АБВГДЕЖЗИКЛМНОПРСТУФХЦЧШЭЯ ABCDEFGHIKLMNOPQRSTUVWZ Unauthorized accessUnauthorized access to informationUnauthorized userUnclassified informationUnconditionally secure authentication codeUnconditionally secure cryptosystemUndeniable digital signatureUndeniable signature schemeUnicity distanceUnified threat management (UTM)Unintentional denial-of-serviceUniversal forgeryUnknown key share attack resistanceUnlinkabilityUnpublished vulnerabilityUnstructured dataUnsupervised machine learningUntraceabilityUntracebilityUntrusted networkUpstreamURL filtering (URLF)UserUser agentUser and entity behavior analytics (UEBA)User authenticationUser dataUser identification in an information systemUser limitUser of signature verification key certificateUserInfo endpointUser’s behavior limit