Term
|
Definition
High-speed transmission. The term commonly refers to Internet access via cable and DSL |
|
|
Term
VPN (virtual private network) |
|
Definition
A private network that is configured within a public network (a carrier's network or the Internet) to provide connections that allow mobile users to dial up their company LANs |
|
|
Term
TCP/IP (Transfer Control Protocol) (Internet Protocol) |
|
Definition
Standard Internet communications protocols that collects and reassembles the packets of data, while __ is responsible for making sure the packets are sent to the right destination |
|
|
Term
|
Definition
A numerical identification and logical address that is assigned to devices participating in a computer network using IP for communication |
|
|
Term
|
Definition
Computer networks that usually cover a limited range with the primary usage as the sharing of hardware, software, or information files |
|
|
Term
|
Definition
Verifying the identity of a user logging onto a network. Passwords, digital certificates, smart cards and biometrics can be used to prove the identity of the client to the network |
|
|
Term
|
Definition
The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information |
|
|
Term
|
Definition
Unsolicited e-mail, often of a commercial nature, sent indiscriminately to multiple mailing lists, individuals, or newsgroups; junk e-mail. |
|
|
Term
PGP (Pretty Good Privacy) |
|
Definition
A data encryption program for encrypting e-mail messages and securing files |
|
|
Term
FTP (File Transfer Protocol) |
|
Definition
A protocol used to transfer files over a TCP/IP network (Internet, Unix, etc) |
|
|
Term
|
Definition
A program routine that destroys data when certain conditions are met; for example, it may reformat the hard disk or insert random bits into data files on a certain date or if a particular employee record is missing from the employee database. Most viruses are __ because they deliver their payload after a specific latency or when a trigger event occurs. |
|
|
Term
|
Definition
A dedicated server or a service within a server that provides __ name resolution in an IP network. It turns names for Web sites and network resources into numeric IP addresses. __ servers are used in large companies, in all ISPs and within the __ system in the Internet, a vital service that keeps the Internet working. |
|
|
Term
NLR (National LambdaRail) |
|
Definition
A high-speed national computer network that runs over fiber-optic lines, and is the first transcontinental Ethernet network (it is a university-based and -owned initiative) |
|
|
Term
|
Definition
In the context of information science and information retrieval, __ denotes how well a retrieved set of documents (or a single document) meets the information need of the user. |
|
|
Term
|
Definition
A computer program that is designed to replicate itself by copying itself into the other programs stored in a computer |
|
|
Term
|
Definition
A network that is used for sharing content files in digital format among peer participants |
|
|
Term
PKI (Public Key Infrastructure) |
|
Definition
A framework for creating a secure method for exchanging information using digital certificates that authenticate the identity of organizations and individuals |
|
|
Term
|
Definition
A self-replicating virus that does not alter files but resides in active memory and duplicates itself |
|
|
Term
|
Definition
A system designed to prevent unauthorized access to or from a private network. Can be implemented in both hardware and software, or a combination of both |
|
|
Term
|
Definition
Condition where the data transferred to a buffer exceeds the storage capacity of the buffer |
|
|
Term
|
Definition
It is the phenomenon in which free storage becomes divided into many small pieces over time; refers to the fact that the unusable storage is outside the allocated regions |
|
|
Term
|
Definition
Applies to wireless LANs and provides 20+ Mbps in the 2.4 GHz band. 802.11 refers to a family of specifications developed by the IEEE for wireless LAN technology |
|
|
Term
|
Definition
One or more packets are delayed in transit, so the incoming message cannot be assembled. The user must click Reload or Refresh to request that the file be transmitted again |
|
|
Term
|
Definition
Computer files containing details of amendments to records, which may be used in the event of system recovery being required |
|
|
Term
|
Definition
The reversible transformation of data from the original (the plaintext) to a difficult-to-interpret format (the ciphertext) as a mechanism for protecting its confidentiality, integrity and sometimes its authenticity. __- uses an __ algorithm and one or more __ keys. |
|
|
Term
|
Definition
The quality of correctness, completeness, wholeness, soundness and compliance with the intention of the creators of the data |
|
|
Term
|
Definition
The part of a network that handles the major traffic. It employs the highest-speed transmission paths in the network and may also run the longest distances. Smaller networks are attached to the __, and networks that directly connect to the end user or customer are called "access networks." |
|
|
Term
|
Definition
A network device that filters and forwards packets between LAN segments and operates at the data link layer and sometimes the network layer |
|
|
Term
|
Definition
A password that is difficult to detect by both humans and computer programs, effectively protecting data from unauthorized access |
|
|
Term
|
Definition
The act of obtaining or attempting to obtain otherwise secure data by conning an individual into revealing secure information |
|
|
Term
|
Definition
Used typically in reference to a computer language to mean a command or statement in the language that is going to be made invalid or obsolete in future versions |
|
|
Term
|
Definition
A ___ is a small piece of text stored on a user's computer by a web browser. A ___ consists of one or more name-value pairs containing bits of information. The __ is sent as an HTTP header by a web server to a web browser and then sent back unchanged by the browser each time it accesses that server. A ___ can be used for authentication, session tracking (state maintenance), storing site preferences, shopping cart contents, the identifier for a server-based session, or anything else that can be accomplished through storing textual data. As text, __ are not executable. Because they are not executed, they cannot replicate themselves and are not viruses. Due to the browser mechanism to set and read __, they can be used as spyware. Anti-spyware products may warn users about some cookies because __ can be used to track people or violate privacy concerns. |
|
|
Term
|
Definition
The accessibility of a system resource in a timely manner; for example, the measurement of a system's uptime. __ is one of the six fundamental components of information security. |
|
|
Term
|
Definition
a widely used Wi-Fi wireless communication standard, giving 100 Mbps at 2.4GHz |
|
|
Term
|
Definition
A device that forwards data packets along networks. A ___ is connected to at least two networks, commonly two LANs or WANs or a LAN and its ISP?s network. __ are located at gateways, the places where two or more networks connect.___ use headers and forwarding tables to determine the best path for forwarding the packets, and they use protocols such as ICMP to communicate with each other and configure the best route between any two hosts. |
|
|
Term
|
Definition
A __ file stores metadata used for __. It is defined in the __ specification. A __ file contains the URLs of multiple trackers and integrity metadata about all the pieces. It can also contain additional metadata defined in extensions to the __ specification __ is a file distribution system used for transferring files across a network of people. As you download a file, __ places what you download on upload for other users; when multiple people are downloading the same file at the same time they upload pieces of the file to each other. __ pieces together the file you are downloading, to where the first part of a file you get may be the last part someone else gets. As you continue to retrieve the file, __ also uploads data to other users. |
|
|
Term
|
Definition
Restrictions on the accessibility and dissemination of information. ___ is one of the six fundamental components of information security |
|
|
Term
|
Definition
___ is an advanced networking consortium led by the research and education community… ___ operates the ___ Network, a next-generation Internet Protocol and optical network that delivers production network services to meet the high-performance demands of research and education, and provides a secure network testing and research environment. In late 2007, ___ began operating its newest dynamic circuit network, the ___ DCN, an advanced technology that allows user-based allocation of high-capacity data circuits over the fiber-optic network. The ___ community is actively engaged in developing and deploying emerging network technologies beyond the scope of single institutions and critical to the future of the Internet. These technologies include large-scale network performance measurement and management tools, simple and secure identity and access management tools and advanced capabilities such as the on-demand creation and scheduling of high-bandwidth, high-performance circuits |
|
|
Term
|
Definition
A network __ or repeater __ is a device for connecting multiple twisted pair or fiber optic Ethernet devices together and making them act as a single network segment. ___ work at the physical layer (layer 1) of the OSI model. The device is a form of multiport repeater. Repeater __ also participate in collision detection, forwarding a jam signal to all ports if it detects a collision |
|
|
Term
|
Definition
A __ is the basic unit of information in computing and telecommunications; it is the amount of information that can be stored by a device or other physical system that can normally exist in only two distinct states |
|
|