Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Glossary

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z  |  Symbols
l
L2CAP
L2F
L2TP
L2VPN
L3VPN
Label
Labeled Security Protections
Laboratory Attack (C.F.D.)
LACNIC
LAN
Land Mobile Radio
Lane
Lane(i, j)
Lanmanager
Last Mile Broadband Access
Last Numbers Dialed
Latency
Latin America And The Caribbean Network Information Centre
Latin American And Caribbean Ip Address Regional Registry
Law Enforcement Officer
Lawful Government Purpose
Laws And Regulations
Layer 2 Forwarding
Layer 2 Tunneling Protocol
Layer 2 Vpn
Layer 3 Vpn
Layered Cots Product Solutions
L-bit Hash Function
LCC
LCD
LCM (a, b)
LCM(a, b)
LCMS
LDA
LDAP
LE
Learning
Learning Continuum
Learning Objective
Least Common Multiple
Least Privilege
Least Significant Bit
Least Significant Bit(s)
Least Trust
LED
leftmost (V, a)
Legacy BIOS
Legacy Environment
Legacy-Use
Len
len (a)
len(x)
Length In Bits Of A Non-Negative Integer X
Length in bytes of a non-negative integer, x
LEO
Level Of Assurance
Level Of Significance (α)
LF
LFSR
Life Cycle
Life Cycle Cost
Life-Cycle Costs
Light Emitting Diode
Light Tower
Lightweight Directory Access Protocol
Likelihood
Likelihood Of Occurrence
Likert Scale
Limited Maintenance
Limited User Account
Line Conditioning
Line Conduction
Line Of Business
Line Of Sight
Linear Dependence
Linear Feedback Shift Register
Line-Of-Sight Signal Propagation
Lines Of Business
Link
Link Encryption
Link MTU
Linkable Information
Linked Information
Link-Local (IPv6 Scope)
Liquid Crystal Display
LIR
LISP
Live Entropy Source
LKM
LM
LMD
LMR
LND
LOA
Loadable Kernel Module
LOC
Local Access
Local Area Network
Local Authority
Local Authorization
local COMSEC management software
Local Delivery Agent
Local Element
Local Internet Registry
Local Management Device
Local Registration Authority
Location
Location Information
Locator/ID Separation Protocol
LOCI
Lock Command
Lock Pointer
loc-RIB
Log
Log Analysis
Log Archival
Log Clearing
Log Compression
Log Conversion
Log Entry
Log File Integrity Checking
Log Management
Log Management Infrastructure
Log Normalization
Log Parsing
Log Preservation
Log Reduction
Log Reporting
Log Retention
Log Rotation
Log Viewing
log2(x)
Logic Bomb
Logical Access Control System
Logical Backup
Logical Link Control And Adaptation Protocol
Logical Object
Logical Partitioning
Logical Perimeter
Logical Volume
Logo
Long Term Evolution
Long Title
Longitudinal Redundancy Code
Long-Term Credentials
Long-Term Evolution
Long-Term Key
Loop-Back Mode
LOS
Low Energy
Low Frequency
Low Impact
Low Impact System
Low Pin Count
Low Probability Of Detection
Low Probability Of Intercept
Low Probability Of Positioning
Lower Layer
Low-Impact System
Low-Power Transmitter
LPC
LPD
LPI
LRA
LRC
LSB
LTE
LTK
LUA