gouvernement.lu
guichet.lu
crossgov.lu
Other sites
The Cybersecurity Observatory
About NC3
Work with us
Contact us
Home
Assessment, Testing & Training
Communities, Initiatives & Funding
Advice & Guidance
News
Advice & Guidance
Glossary
learn
Glossary
Understand key cybersecurity terms, from malware types to protective measures.
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
A
Antivirus
Assets
Authentication
Availability
B
Basic criteria for risk analysis
C
Computer Hacks
Confidentiality
Control
Cryptography
Cybercrime
Cybercriminals
D
Data Backups
Data Loss
Defacement
Disinfect machine with a live CD
Disposal
DRP – Disaster Recovery Plan
E
E-Mail
F
Firewall
H
Human Error
I
IDS / IPS
Image Rights
Impact
Integrity
Internet and Copyright
L
Legal Aspects
LuxTrust
M
Malicious Codes
Malicious Websites
N
Network Segmentation
P
Password
Patches
Phishing
Physical Faults
Securing a Fixed Workstation
Physical Theft
R
Recommendations for Securing a File Server
Recommendations to secure a server connected to Internet
Recommendations to secure a Web server
Removable Devices
Risk Processing
S
Update softwares with Secunia PSI
Security Charter
Social Engineering
Spam – Unwanted E-mails
SSL/TLS – Encryption Technologies On The Web
Update softwares with Secunia PSI
T
Threat
V
Virtual Private Networks (VPNs)
Vulnerabilities
W
Web Filter – Proxy
Why Is It Important To Protect Your Computer?
Web of Trust - WOT