K

Kerberos – available free from MIT, this is a network user authentication system based on key distribution (and can be embedded in virtually any other network protocol) that works on both fixed and wireless networks. See website at: web.mit.edu/Kerberos.

Key – is the value used, in conjunction with an algorithm, to encrypt or decrypt data. A key may be either public (see PKI) or private.

Key stroke loggers – software that records key depressions on a computer keyboard; the software can either be installed on the computer (in which case it can be detected by AntiSpyware software) or it can run inside a secret device attached to the computer (in which case AntiSpyware software will not detect it).

Kilobyte – 1,024 bytes.

Get ISO27000 and Information Security: A Combined Glossary now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.