Term
|
Definition
| Microsofts technology for writing small applications that perform actions in web pages |
|
|
Term
|
Definition
| a program that searches for and erases spyware from a user's computer |
|
|
Term
|
Definition
| a general classification of browser extentions that includes tools to enhance your browsing experience |
|
|
Term
|
Definition
| a category of software that displays advertisements to help pay for the program |
|
|
Term
|
Definition
| a formula or set of steps to solve a particular problem |
|
|
Term
|
Definition
| A form of encryption that uses two different keys, a public key known to everyone and a private or secret key known only to the person who owns both keys |
|
|
Term
|
Definition
| a general term for the process of verifying the indentity of a source or sender of a message |
|
|
Term
|
Definition
| A browser extention that plays sound files stored in various places on the internet and on many wireless devices |
|
|
Term
|
Definition
| applictations that allow a web browser to perform tasks it was not originally designed to perform |
|
|
Term
|
Definition
| the process by which a cracker uses a program to enter character combinations until the system accepts a user name and password |
|
|
Term
|
Definition
| a temporary storage area in a comuputer's memory |
|
|
Term
|
Definition
| a feature by which music is downloaded and qued for play when the transfer play rate exceeds your modem's |
|
|
Term
| (CA) Certificate Authority |
|
Definition
| a trusted third party that verifies the identity of a person or organization in the process of inssuing a digital certificate |
|
|
Term
|
Definition
|
|
Term
|
Definition
| A record of the links clicked by a user while visiting a Web site |
|
|
Term
|
Definition
| the protection of assets using non-physical means |
|
|
Term
|
Definition
| The general name for a procedure, either physical or logical, that recognizes, reduces or eliminates a threat |
|
|
Term
|
Definition
| a slang term for a person who uses his knowledge of computers and programming to gain unauthorized access to a computer for the purpose of stealing or altering data |
|
|
Term
|
Definition
| the process of transforming data from a readable format to an unreadable format |
|
|
Term
|
Definition
| The process of reversing encrypted text into a readable format |
|
|
Term
| Denial of Service (DoS) attack |
|
Definition
| A security threat wherein a cracker bombards a server or other computer with messages in an attempt to consume the network's bandwidth resources, effectively disabling the organization's communicatons |
|
|
Term
|
Definition
| an encrypted and password protected file that contains sufficient information to authenticate and prove a person's or oganization's identity |
|
|
Term
|
Definition
| An electronic file that you purchase from a certificate authority and install into a program that uses it, such as an e-mail program or web browser |
|
|
Term
|
Definition
| a process that inserts a digital pattern containing copyright information into a digital image, animation or audio or video file |
|
|
Term
|
Definition
| a way of scrambling and encoding data transmissions that reduces the risk that a person who intercepts the Web page as it travels across the internet will be able to decode and read the transmission's contents |
|
|
Term
|
Definition
| An open standard being developed by the Web3D consortium that lets a developer create 3D worlds |
|
|
Term
|
Definition
| a software program or hardware device that controls access between two networks, such as a local area network and the internet or the internet and a comupter. |
|
|
Term
|
Definition
| A browser plug-in that displays simple animations, user interfaces, static graphics, movies, sound, and text that was created using Macromedia Flash software. |
|
|
Term
| hash code function program |
|
Definition
| a program that maintains the integrity of an e-mail message by producing a unique identifying code called a message authentication code |
|
|
Term
|
Definition
| A program installed on a user's computer that the browser starts and uses to "help" display or play a file |
|
|
Term
|
Definition
| A security measure that prevents unauthorized data modification. |
|
|
Term
|
Definition
| A small program written in the Java programming language |
|
|
Term
|
Definition
| A small program that can be executed without first being compiled into computer-readable codes |
|
|
Term
|
Definition
| The protection of assets using non-physical means |
|
|
Term
|
Definition
| The process of identifying yourself to a computer whith a user name and password. |
|
|
Term
| message authentication code (MAC) |
|
Definition
| a unique number that a message digest function program uses to maintain the integrity of an e-mail message |
|
|
Term
| Message digest function program |
|
Definition
| a program that maintains the integrity of an e-mail message by producing a unique identifying code called a message authentication code |
|
|
Term
|
Definition
| Security measures that prevent data delays (slowing down the transmission of data) or denials (preventing data from getting to its destination) |
|
|
Term
|
Definition
| A security threat wherein a cracker bombards a server or other computer with messages in an attempt to consume a network's bandwidth resources, effectively disabling the organization's communications |
|
|
Term
|
Definition
| A program that stores login information in an encrypted form on the user's hard drive |
|
|
Term
|
Definition
| An electronic file that you purchase from a certificate authority and install into a program that uses it, such as an e-mail program or Web browser |
|
|
Term
|
Definition
| A computer attack in which e-mail messages claiming to be from a legitimate business direct recipients to a spoofed Web site where the recipient is directed to provide senitive information so the spoofed Web site can steal the recipient's personal information. |
|
|
Term
|
Definition
| Tangible devices, such as, locks, alarms, fireproof doors, security fences, safes or vaults, and bombproof buildings, that protect assets from unauthorized access, use, alteration, or destruction |
|
|
Term
|
Definition
|
|
Term
|
Definition
| A program that is a software extension of a Web browser |
|
|
Term
|
Definition
| A virtual door on a computer that permits traffic to enter and leave the computer. Different ports handle different forms of communication between a computer and a network or devices, such as a printer |
|
|
Term
|
Definition
| The process that occurs when one computer tests all or some of the ports of another computer to determine whether its ports are open (traffic is not filtered and the port permits entry through it), closed (the port does not accept traffic, but a cracker could use this port to gain entry and analyze the computer), or stealth (the port might be open or closed but permits no entry through it) |
|
|
Term
|
Definition
| in the context of encryption, the key known only to its owner |
|
|
Term
|
Definition
| A form of encryption that uses a single key that is known by both the sender and the reciever. |
|
|
Term
|
Definition
| In the context of encryption, the key known to everyone |
|
|
Term
|
Definition
| A form of encryption that uses two different keys, a public key known to everyone and a private or secret key known only to the person who owns both keys. |
|
|
Term
|
Definition
| A browser extension that plays video, sound, music, 3-D, and virtual reality on Macintoshes, PC's, and wireless devices. |
|
|
Term
|
Definition
| A browser plug-in that plays streaming audio and video files. |
|
|
Term
|
Definition
| Security measures that prevent unauthorized data disclosure and ensure the authenticity of the data's source |
|
|
Term
|
Definition
| In the context of encryptioin, the key known only to its owner |
|
|
Term
| Secure Sockets Layer (SSL) |
|
Definition
| A widely used protocol that acts as a separate layer or "secure channel" on top of the TCP/IP Interntet protocol. SSL provides a security "handshake" when a browser and a Web site want to participate in a secure connection |
|
|
Term
| Secure/Multipurpose Internet Mail Extentions (S/MIME) |
|
Definition
| A specification which, when combined with a person's digital ID, provides authentication and encryption to e-mail messages |
|
|
Term
|
Definition
| The protection of assets fro unauthorized acess, use, alteration, or destruction |
|
|
Term
|
Definition
| Authentication for a Web site's users that proves the site's identitiy |
|
|
Term
|
Definition
| A temporary key used in the encryption process to ensure a secure connection |
|
|
Term
|
Definition
| A browser extension that provides animated three dimensional interfaces, interactive advertisements and product demonstrations, multi-user games, streaming CD-quality video that was created using Macromedia Director software |
|
|
Term
|
Definition
| software that covertly gathers information about a person or his click stream and sends it to a third party, often a marketing or research firm. |
|
|
Term
|
Definition
| A process that hides an encrypted message within different types of files |
|
|
Term
|
Definition
| An encryption key that is 128 bits long |
|
|
Term
|
Definition
| A form of encryption that uses a single key that is known by both the sender and the reciever |
|
|
Term
|
Definition
| any object that endangers an asset |
|
|
Term
|
Definition
| A small program hidden inside another program that is created with the intent of causing damage |
|
|
Term
|
Definition
| The process of associating a person and his identification with a very high level of assurance |
|
|
Term
|
Definition
| The process of identifying yourself to a computer, usually by using a username and password known only to you |
|
|
Term
| Virtual Reality Modeling Language (VRML) |
|
Definition
| An internet programming language |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|