Term
|
Definition
Microsoft's technology for writing small applications that perform actions in Web pages. |
|
|
Term
|
Definition
A program that searches for and erases spyware from a user's computer. Some of them also prevent the browser from opening pop-up windows and displaying advertisements. |
|
|
Term
|
Definition
A general classification of browser extensions that includes tools to enhance your browsing experience, such as toolbars that let you access a search engine without opening its Web site, or programs that block pop-up ads and additional browser windows from opening when you view a Web site. |
|
|
Term
|
Definition
A category of software that displays advertisements to help pay for the program. |
|
|
Term
|
Definition
A formula or set of steps to solve a particular problem. |
|
|
Term
|
Definition
A form of encryption that uses two different keys, a public key known to everyone and a private or secret key known only to the person who owns both keys. Also called public-key encryption. |
|
|
Term
|
Definition
A general term for the process of verifying the identity of a source or sender of a message. |
|
|
Term
|
Definition
A browser extension that plays sound files stored in various formats on the Internet and on many wireless devices. |
|
|
Term
|
Definition
Applications that allow a Web browser to perform tasks it was not originally designed to perform, such as playing sound and video files. |
|
|
Term
|
Definition
The process by which a cracker uses a program to enter character combinations until the system accepts a user name and password, thereby gaining access to the system. |
|
|
Term
|
Definition
A temporary storage area in a computer's memory. |
|
|
Term
|
Definition
A feature by which music is downloaded and queued for play when the transfer/play rate exceeds your modem's speed so you do not have to wait for your browser to download the entire file. |
|
|
Term
certificate authority (CA) |
|
Definition
A trusted third party that verifies the identity of a person or organization in theprocess of issuing a digital certificate. |
|
|
Term
|
Definition
|
|
Term
|
Definition
A record of the links clicked by a user while visiting a Web site. |
|
|
Term
|
Definition
The protection of assets using non-physical means. Also called logical security. |
|
|
Term
|
Definition
The general name for a procedure, either physical or logical, that recognizes, reduces, or eliminates a threat. |
|
|
Term
|
Definition
A slang term for a person who uses his knowledge of computers and programming to gain unauthorized access to a computer for the purpose of stealing or altering data. |
|
|
Term
|
Definition
The process of transforming data from a readable format (plain text) to an unreadable format (cipher text). |
|
|
Term
|
Definition
The process of reversing encrypted text into a readable format. |
|
|
Term
denial of service (DoS) attack |
|
Definition
A security threat wherein a cracker bombards a server or other computer with messages in an attempt to consume the network's bandwidth resources, effectively disabling the organization's communications. Also called packet flooding attack. |
|
|
Term
|
Definition
An encrypted and password-protected file that contains sufficient information to authenticate and prove a person's or organization's identity. |
|
|
Term
|
Definition
An electronic file that you purchase from a certificate authority and install into a program that uses it, such as an e-mail program or Web browser. Also called a personal certificate. |
|
|
Term
|
Definition
A process that inserts a digital pattern containing copyright information into a digital image, animation, or audio or video file. It is inserted ito the file using a software program so that it is invisible and undetectable. To the it, a software program unlocks it, retrieving the information it stores. |
|
|
Term
|
Definition
A way of scrambling and encoding data transmissions that reduces the risk that a person who intercepts the Web page as it travels across the Internet will be able to decode and read the transmission's contents. |
|
|
Term
|
Definition
An open standard being developed by the Web3D Consortium that lets a developer create 3D worlds. |
|
|
Term
|
Definition
A software program or hardware device that controls access between two networks, such as a local area network and the Internet or the Internet and a computer. |
|
|
Term
|
Definition
A browser plug-in that displays simple animations, user interfaces, static graphics, movies, sound, and text that was created using Macromedia Flash software. |
|
|
Term
hash code function program |
|
Definition
A program that maintains the integrity of an e-mail message by producing a unique identifying code called a message authentication code (MAC). Also called message digest function program. |
|
|
Term
|
Definition
A program installed on a user's computer that the browser starts and uses to "help" display or play a file. |
|
|
Term
|
Definition
A security measure that prevents unauthorized data modification. |
|
|
Term
|
Definition
A small program written in the Java programming language. |
|
|
Term
|
Definition
A small program that can be executed without first being compiled into computer-readable codes. |
|
|
Term
|
Definition
The protection of assets using non-physical means. Also called computer security. |
|
|
Term
|
Definition
The process of identifying yourself to a computer with a user name and password. |
|
|
Term
message authentication code (MAC) |
|
Definition
A unique number that a message digest function program uses to maintain the integrity of an e-mail message. |
|
|
Term
message digest function program |
|
Definition
A program that maintains the integrity of an e-mail message by producing a unique identifying code called a message authentication code (MAC). Also called hash code function program. |
|
|
Term
|
Definition
Security measures that prevent data delays (slowing down the transmission of data) or denials (preventing data from getting to its destination). |
|
|
Term
|
Definition
A security threat wherein a cracker bombards a server or other computer with messages in an attempt to consume the network's bandwidth resources, effectively disabling the organization's communications. Also called denial of service (DoS) attack. |
|
|
Term
|
Definition
A program that stores login information in an encrypted form on the user's hard drive. |
|
|
Term
|
Definition
An electronic file that you purchase from a certificate authority and install into a program that uses it, such as an e-mail program or Web browser. Also called a digital ID. |
|
|
Term
|
Definition
A computer attack in which e-mail messages claiming to be from a legitimate business direct recipients to a spoofed Web site where the recipient is directed to provide sensitive information so the spoofed Web site can steal the recipient's personal information. |
|
|
Term
|
Definition
Tangible devices, such as locks, alarms, fireproof doors, security fences, safes or vaults, and bombproof buildings, that protect assets from unauthorized access, use, alteration, or destruction. |
|
|
Term
|
Definition
|
|
Term
|
Definition
A program that is a software extension of a Web browser. |
|
|
Term
|
Definition
A virtual door on a computer that permits traffic to enter and leave the computer. Different types of these handle different forms of communication between a computer and a network or devices, such as a printer. |
|
|
Term
|
Definition
The process that occurs when one computer tests all or some of the ports of another computer to determine whether its ports are open (traffic is not filtered and the port permits entry through it), closed (the port does not accept traffic, but a cracker could use this port to gain entry to and analyze the computer), or stealth (the port might be open or closed, but permits no entry through it). |
|
|
Term
|
Definition
In the context or encryption, the key known only to its owner. Also called a secret key. |
|
|
Term
|
Definition
A form of encryption that uses a single key that is known by both the sender and receiver. Also called symmetric encryption. |
|
|
Term
|
Definition
In the context of encryption, the key known to everyone. |
|
|
Term
|
Definition
A form of encryption that uses two different keys, a public key known to everyone and a private or secret key known only to the person who owns both keys. Also called asymmetric encryption. |
|
|
Term
|
Definition
A browser extension that plays video, sound, music, 3-D, and virtual reality on Macintoshes, PCs, and wireless devices. |
|
|
Term
|
Definition
A browser plug-in that plays streaming audio and video files. |
|
|
Term
|
Definition
Security measures that prevent unauthorized data disclosure and ensure the authenticity of the data's source. |
|
|
Term
|
Definition
In the context of encryption, the key known only to its owner. Also called a private key. |
|
|
Term
Secure Sockets Layer (SSL) |
|
Definition
A widely used protocol that acts as a separate layer or "secure channel" on top of the TCP/IP Internet protocol. It provides a security "handshake" when a browser and a Web site want to participate in a secure connection. |
|
|
Term
Secure/Multipurpose Internet Mail Extensions (S/MIME) |
|
Definition
A specification which, when combined with a person's digital ID, provides authentication and encryption to e-mail messages. |
|
|
Term
|
Definition
The protection of assets from unauthorized access, use, alteration, or destruction. |
|
|
Term
|
Definition
Authentication for a Wev site's users that proves the site's identity. It also ensures users that the transfer of data between a user's computer and the server with the certificate is encrypted so that it is both tamperproof and free from being intercepted. |
|
|
Term
|
Definition
A temporary key used in the encryption process to ensure a secure connection. |
|
|
Term
|
Definition
A browser extension that provides animated three-dimensional interfaces, interactive advertisements and product demonstrations, multi-user games, streaming CD-quality audio, and video that was created using Macromedia Director software. |
|
|
Term
|
Definition
Software that covertly gathers information about a person or his click stream and sends that information to a third party, often a marketing or research firm. |
|
|
Term
|
Definition
A process that hides an encrypted message within different types of files. |
|
|
Term
|
Definition
An encryption key that is 128 bits long. |
|
|
Term
|
Definition
A form of encryption that uses a single key that is known by both the sender and the receiver. Also called private-key encryption. |
|
|
Term
|
Definition
Any act or object that endangers an asset. |
|
|
Term
|
Definition
A small program hidden inside another program that is created with the intent of causing damage. |
|
|
Term
|
Definition
The process of associating a person and his identification with a very high level of assurance. |
|
|
Term
|
Definition
The process of identifying yourself to a computer, usually by entering a user name and password known only to you. |
|
|
Term
Virtual Reality Modeling Language (VRML) |
|
Definition
An Internet programming language that creates three-dimensional environments that can mimic known words or defined fictional ones. |
|
|
Term
|
Definition
A small, hidden graphic on a Web page or in an e-mail message that is designed to work in conjunction with a cookie to obtain information about the person viewing the page or e-mail message and to send that information to a third party. Also called a clear GIF or a transparent GIF. |
|
|
Term
|
Definition
A program launched by Robert Morris in 1988 that used weaknesses in e-mail programs and operating systems to distribute itself to some of the computers that were then connected to the Internet. The program created multiple copies of itself on the computers it infected, which then consumed the processing power of the infected computers and prevented them from running other programs. |
|
|