Term
|
Definition
Microsofts technology for writing small applications that perform actions in web pages |
|
|
Term
|
Definition
a program that searches for and erases spyware from a user's computer |
|
|
Term
|
Definition
a general classification of browser extentions that includes tools to enhance your browsing experience |
|
|
Term
|
Definition
a category of software that displays advertisements to help pay for the program |
|
|
Term
|
Definition
a formula or set of steps to solve a particular problem |
|
|
Term
|
Definition
A form of encryption that uses two different keys, a public key known to everyone and a private or secret key known only to the person who owns both keys |
|
|
Term
|
Definition
a general term for the process of verifying the indentity of a source or sender of a message |
|
|
Term
|
Definition
A browser extention that plays sound files stored in various places on the internet and on many wireless devices |
|
|
Term
|
Definition
applictations that allow a web browser to perform tasks it was not originally designed to perform |
|
|
Term
|
Definition
the process by which a cracker uses a program to enter character combinations until the system accepts a user name and password |
|
|
Term
|
Definition
a temporary storage area in a comuputer's memory |
|
|
Term
|
Definition
a feature by which music is downloaded and qued for play when the transfer play rate exceeds your modem's |
|
|
Term
(CA) Certificate Authority |
|
Definition
a trusted third party that verifies the identity of a person or organization in the process of inssuing a digital certificate |
|
|
Term
|
Definition
|
|
Term
|
Definition
A record of the links clicked by a user while visiting a Web site |
|
|
Term
|
Definition
the protection of assets using non-physical means |
|
|
Term
|
Definition
The general name for a procedure, either physical or logical, that recognizes, reduces or eliminates a threat |
|
|
Term
|
Definition
a slang term for a person who uses his knowledge of computers and programming to gain unauthorized access to a computer for the purpose of stealing or altering data |
|
|
Term
|
Definition
the process of transforming data from a readable format to an unreadable format |
|
|
Term
|
Definition
The process of reversing encrypted text into a readable format |
|
|
Term
Denial of Service (DoS) attack |
|
Definition
A security threat wherein a cracker bombards a server or other computer with messages in an attempt to consume the network's bandwidth resources, effectively disabling the organization's communicatons |
|
|
Term
|
Definition
an encrypted and password protected file that contains sufficient information to authenticate and prove a person's or oganization's identity |
|
|
Term
|
Definition
An electronic file that you purchase from a certificate authority and install into a program that uses it, such as an e-mail program or web browser |
|
|
Term
|
Definition
a process that inserts a digital pattern containing copyright information into a digital image, animation or audio or video file |
|
|
Term
|
Definition
a way of scrambling and encoding data transmissions that reduces the risk that a person who intercepts the Web page as it travels across the internet will be able to decode and read the transmission's contents |
|
|
Term
|
Definition
An open standard being developed by the Web3D consortium that lets a developer create 3D worlds |
|
|
Term
|
Definition
a software program or hardware device that controls access between two networks, such as a local area network and the internet or the internet and a comupter. |
|
|
Term
|
Definition
A browser plug-in that displays simple animations, user interfaces, static graphics, movies, sound, and text that was created using Macromedia Flash software. |
|
|
Term
hash code function program |
|
Definition
a program that maintains the integrity of an e-mail message by producing a unique identifying code called a message authentication code |
|
|
Term
|
Definition
A program installed on a user's computer that the browser starts and uses to "help" display or play a file |
|
|
Term
|
Definition
A security measure that prevents unauthorized data modification. |
|
|
Term
|
Definition
A small program written in the Java programming language |
|
|
Term
|
Definition
A small program that can be executed without first being compiled into computer-readable codes |
|
|
Term
|
Definition
The protection of assets using non-physical means |
|
|
Term
|
Definition
The process of identifying yourself to a computer whith a user name and password. |
|
|
Term
message authentication code (MAC) |
|
Definition
a unique number that a message digest function program uses to maintain the integrity of an e-mail message |
|
|
Term
Message digest function program |
|
Definition
a program that maintains the integrity of an e-mail message by producing a unique identifying code called a message authentication code |
|
|
Term
|
Definition
Security measures that prevent data delays (slowing down the transmission of data) or denials (preventing data from getting to its destination) |
|
|
Term
|
Definition
A security threat wherein a cracker bombards a server or other computer with messages in an attempt to consume a network's bandwidth resources, effectively disabling the organization's communications |
|
|
Term
|
Definition
A program that stores login information in an encrypted form on the user's hard drive |
|
|
Term
|
Definition
An electronic file that you purchase from a certificate authority and install into a program that uses it, such as an e-mail program or Web browser |
|
|
Term
|
Definition
A computer attack in which e-mail messages claiming to be from a legitimate business direct recipients to a spoofed Web site where the recipient is directed to provide senitive information so the spoofed Web site can steal the recipient's personal information. |
|
|
Term
|
Definition
Tangible devices, such as, locks, alarms, fireproof doors, security fences, safes or vaults, and bombproof buildings, that protect assets from unauthorized access, use, alteration, or destruction |
|
|
Term
|
Definition
|
|
Term
|
Definition
A program that is a software extension of a Web browser |
|
|
Term
|
Definition
A virtual door on a computer that permits traffic to enter and leave the computer. Different ports handle different forms of communication between a computer and a network or devices, such as a printer |
|
|
Term
|
Definition
The process that occurs when one computer tests all or some of the ports of another computer to determine whether its ports are open (traffic is not filtered and the port permits entry through it), closed (the port does not accept traffic, but a cracker could use this port to gain entry and analyze the computer), or stealth (the port might be open or closed but permits no entry through it) |
|
|
Term
|
Definition
in the context of encryption, the key known only to its owner |
|
|
Term
|
Definition
A form of encryption that uses a single key that is known by both the sender and the reciever. |
|
|
Term
|
Definition
In the context of encryption, the key known to everyone |
|
|
Term
|
Definition
A form of encryption that uses two different keys, a public key known to everyone and a private or secret key known only to the person who owns both keys. |
|
|
Term
|
Definition
A browser extension that plays video, sound, music, 3-D, and virtual reality on Macintoshes, PC's, and wireless devices. |
|
|
Term
|
Definition
A browser plug-in that plays streaming audio and video files. |
|
|
Term
|
Definition
Security measures that prevent unauthorized data disclosure and ensure the authenticity of the data's source |
|
|
Term
|
Definition
In the context of encryptioin, the key known only to its owner |
|
|
Term
Secure Sockets Layer (SSL) |
|
Definition
A widely used protocol that acts as a separate layer or "secure channel" on top of the TCP/IP Interntet protocol. SSL provides a security "handshake" when a browser and a Web site want to participate in a secure connection |
|
|
Term
Secure/Multipurpose Internet Mail Extentions (S/MIME) |
|
Definition
A specification which, when combined with a person's digital ID, provides authentication and encryption to e-mail messages |
|
|
Term
|
Definition
The protection of assets fro unauthorized acess, use, alteration, or destruction |
|
|
Term
|
Definition
Authentication for a Web site's users that proves the site's identitiy |
|
|
Term
|
Definition
A temporary key used in the encryption process to ensure a secure connection |
|
|
Term
|
Definition
A browser extension that provides animated three dimensional interfaces, interactive advertisements and product demonstrations, multi-user games, streaming CD-quality video that was created using Macromedia Director software |
|
|
Term
|
Definition
software that covertly gathers information about a person or his click stream and sends it to a third party, often a marketing or research firm. |
|
|
Term
|
Definition
A process that hides an encrypted message within different types of files |
|
|
Term
|
Definition
An encryption key that is 128 bits long |
|
|
Term
|
Definition
A form of encryption that uses a single key that is known by both the sender and the reciever |
|
|
Term
|
Definition
any object that endangers an asset |
|
|
Term
|
Definition
A small program hidden inside another program that is created with the intent of causing damage |
|
|
Term
|
Definition
The process of associating a person and his identification with a very high level of assurance |
|
|
Term
|
Definition
The process of identifying yourself to a computer, usually by using a username and password known only to you |
|
|
Term
Virtual Reality Modeling Language (VRML) |
|
Definition
An internet programming language |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|