Kerberos, 55–58, BC15
key (cryptovariable), 194, BC8
key agreement algorithm, 206
key change, 211
key clustering, 193, BC6
key control, 211
key disposal, 212
key distribution, 211
key escrow, 212
key generation, 211
key installation, 211
key logging, BC15
key management functions, 210–212
key recovery, 212
key storage, 211
keystroke monitoring, 270–271
knowledge-based IDS, 109
knowledge-based systems, 161–162
Known Plaintext Attack (KPA), 218
Krutz, Ronald L. (The CISSP Prep Guide: Gold Edition), 13
KryptoKnight, 59, BC15