Term
|
Definition
| Microsofts directory service, which is a central database of all network resources and is used to manage the network and provide users with access to resources. |
|
|
Term
|
Definition
| A set of technologies developed by Microsoft that specifies how applications should share information. |
|
|
Term
|
Definition
| A specific way of implementing ActiveX; also called add-ons. |
|
|
Term
|
Definition
| A specific way of implementing ActiveX; also called ActiveX controls. |
|
|
Term
| Address Space Layout Randomization (ASLK) |
|
Definition
| A Windows Vista feature that randomly assigns executable operating system code to different possible locations in memory. |
|
|
Term
|
Definition
| Software that helps prevent computers from becoming infected by different types of spyware. |
|
|
Term
|
Definition
| Software that can scan a computer for infections as well as monitor computer activity and scan all new documents, such as e-mail attachments, that might contain a virus. |
|
|
Term
| Automated patch update service |
|
Definition
| A locally managed patch update service that is used to distribute patches instead of relying upon the vendors online update service. |
|
|
Term
|
Definition
| An advanced method for detecting spam. |
|
|
Term
|
Definition
| A type of P2P network that maximizes transfer speeds by gathering pieces of a tile and downloading them separately. |
|
|
Term
|
Definition
| A list of senders for which the user does not want to receive any e-mail. |
|
|
Term
|
Definition
| A process that attempts to store data in random access memory (RAM) beyond the boundaries of a fixed length storage buffer. |
|
|
Term
|
Definition
| Instant messaging between several users simultaneously. |
|
|
Term
|
Definition
| Operating system configurations settings that will be used for each computer in the organization. |
|
|
Term
|
Definition
| User-specific information stored in a file on the users local computer by a Web browser~ |
|
|
Term
| Cross site scripting (XSS) |
|
Definition
| Using client-side scripts typically written in JavaScript that are designed to extract information from the victim and then pass the information to the attacker |
|
|
Term
| Data Execution Prevention (DEP) |
|
Definition
| A Windows feature that uses a CPUs ability to mark sections of a computers memory as exclusively for data and not for code. |
|
|
Term
|
Definition
| Antivirus update files; also known as signature files. |
|
|
Term
|
Definition
| Hardware or software designed to prevent malicious packers from entering or leaving the computers; sometimes called a packet filter. |
|
|
Term
|
Definition
| A cookie that is created from the Web site that a user is currently viewing. |
|
|
Term
|
Definition
| A Microsoft Windows feature that provides centralized management and configuration of computers. |
|
|
Term
| Host Intrusion Detection Systems (HIDS) |
|
Definition
| Software that attempts to monitor and possibly prevent attempts to intrude into a system and network resources. |
|
|
Term
|
Definition
| A software update that addresses a specific customer situation and often may nor he distributed outside that customers organization. |
|
|
Term
|
Definition
| The current version of Internet Mail Access Protocol (IMAP). Input validation Verifying user input. |
|
|
Term
|
Definition
| Real-time communication between two or more users. |
|
|
Term
| Internet Mail Access Protocol (IMAP) |
|
Definition
| An advanced e-mail protocol. IMAP4 is the current version. |
|
|
Term
|
Definition
| A complete object-oriented programming language created by Sun Microsystems and can be used to create standalone applications. |
|
|
Term
|
Definition
| A type of smaller Java program. |
|
|
Term
|
Definition
| A programming scripting language developed by Netscape. |
|
|
Term
|
Definition
| Part of the operating system that is responsible for managing the system resources. |
|
|
Term
| MX (mall exchange) record |
|
Definition
| An entry in the Domain Name System (DNS) that identifies the mail server responsible for handling that domain name. |
|
|
Term
|
Definition
| A bit setting to designate a part of memory to contain only data, not executable code. |
|
|
Term
|
Definition
| Another name for a firewall. |
|
|
Term
|
Definition
| A general software security update intended to cover vulnerabilities that have been discovered. |
|
|
Term
| Peer-to-peer (P2P) network |
|
Definition
| A direct connection between users. |
|
|
Term
| Personal software firewall |
|
Definition
| Software that runs as a program on a local system to protect it against attacks. |
|
|
Term
|
Definition
| The current version of Post Office Protocol (POP). |
|
|
Term
|
Definition
| A small Web browser window that appears over the Web site that is being viewed. |
|
|
Term
|
Definition
| Either a separate program or a feature incorporated within a browser to stop popups. |
|
|
Term
| Post Office Protocol (POP) |
|
Definition
| The TCP/IP protocol that handles incoming mail, POP3 is the current version. |
|
|
Term
|
Definition
| A restrictive fence that surrounds a Java program and keeps it away from private data and other resources on a local computer. |
|
|
Term
|
Definition
| A computer programming language that is typically interpreted into a language the computer can understand without the need of a compiler. |
|
|
Term
|
Definition
| A document or series of documents that clearly defines the defense mechanisms an organization will employ in order to keep information secure. |
|
|
Term
|
Definition
| A method to configure a suite of configuration baseline security settings |
|
|
Term
|
Definition
| A cumulative package of all security updates plus additional features. |
|
|
Term
|
Definition
| Antivirus update files; also known as definition files. |
|
|
Term
|
Definition
| A Java applet from a trusted source. |
|
|
Term
| Simple Mail Transfer Protocol (SMTP) |
|
Definition
| The TCP/IP protocol that handles outgoing mail. SMTP open relay An uncontrolled SMTP relay. |
|
|
Term
|
Definition
| Forwarding e-mail sent from an e-mail client to a remote domain through an SMTP server. |
|
|
Term
|
Definition
| A software module that provides administrative capabilities for a device. |
|
|
Term
|
Definition
| An injection attack that uses Structured Query Language. |
|
|
Term
|
Definition
| Downloading parts of a BitTorrent file simultaneously from multiple users. |
|
|
Term
|
Definition
| A cookie that is used by a Web site other than the site that created it. |
|
|
Term
|
Definition
| Active Internet connections that download a specific file through BirTorrent. |
|
|
Term
|
Definition
| A server program operated by the person or organization who wants to share a BirTorrent file. |
|
|
Term
|
Definition
| A Java applet that does not come from a trusted source. |
|
|
Term
|
Definition
| A list of senders for which the user will accept e-mail. |
|
|