cartographic Association
- Neutrality
- Drone
- Nptech
- 3D graphics
- Smart thing
- Body-integrated technology
- Technological Attack
- BAC
- Field device
- Musical arrangement
- Counterpropaganda
- Economic bypass
- Credibility
- Internet access services
- E-tailer
- Mail client application
- Moot
- Wireless network
- Portable navigation device
- Smart meter
- High-Speed Packet Access
- .pa
- Var
- Compatible Time-Sharing System
- Opt-out cookie
- Terminal disclaimer
- Cracker
- Voice compression
- Blind bidding
- Online Public Access Catalog
- Clickstream analytics
- Permissible interference
- Adequate remedy at law
- Time bomb
- Auction fraud
- Specimen
- Anti-forensic
- Problematic data action
- Hash-based message authentication code
- Order of battle
- Communications device
- EINSTEIN sensor
- MiniDV
- Expert witness
- Appropriations
- Early round
- Licensing Division
- Smart home
- Recoverable commodities and software
- Static IP address
- Cloud service user
- Counterintelligence
- Insured
- Genetic algorithm
- Shor’s quantum algorithm
- National intelligence support team
- Complaint Management System
- Cryptography control
- PIV card
- Cobot
- Limited fielding
- Artificial general intelligence
- Analysis, correlation, and fusion team
- Cyberscholarship
- Shared secret
- ActiveX
- Basic service
- Retraction
- Bluetooth low energy
- Cyber environment
- Public/private authentication key pair
- Calling party pays
- Telephone exchange
- Original Classification Authority
- Root of Trust for Verification
- Personal copying
- File maintenance
- Circuit-level gateway
- Civil Rights
- Mobile service
- Biological biometric characteristic
- Trusted agent
- Assurance authority
- Application log
- Videography
- Coverage
- Security process
- Biometrically enabled physical access
- Vet
- Unpatentable
- Extortion threat
- Advertising network
- Accessory
- COCOMO
- Operating cost
- Fading
- Contract employee
- Surveillance privacy
- Computer security policy
- Prioritization
- .zip
- Advance royalty
- Domain name record
- Covered business method patent
- Message Authentication Code protection
- Nearline storage
- In-game
- Area surveillance
- Hardware security module
- Creative work
- Collateral classified
- Security Officer
- Integration engine
- ADN
- Automated Response Unit
- Prime number generation seed
- Flash card reader
- Identity Federation Framework
- 406 MHz emergency beacon
- Head-end unit
- Hybrid security control
- Inheritable
- Digital native
- CONTOUR
- E-banking
- Dynamic smart cooling
- Account data
- Random bit generator
- Web attack
- Packer
- Authenticity
- Cash
- Security capabilities
- Semiautonomous
- Opposing information
- Computer abuse
- Set-top box
- Action item status
- Object reuse
- Credit-invoice VAT
- Nonstatistical purpose
- Virtualization
- Film
- Express aiming
- Electromagnetic Pulse
- Between line entry
- Petabytes per second
- Aeronautics
- Calendar
- Long distance telephone service
- Source reliability
- Access software
- End-to-end testing
- Scanning receiver
- Necessary party
- Fragmentation
- Computer-processed data
- Knowledge of a circumstance
- Minimum Essential Information Infrastructure
- Designated disclosure authority
- Validated trust model
- Grand jury
- Archival Copy
- Facilities-based carrier
- Communications Zone
- Ampere
- Covert timing channel
- User confidence
- Cyber-relevant time
- Space code
- Voice telephony
- Desktop firewall
- Padding
- Authentication capability information
- Wholesale Price Index
- Criminal intelligence file
- Return on assets
- High-definition Multimedia Interface
- Voluntary consensus standards
- Biometric reference
- U.S. constitutional law
- Back end
- Operational Design Domain
- Information operations attack
- Domain name tasting
- Unlicensed frequency
- 4G
- Interactive videoconferencing
- Data linking
- Bot
- Unlicensed personal communications services
- Cloud service management
- Decision trigger
- Hybrid industry
- Egress filtering
- Wireless communications
- Sell-through rate
- Preparer Tax Identification Number
- Health care information
- Sunk cost
- Drawing
- Unintentional cyber actor
- Sovereign state
- Discretionary control
- Protected distribution system
- Masking
- Termination payment
- Best judgment standard
- Intangible property
- Web 2.0
- Biometric subject
- Analog
- Symmetric algorithm
- Business architecture
- Line conduction
- Inter-control Center Communications Protocol-Telecontrol Application Service Element.2
- Nanometer
- Secret writing
- Air-gapped environment
- Security test and evaluation
- Temporal
- Database application
- Snapshot
- Audiocast
- Core network
- Land mobile radio
- Infrastructure owners and operators
- Knowledge Discovery and Dissemination
- DS3
- Media access unit
- Enterprise search
- Videogame development
- Highly automated vehicle
- Reality-virtuality continuum
- Collision detection
- CKMS Component
- Compartmented intelligence
- All-hazards approach
- Computer terminal
- Viewpoint
- Homeland Security
- System configuration
- Technical safeguards
- Observation
- Mass mailing worm
- Social‐network analysis
- Information technologist
- Proportionality principle
- Concentrator
- Opinion evidence
- Tangible benefits
- Viral Video
- Cryptovirus
- Maritime domain awareness
- Depreciable durable asset
- Black hat SEO
- JTC-1
- Multiple agency equities
- Communications security material
- Black box fraud
- Non-governmental organization
- Perjury
- Hashing
- Trade policy
- E-participation
- War chalking
- Implied-in-fact contract
- Pattern analysis
- Unified Medical Language System
- Text-to-speech
- Up-sell
- Page view
- Recovery procedures
- Radar intelligence
- Electronic Payments Network
- Audience-driven
- Key distribution
- Assured Services Local Area Network
- 5G
- Public Telecommunications Operator
- Frequency assignment
- Denial-of-reputation
- Written
- Commercial software
- Cloud robotics
- Mobile Device
- SGML
- Secure cryptographic device
- Penetration signature
- Edge caching
- Robo-advisor
- Not safe for work
- Data Stream
- Pilot project
- Negotiation
- BioWatch program
- Quantified Self
- Enhanced service provider
- Information dissemination product
- Fingerprint filter
- Optical camera
- Teleoperator system
- Velocity
- Virtual entity
- Enclave boundary
- Market share
- Individual Master File
- Geographic Number Portability
- Original evidence
- Visual information documentation
- Essence
- Website capture tool
- PC-DOS
- Alternate site test
- Superzapping
- Industrial control system
- Subcontracting
- Incineration
- Open Access
- Trustmark organization
- Non-self-executing
- Meme aggregator
- Cable television network
- Electronic intelligence
- Internal audit
- Information service
- Mitigation strategy
- Frequency Division Duplex
- Proximity Detector
- BlackEnergy
- Resource reservation protocol
- Recordation
- Radar detector
- Keystroke log
- Security in-depth
- ZigBee
- Multiprocessing
- Digital certificate
- Multi-Regional HIE
- Data Conversion
- Internet banking
- White market
- Speed dialing
- Security threat
- Export-controlled information
- Command information
- Mobility 2000
- Defense in breadth
- Empirical data
- Validated data
- Commercial service provider
- Analog media
- Wireless provider
- Interconnection Security Agreement
- Vulnerability analyst
- Managed security service
- Redundant array of independent disks
- Software Development Plan
- JPEG
- Network sponsor
- External risk
- Master System Security Plan
- Information offense
- Shellcode
- Multichip integrated circuit
- Certificate authority certificate
- Business continuity plan
- Geospatial information and technology architecture
- Distribution agreement
- Portal
- Physical Layer
- Data Dump
- Cyber Operational Preparation of the Environment
- Closed architecture
- Source Selection Authority
- Zip drive
- Unintentional threat
- Delivery policy
- Importer
- Carbon copy
- ARP spoofing
- Supply chain risk management
- Primary data
- Critical intelligence
- Circuit Switched Data
- Toll
- Bulletin board operator
- Wireless broadband
- Discrete data
- Open proxy server
- Pretty Good Privacy
- Cipher
- Cyberpower
- Qualitative
- Data element
- Advanced authentication
- Digitization
- Clearly and prominently
- Certifying authority
- Audio book
- Claimed invention
- Digital typefont
- Security
- Shared spectrum access
- Combat Information Center
- Clickstream
- Breach
- Full-interruption/full-scale test
- Feed count
- Source data automation
- Recording
- Trust relationship
- Public cloud
- Reexport
- Cleared defense contractor
- Megabyte
- DHS IT system
- Patent family
- Personal information management application
- Primitive
- Persistent Uniform Resource Locator
- Real-time reaction
- Benign
- Beyond a reasonable doubt
- Telemetry intelligence
- Telematics system
- Sender
- Interception interface
- Maintainer
- Clustering
- Sensitive position
- Deceive
- Proximate cause
- Information Exchange Agreement
- Systems Under Test
- Named object
- Telegram
- Biomedical
- SNI
- Neuromorphic computing
- National biosurveillance capability
- Authenticated user
- Direct connection
- Attached document
- Vanity telephone number
- Point of purchase
- High-speed lines
- Cadastral map
- Geocentric
- Client device
- Period
- Privacy browsing mode
- Beats per minute
- Concept drift
- Data object
- Joint Resolution
- Appropriate
- Gibibyte
- E-auction
- Foreign affairs
- Expungement
- EXECUTIVE SUMMARY
- Computer Science Network
- Expenditure
- Hierarchical network
- Special damages
- User fee
- Composition
- Third-level domain
- Transformer
- Risk-based data management
- String
- Acceptor
- Redistribution
- System and Communications Protection
- Piggyback attack
- Arraignment
- Biometric encounter
- Organic results
- Physical domain
- Threat analyst
- Born analog
- Currency
- External barriers
- Nondramatic musical work
- Burst encoder
- Commons
- Port spanning
- Network externalities
- Backup site
- SPAMTRAP
- Content filter
- Bid evaluation
- Opcode
- Assistive Technology
- Digital signal
- Support Services
- Settings modifier
- Digital dividend
- Critical Information Infrastructure Protection
- Biometric identity
- Low frequency
- Sponsored link
- Foreign-based third-party service provider
- Criminal History Record Information
- Economically sustainable preservation
- Overwriting virus
- ICQ
- Intranet
- Interception
- Common Operating Environment
- Transmission rate
- Biometric feature
- Disconnect
- Source identifier
- Photoblog
- Advanced Television Test Center
- Audio
- Cyberbullying
- Iris imaging
- LinkedIn
- Most significant bit
- Patent claim
- Adaptive robot
- Subcontractor
- Kinetic
- State Identification Bureau
- Tape tester
- Multiple Equity Records
- Cross‐session measurement
- Identity management
- Non-state actor
- Jitter
- Network security scan
- Threat model
- Insert
- Grok
- Remotely created check
- Sun-synchronous orbit
- Timesharing
- Copyright Tribunal
- Budget authority
- Cramming
- Payload
- Attract Mode
- Concealment system
- Querying
- NASA Acquisition Internet Service
- ISO 14971
- Torrent technologies
- Electronic Product Code Information Services
- Biometric capture process
- Dynamic
- Application infrastructure provider
- SCANNING
- Cloud Storage
- Subscriber information
- Mobility
- Local exchange
- Network-as-a-Service
- Data grabber
- Gesture-based technology
- Assistant Secretary for Infrastructure Protection
- Digital Video Broadcasting
- Internet meme
- Data synchronization
- Raster data
- Type of code significance
- Flooding
- Design-Build-Finance-Operate
- Mutilation
- URL obfuscation
- Demand-assigned multiple access
- Disk shadowing
- Informational self-determination
- Objective evidence
- Photomap
- Average access time
- Nano-intermediates
- Systems operations and maintenance professional
- Real time monitoring
- Intelligence system
- Cumulative match characteristic
- Administrative law judge
- Controlled country
- Trademark misuse
- Internal Network Interface
- Chronological file
- Import quota
- Blank medium
- Exchange rates
- Back-up tape
- Computer Software Unit
- Collection of information
- U.S. Supreme Court
- Access Card
- Unintentional radiation intelligence
- Role-based authorization
- Disclosure-free abstract
- Intermodal
- Trademark owner
- Adaptive system
- Civil information management
- Riff
- Next Generation 911
- Cover
- Best current practices
- Weaponize
- Metadata tag
- Burn book
- Microwave
- Zombie
- Electronic warfare frequency deconfliction message
- XG-PON1
- Digital nautical chart
- Open Systems Interconnection-Reference Model
- Cyberterrorism
- Key resources
- DND
- Tangible medium of expression
- Upstream speed
- Lifecasting
- Unsecured
- Enterprise Software Architecture
- Switching center
- Internet gateway
- Orbit
- Burst rate
- Pollution
- Executable file
- Artwork
- Intelligence mission data
- Digital preservation architecture
- BLAWG
- Vital area
- Influential
- Triple DES
- A la carte service
- Anti-piracy
- Individual‐level data
- Army Knowledge Online
- Compensatory measure
- E-print
- Core router
- Partial data removal
- EResearch
- Destination IP address
- Geospatial applications
- Bit copy
- Passive public information policy
- Pay per download
- Pad
- Compliance
- Date/time stamp
- Information
- Memory resident
- Local denial-of-service attack
- Facility
- Significantly modified data system
- Application proxy
- Legal defensibility
- Persuasive evidence
- Risk Steering Committee
- Vulnerability analysis
- Interactive advertising
- Geographically dispersed
- Implied warranty of merchantability
- Assembly language
- Sunset provision
- Voluntary consensus standards bodies
- Unintelligible
- Digital archivist
- Processing
- Design flaw
- RSS feed
- Granularity
- Crackz
- Affiliated entity
- Change
- Compact flash card
- Critical system
- NSA Endorsed Data Encryption Standard (DES) Products List
- Seclusion
- Online service
- Clandestine operation
- Local search
- Quantum Immunity
- Dish
- Email attachment
- Electromagnetic operational environment
- Electronic chain letter
- Obligations
- Microprocessor
- Carding online
- Internal Security
- System reconfiguration attack
- Data compaction
- Telecopy
- Device-agnostic
- Bit stream
- Micropublishing
- WARNING
- Freedom of assembly
- Multisourcing
- Folksonomy
- Developer
- Video playback
- Data shadow
- Trademark Law Revision Act of 1988
- Common Platform Enumeration
- Photonics
- Architecture framework
- Binding arbitration
- Overwrite
- Conspicuously post
- Brand identity
- Brainstorming
- Removal tool
- Context collapse
- Modification
- Below the fold
- System programmer
- Laboratory information management system
- Freedom of religion
- Cyber alliance
- Covered entity
- Interdisciplinary
- Wireless bridge
- 1G
- Disaster resilience
- Rights management metadata
- Affidavit
- Duty to warn
- Digital format
- Proxy
- Declassification event
- Roots of Trust
- Dedicated port
- Assured delivery
- Cyber economy
- Inducement
- Duplicate digital evidence
- Cyber-retaliation
- Loss of Control
- Cyber resilience framework
- Blogroll
- Aggregated data
- Geolocation
- Defense-in-depth
- Directional antenna
- Low probability of detection
- Auto-responder
- Retrievable information
- Geographic data
- Security level
- System information
- Online payment
- Section 8 declaration of continued use
- Next-generation genomics
- Integrated justice information system
- Hedonic damages
- Unmanned system
- Access evaluation
- Virtual Home Environment
- Mobile device forensics
- Subscription data
- Data element access service
- Authentication mode
- Network Integration Evaluation
- Patient data
- Digital entity
- Nonrepudiation
- Vanity e-mail
- Data Acquisition Telecommand and Tracking Station
- Modem
- Patent fence
- Secure microcontroller chip
- Audit charter
- Iron box
- Conventional password
- Acquisition process
- IPad
- Computer graphics
- Decipherment
- Wireless Technologies
- Breach of fiduciary duty
- ISTAR
- Condition subsequent
- Emergency communications
- Cache
- DOS batch file
- Logical disk
- Intelligent sensor
- Enrollee
- Employer
- Meter
- Strategic communication
- Markush doctrine
- Information revolution
- Content aggregator
- Abuse of dominant position
- Ubiquitous
- Actus reus
- Direct user
- Severability
- Abacus
- Level of assurance
- Right of privacy
- Dijkstra's algorithm
- Behavior monitoring
- Registry Key
- Bit-stream image
- Coopetition
- Wallet provider
- Passive website
- Information dominance
- Commercial information
- Digital
- Digital Feature Analysis Data
- Net-centric
- BHASKARA
- Origin authentication
- Top-level domain
- Digit
- Strong mark
- Intelligence collection
- Air force network operations
- Safeguards
- Blog client
- Archivist
- Authority
- Orphaned data
- Dynamic Hypertext Markup Language
- Retail payments
- Cryptonym
- Inter-message threat
- Digital fingerprint
- Primary use of data
- CIF
- Network reliability
- Security specification
- Responsible source
- Security analysis software
- Sensor
- Faceprint
- Cloud service partner
- Cognition
- Directive
- Virtual record
- LPD/I
- Broadband access
- Empirical evidence
- Spam refrigerator
- Dumpster diving
- Intelligence warfighting function
- Transcript
- Authorizing official
- Indirect cost
- Collection asset
- Risk-based authentication
- Dynamic range
- Information content provider
- Design patent
- Online collection application
- Security strength
- Code churn
- Online escrow service
- Assault
- Location-aware computing
- Electronic and acoustic warfare
- Firmware-over-the-air
- Forward auction
- Automatic message accounting
- User access rights
- Nmap
- Returning bank
- Electrotechnology
- Social engineering awareness
- IRENE 3D
- General publication
- Task bar
- Metric system
- Spectral band
- Process metadata
- X.400
- Home banking
- Real economic growth
- Electromagnetic emanations
- Data query
- Interstate or foreign commerce
- Device endpoint
- Seeder
- Dcache
- Mechanical royalty
- Privacy standard
- Security Clearance
- Fingerprint Identification Number
- Sell through
- Managed storage
- Remote internet voting
- Cyber Cop Portal
- Printer
- Measured data
- Search advertising
- BACnet
- Digital pseudonym
- File extension
- Contract reformation
- Competitive range
- IPost
- Narrow AI
- Virtual Machine
- Keyword phrase
- Cognitive Dissonance
- Handset
- Dataveillance
- Sociodigitization
- Audit logging
- Command and control warfare
- E-print archive
- Transportable
- Hot link
- Cross-assembler
- Storyboard
- Service model
- Geographic information retrieval
- Information exchange analysis
- Cyber services
- Medium frequency
- Critical Infrastructure Protection Committee
- Competitive negotiation
- Knowledge-based authentication
- Incorporation by reference
- Collating significance
- Industrial internet
- Programmable
- Felony
- Software test report
- Noob
- Senior Executive Intelligence Brief
- Joint Network Operations Control Center
- Message envelope
- Intentional threats from external unauthorized entities
- Defense information
- Fuzz testing
- Track
- Payload capacity
- Access time
- Negligence
- Digital audio player
- LMR system
- Context-specific attributes
- Continuous process
- Life-cycle costs
- Electro-mechanical
- NIST Cybersecurity Framework
- Microcard
- Template data
- Risk tolerance
- Nearables
- Inappropriate usage
- Core secrets
- Growth capital
- Biomimetics
- Virtual unbundling
- Scientific and technical intelligence
- Canary
- Connectable
- Attack potential
- Geocentric datum
- Data as a Service
- Opt-out
- Secure Terminal Unit III
- Internet of Everything
- Unstructured content
- Universal Plug-n-Play protocol
- E-lobbying
- In-World
- Bearer Independent Call Control
- Outbound link
- Business-to-employees
- Allegation
- Netwar
- Dialing software
- Computer-Assisted Drafting and Design
- Head of Contracting Activity
- Storage system
- Fractional T3
- Caneware
- EAccessibility
- Data spill
- Network Centric Operations
- Center of excellence
- Strength
- Pocket PC
- Institutional advertising
- Smart city
- Chief Executive Officer
- Electromagnetic intrusion
- Cascading effect
- System-of-interest
- Digital copier
- DeCode
- Felon
- Functional claim
- Attosecond
- Search engine results page
- Human Rights
- Electronic device
- Data modeling
- Recognition
- Grantback
- Balkanize
- De-identified protected health information
- Carrier of last resort
- Photograph
- Minutia(e)
- Morse code
- Space Systems
- Key space
- Educational Broadband Service
- Discretionary declassification review
- Disc key
- Imposter
- Dime
- Configuration management controls
- Camcorder
- Property manager
- COMCAM imagery
- BitTorrent
- Microarchitecture
- Supplier assurance
- Integrity-protected channel
- Security information
- Unified network
- Standardization
- Downsizing
- Television spectrum
- Transformative research
- System scanner
- Information Sharing System
- Background musician
- Robbery
- E-democracy
- End-to-end recoverability
- Password token
- Bit-by-bit duplicate copy
- Implied license
- Anywhere fix
- Beacon tag
- Web application attack
- CPS engineering
- Personal Communications Service
- Static key
- Artificially-intelligent attorney
- Full-spectrum cyber operations
- Anonymiser
- Uncontrolled risk
- Warm restart
- Boldface
- Risk assessment methodology
- Bloglines
- Fuzzy Logic
- Variable cost
- Sexting
- CD-RW
- Electronic funds transfer at the point of sale
- Cosourcing
- Negative option plan
- Malicious payload
- Tactical data link
- Equivalent process
- Warblog
- Cryptographic coprocessor
- Health surveillance
- Videotex
- Warez group
- Accountability
- Contact smart card
- 100BASE–TX
- Intelligence operations
- Protection level
- Centimeter
- Orthoimagery
- Tactical air reconnoissance (land)
- MAJCOM
- MegaD
- Universal Personal Telecommunication
- Remote payment
- Copies
- Host Intrusion Detection System
- GUI
- Test data
- Retransmission
- Exploitable channel
- C&C
- Computer Based Assessment Tool
- E-jihad
- Indirect georeferencing
- Attack assessment
- Computer-related crime
- Chief Financial Officer
- Dependency
- Full text database
- Contingent records
- Country-of-origin rule
- Mockingbird
- Internetwork Packet Exchange
- Internet access service
- Serial cable
- Probation
- Software proxy agent
- EPCglobal network
- Codec
- Ad space
- Rent-seeking
- Publicly available
- Kill Command
- Judgment creditor
- Informatician
- Output data
- Cyberintrusion
- Privacy pragmatist
- Distribution automation
- Security interest
- Limited public figure
- Security mode
- Behavioral outcome
- Audiotape
- Media Sanitization Officer
- Outage mapping
- Secured creditor
- Direct cost
- Input Variable
- New generic level TLD
- Instruction set architecture
- Activity Security Manager
- CGI scanner
- Eradication
- Health privacy
- Concept of intelligence operations
- Assist the transmission
- Microsoft Word
- Promissory estoppel
- Physical Resource Layer
- Safety Instrumented System
- Battlespace awareness
- Aeronautical public correspondence
- Insecure mobile interface
- Grey market
- Overload
- Teledensity
- Cipher key lock
- Situational understanding
- Serial Flier
- Assent
- Intelligence Assessment
- DoD information system
- E-movement
- Concurrent
- Syntactical interoperability
- E-mail client
- Videotape recorder
- Geotargeting
- Sound card
- Mobile publisher
- Pattern matching
- Information leakage
- Personal directory data
- Voice over Secure Internet Protocol
- Session cookie
- Supply chain
- Electronic fund transfer system
- Line-of-sight
- Geospherical
- .aq
- Encryption process
- Pan-European cross media rating system
- Hadoop
- Legacy software program
- Threat modeling
- Affiliate marketing
- Security mechanism
- Speaker identity verification
- Cost-plus-a-percentage-of-cost contract
- System Security Engineering
- Traceability
- Biometrics program
- Smartwatch
- Podcast
- Use tax
- Medical data fusion
- Mobile Internet
- Digital video recorder
- Non-bargained term
- E-residency
- Image acquisition
- Gigabit Passive Optical Network
- Broadband Availability Gap
- Binary system
- Command net
- Computational data
- European Council
- Clear screen policy
- Telecommuting
- Bell-La Padula model
- Credit header data
- Electronic money laundering
- GeoTIFF
- Technical specifications
- Conformity
- License Fee
- Cell tower triangulation
- Close button
- Random Access Metadata for Online Nationwide Assessment
- Name space
- Firm
- Labor-hour contract
- Web filter
- User identification
- LCD
- Compatibility testing
- Biological information
- Content Indicator Code
- Atomicity
- Jammer
- Reintermediation
- Evidence preservation
- High-frequency radio
- Affiliate network
- Threat advisory
- Contact information
- Anime
- Assessment approach
- Security Operations Center
- Privacy statement
- Software-closed architecture
- Laser Beam
- Qualification
- GPL license
- Architecture
- Dynamic optimization
- Audit file
- National competitiveness
- JavaScript
- Routing protocol
- Venture capital fund
- Knowledge robot
- Access Node
- Value-added network
- Policy maker
- Cyber-stuffing
- Acceptance test
- Non-computing security method
- Genome
- Computer user
- Trusted channel
- Centralized Emergency Preventive Automatic Control Systems
- Deterrence by punishment
- Reputation
- Limit check
- Data cleansing
- Copyright collective
- Attribute authority
- BPL modem
- Subject matter expert
- System security officer
- Creditor
- DNA Sample
- Decoder
- Teleconference
- Information security architect
- Running parallel
- Passive pervasive attack
- X.500
- Request for quotation
- Signature generation
- Access management
- Music Video
- Single Point of Failure
- Counterpropaganda operations
- Widget toolkit
- Data lake
- Rainbow table attack
- Operating system software
- Hierarchy
- Cybersecurity guidance
- Megapixel
- Voice-activated calling
- Technical metadata
- Message authentication key
- Object code
- Digitally-signed communication
- Offensive Cyberspace Operations
- Uptime
- Authorization
- Switched communications system
- Area of intelligence responsibility
- Data type
- Failure to acquire
- Statistical system
- Unidentified visitor
- Initializing
- CWAN
- Location-based data
- WEB SEC Code
- State actor
- Manufacturer of automated technology
- Air surveillance
- Sophistication
- Invoice
- Comparative shopping
- Asymmetric key encryption
- Security Assistance Visit
- Lurk
- Slack space
- Non-IT/OT partner
- Complaint
- LOL
- Address data
- Connected vehicle
- Computer resources support
- Unfavorable personnel security determination
- Interrupt
- Graceful degradation
- Secure sharing
- Data retrievability
- Tailored trustworthy space
- Transaction generator
- Anti-surveillance warfare
- Refreshing
- Integrity of evidence
- Web Cam
- Numeric
- Session Layer
- Data-related emanations
- Modus Operandi
- United States Configuration Baseline
- Service Switching Point
- Protocol interaction
- Biometric Application Decision
- Tabletop exercise
- Defense Information Enterprise Architecture
- Information economy
- Must carry
- Alphabetic test
- Technical security features
- New Account Creation
- Operating lease
- Microprocessor microcircuit
- Cloud hosting
- Overt security testing
- Cellular data card
- Analyzer
- Seismic detector
- Encumbered
- Science and Technology
- Vital records
- Interactive computer service
- Defense Business System
- Non-consumptive use
- Independent cost estimate is
- Event logging
- Reconnaissance satellite
- Smart spaces
- Melody
- Identity Theft Data Clearinghouse
- Privacy preserving data mining
- Detect
- Form
- COMCAM forces
- Disclosure
- Program statement
- Service plan
- Boolean algebra
- Indifferent user
- Government electronic information service
- Command, control, communications, and computer system
- Portable storage device
- Classification
- Consent order
- Interception of communications
- Handwriting
- Technological leapfrogging
- Cyberactivism
- Court of Customs and Patent Appeals
- Streaming media
- Autofocus
- .name
- Bill
- Marketing e-mail
- Fast flux service network
- Mobile surveillance
- Community of Interest
- PII Inventory
- Certificate-related information
- Personally identifiable health information
- Information Technology
- Blue Team
- Automated key distribution
- Binning
- Contractual duty
- Tape Recorder
- Check image
- Cyberian
- Incident-response procedure
- Protective technologies
- Integrity function
- CAD drawing
- Port protection device
- Microwave transmission
- Remediation
- Big data analytics
- Context dependent definition
- Retained records
- Deflation
- Defense contractor
- Counter-signals intelligence
- Keying material
- Pinging
- Root of Trust for Measurement
- Extensible Authentication Protocol
- Mobile user
- Jury instruction
- Revocation
- Multilevel device
- Variable length field
- Terrorist Finance Tracking Program
- Recommendation engine
- Reputational risk
- Facilities management
- Social interface
- International corporate spies
- Mutually suspicious
- Evidentiary privilege
- Natural search results
- Compensation
- Change Management
- Digital modem
- Wired Equivalent Privacy
- Certificate
- Test strategy
- Geo
- Defect
- Context Menu
- Service provision
- RSS aggregator
- Geostationary meteorological satellite
- Human-Machine Interface
- Manual cryptosystem
- Public safety support provider
- Reverse 911
- Digital certification
- Intelligence record
- Pseudorandom number generator
- Make-good
- Snailpaper
- Critical Infrastructure Resiliency
- Linear bus topology
- Drag
- CompactFlash card
- Key generation
- Secure hardware browser
- Windows CE
- Economies of scope
- Extensible markup language
- Orthogonal frequency-division multiplexing
- Consultation
- Presence service
- Text terminal
- Information Age
- Electromagnetic jamming
- Input sensor
- Electronic intrusion
- Data roaming
- Data furnace
- Network facilities provider
- Reprogram
- First Responder
- Mission-critical information
- Remote login program
- Catweasel
- Nonpublic information
- Nanoscale
- Accountability Principle
- Theft of services
- Government for citizens
- Surveillance switch
- Basic Auth
- Federal Coordinating Council for Science, Engineering, and Technology
- Internet Key Exchange protocol
- Minute
- Digital Advanced Mobile Phone Service
- Non-significant code
- Covert storage channel
- State secret
- Geocode
- Hulu
- Datafication
- Oversight
- Real data
- Technological hazard
- Small cell
- Time Division Multiple Access
- Radio broadcast
- DDoS extortion
- Restrictive covenant
- Hardcore gamer
- Digital Enhanced Cordless Telecommunications
- Relevant filing system
- Cap
- Pole attachment
- Inbox
- Contract modification
- Directed energy weapons intelligence
- Personnel vetting
- Tax on Internet access
- Information security risk analyst
- Digital Image Processing
- Operational support package
- Countermeasures
- Channel
- Mechanical license
- Cyberpunk
- Enterprise Human Resources Integration
- Remotely piloted
- DNS sinkhole
- Personal radio services
- Magnetic tape
- Consumer price index
- .gov
- Compartmentation
- Systems engineering
- Economic intelligence
- Niche market
- Word-of-mouth advertising
- Technical vulnerability
- Satellite broadcast programming
- Digital inclusion
- Cable modem service
- Category-6
- Multiband
- Packet Radio Network
- System element
- Government-to-citizen
- Software failure
- Data intervenability
- Instantaneous bandwidth
- Plug-in electric vehicle
- Quasi in rem jurisdiction
- Document collaboration
- Access path
- Visa
- Imputation
- Emergency response provider
- Data desert
- Radio station
- Long-felt need
- Discrete process control
- Rapid Recovery
- Embedded software
- Automated license plate recognition system
- Adaptive engineering
- Phasor Data Concentrator
- Automatic Vehicle Monitoring
- Attachment of property
- Anti-virus
- Paid listing
- Co-inventor
- Cost per time
- Jury
- Acceptable interruption window
- Common Profile for Presence
- Medium Earth orbit
- Grant
- Cyberstalking
- Reasonable Suspicion
- Looping
- Near real-time
- Do Not Track
- Time-sensitive information
- Blockchain-as-a-Service
- Cloud infrastructure
- Computer cryptography
- Bit depth
- Brand
- Implied consent
- Broadband Performance Index
- Shibboleth
- Commercially owned cultural content
- Letter
- Defendant
- Wisdom
- Protective order
- Cyberfiction
- Flash game
- Cost-per-order
- Archival master file
- Meteorology
- Table of Allotments
- Spit
- Megahertz
- Fullz
- CD-ROM
- HTML
- Bricks-and-clicks
- Echo effect
- Trigger
- Authority Revocation List
- Finance industry
- Point of Presence
- Float
- Acceptance Inspection
- Secure gateway
- Logical backup
- Database replication
- Closed Area
- EFT crime
- Counterfeit goods
- Software configuration management
- Broadcast radio station
- External information system service provider
- Digital copy
- Common law
- Application metering
- BLACK wire line
- Integrated contract
- Sponsorship
- Graphic Arts
- Network operator
- Bring-Your-Own-Device
- Computer resources-integrated product team
- Fixed voice
- Blu-Ray
- Priority national intelligence objectives
- Graphics
- Optically
- WHOIS information
- Originating agency identifier
- Kilobytes per second
- Split processing
- Postal Numeric Encoding Technique
- Regulated medical device
- Criminal history record information system
- Data fusion
- Data rights
- Sophisticated capability
- Distributed Control System
- Wireless carrier
- Wizard
- Judgment as a matter of law
- Naming authority
- Tools-as-a-Service
- E-mail spoofing
- Privacy Point of Contact
- Checkpoint
- Cassette
- Base64
- Sensitive unclassified information
- Hold-out
- Vaccine
- ODM arrangement
- Security through obscurity
- Delivery Sequence File
- Naval special warfare
- Blacklisting
- Access agreement
- Covert Action
- E1
- Fiber optic
- Mobile software agent
- Foreign instrumentality
- IA-enabled information technology product
- Manual remote rekeying
- Oath
- Terrorism
- Mugshot
- Greenfield
- Exclusive license
- Current dollar
- Mobile Phone
- Ethernet Passive Optical Network
- Bit vendor
- Privacy Act officer
- Analog network
- Bit error rate
- Evolution-data optimized
- Machine instruction
- Host bus adapter
- Payload data
- File
- Clearing system
- Reddit
- Fiscal fraud
- E-Catalogue
- Home Location Register
- Security feudalism
- Remote sale
- Unilateral
- Covert channel analysis
- National Disaster Medical System
- Direction finding
- Fault-tolerant system
- Back-up data
- Certificate of service
- Zone of privacy
- Ephemeral recording
- Internaut
- Cyberexploitation
- Antivirus tool
- Applicability Statement 2
- Patented
- Tacit knowledge
- Manageability
- Line supervision
- Garble
- Procurement
- Restitution
- Ace
- Data fragmentation
- Statutory bar
- System log
- Satire
- Sanctions
- Cell suppression
- Extradition
- Cookie buster
- Public safety communications
- Ingest
- Global Information Infrastructure
- Law Enforcement Access Field
- Cryptologist
- Full automation
- Access charge
- Contract work
- Debilitated
- Technical knowledge
- Biometric Enterprise
- Implied contract
- Videotape
- Splash page
- Incapable informational mark
- Goal(s)
- DNS protocol
- Cyber security incident
- Specification
- Web tool
- Cyber crises
- Raw image
- Cyberhijacking
- Advanced avionics digital computer
- Networked
- Nominal damages
- Change of character clause
- Functional standard
- Mailbox ISP
- E-mail advertising
- Asymmetric authentication method
- Risk avoidance
- Frozen records
- TV translator
- Every-citizen interface
- Digital photo
- Spacecraft
- Distributed computing
- Online Game
- Ambient information
- Data exchange standards
- Inventory
- Mimic
- Georeference
- Invalidity
- .txt
- Deliverable software
- Digital rights
- Advertising-based pricing model
- E-mail protocol
- GPS signal
- Sybil attack
- Computer Game
- Frequency standard
- Test assertion
- IA Integrity
- Dump
- Key encrypting key
- Wireless industry
- Functional specification
- .biz
- Cyber security and information assurance
- Interface analysis
- Chief of Station report
- DASE
- Incubator
- Microdot
- Information Security Officer
- Cost-per-lead
- Bandwidth on demand
- Anonymized information
- Critical infrastructure community
- Application server
- Videogame cartridge
- Network capacity
- External fragmentation
- Continuity of communications
- Vascular pattern recognition
- Criminal history file
- Acquisition costs
- Failure to enroll
- Characteristics & performance data
- Electronic image
- Simulcast
- Wireless 9-1-1 service
- Bad actor
- Branded keyword
- Commercial message
- Drive-by-wire
- Data-above-voice
- Personally identifiable information
- Incident
- Ballot stuffing
- Bounded rationality
- Context-based services
- Low-power communication device
- Passive electronic protective measures
- Cyberfighter
- Computer software component
- Written description
- Network enterprise center
- Spectrum capacity
- Migration system
- Baked-in security
- Sensor network
- Golden Master
- Swatting
- Conformance Testing Standards
- Classification category
- Apportionment of profits
- Dual control
- Data communication
- Discretionary access control
- Enforcement
- Parallel port
- Credit reporting agency
- Automated license plate recognition information
- Synchronous transmission
- Undue prejudice
- Intermediate copying
- Link juice
- Phase
- Minigame
- Overlay auction
- Information exchange
- Judgment
- Neurocomputation
- Data communications port
- Close surveillance
- Multiple award schedule program
- Resource change
- Trash folder
- Input signal
- Bag
- Permissive counterclaim
- Capacity
- File Manager
- Telephone switch
- E‐Care
- IDentifier
- Value Proposition
- Iterative reproduction
- Intelligence discipline
- Automatic declassification
- MASK
- Smartphone data attack scenario
- Logic circuit
- B2B exchange
- Open government data
- Packet
- DNA record
- Positive analysis
- Data unit
- Electronic business
- Self insurance
- Ionospheric disturbance
- Command
- Internet security protocol
- Password sniffer
- Competitor
- Know your customer
- Freely redistributable
- Airborne communications node
- Non-rivalrous
- Backlog
- Bill of lading
- Mobile code
- Acceptance testing
- Senior Agency Official for Privacy
- Mosaic
- Agile enterprise
- Data Manipulation Language
- Open protocol
- Accrediting authority
- Test facility
- Character generator
- Shared drive
- Electronic counter-countermeasures
- Back arrow
- Testbed
- Digital library
- Advanced Metering Infrastructure
- Crime reports data
- Persistent cookie
- Recording format
- Critical technology
- Computer security program manager
- Passive RFID system
- Music Pirate
- Shared folder
- Pull
- Disposition authority
- Index token
- Content regulation
- Proof of possession protocol
- PKI software
- Electronic voting
- Freedom of Information
- Database vendor
- Program optimizer
- Impact assessment
- Foresighting
- Trace
- Enhanced television
- Close-access cyberattack
- Dynamic visibility
- Social marketing
- Java class libraries
- Bit length
- Acquired rights jurisdiction
- Processing power
- Psychological effect
- Norms
- Unscheduled records
- Two-factor authentication using HSPD-12
- Statute of limitations
- Protected speech
- Spins
- Validity
- Network diagram
- Domain name registration application
- Bottom Unmanned Undersea Vehicle (UUV) Localization System
- Credential management
- Fisking
- Access National Agency Check with Inquiries
- Alpha testing
- E-strategy
- Macro virus
- Privacy-enhancing
- Transmitter
- Handwriting recognition
- DO-178B
- Reasonable price
- Lack of input validation
- Positive intelligence
- Contractor Performance Assessment Report
- Data item definition
- Computer videogame
- On-demand supercomputing
- IP-based network
- National Response Coordination Center
- Web of trust
- Open security environment
- Percentage of successful requests
- Featured musician
- Security assurance
- E-mail archiving
- Monitoring technology
- Kludge
- Application access
- Method of operation
- Unmanned ground system
- Counterespionage
- Hoax email
- Cybersignal
- Alterable contract terms
- Wireless Security
- Preaward survey
- Internal storage
- Electronic messaging services
- Country-code top-level domain
- Aliasing
- Service recipient
- Sell in
- Inter partes review
- Super-high frequency
- Blogware
- Federal Law
- Live website
- Term of art
- Biorobotics
- Syndicated program
- Crypto-equipment
- Central Server
- Asymmetric warfare
- Anti-communications warfare
- Contracting Officer's Technical Representative
- Business process reengineering
|