Term
|
Definition
Programs that are embedded transparently in Web Pages that cause action to occur. |
|
|
Term
|
Definition
An object, or control, that contains programs and properties that are put in Web Pages to perform particular tasks. |
|
|
Term
|
Definition
A program that execute within another program; it cannot execut directly on a computer. |
|
|
Term
Certification Authority (CA) |
|
Definition
A company that issues digital certificates to organziations or individuals. |
|
|
Term
|
Definition
The field responsible for the collection, preservation, and analusis of computer-related evidence. |
|
|
Term
|
Definition
a physcial or logical procedure that recognizes, reduces, or eliminates a threat. |
|
|
Term
|
Definition
The science that studies encrpytionm which is the hiding of messages so that only the sender and reciever can read them. |
|
|
Term
|
Definition
The electronic defacing of an existing web site page. |
|
|
Term
|
Definition
Information that has been decoded. The oppostie of encrypt. |
|
|
Term
Digital Cerfiticate (Digital ID) |
|
Definition
an attachment to an email message or data embedded in a web page that verifies the identity of a sender or website. |
|
|
Term
|
Definition
An encryption message digest. |
|
|
Term
|
Definition
A computer on the Internet that maintains directories that link domain names to IP Addresses. |
|
|
Term
|
Definition
A person or device who is able to listen in on and copy Internet transmissions. |
|
|
Term
|
Definition
The coding of information using a mathematical-based program and secret key, it mkaes a message illgible to casual observers or those without the decoding key. |
|
|
Term
|
Definition
A coputer that provides a defense between one netowrk and another network that coupld pose a threat to the inside network. All traffic to and from the network must pass through this. Only authorize traffic, as defined by the local security policy, is allowed to pass through. |
|
|
Term
|
Definition
a cookie that is placed on the client computer by the web server site. |
|
|
Term
|
Definition
the process used to calculate a number from a message. |
|
|
Term
|
Definition
The category of computer security that addressed the validity of data; confirmation that data has been modified. |
|
|
Term
Instrusion dection System |
|
Definition
A part of a firewall that monitors attempts to log in to servers and analyzes those attempts for patterns that might indicate a cracker's attack is underway. |
|
|
Term
|
Definition
A web browser security feature that limited the actions that can be preformed by a Java applet that has been downloaded from the web. |
|
|
Term
|
Definition
A scripting language developed by Netscape to enable Web page designers to build active content. |
|
|
Term
|
Definition
Pretending to be someone your not or representing a website as an original when it is an imposter. |
|
|
Term
|
Definition
A cookie that exists indefinitely |
|
|
Term
|
Definition
a masquerading attack that combines spam with spoofing. The perpectrator sends millions of spam emails that appear to be an respectable company. The email contrain a link to a web page that is designed to look exactly like the company's site. The victim is encouraged to enter his or her username or password, and sometime credit card information. |
|
|
Term
|
Definition
An application that helps browser to display info but is not part of the browser. |
|
|
Term
Pretty Good Privacy (PGP) |
|
Definition
A popular technology used to implement public-key encryption to protect the privacy of email messages. |
|
|
Term
|
Definition
A single key that is used to encrypt and decrypt messages. |
|
|
Term
|
Definition
One of a pair of mathematically related numeric keys, it is used to encrypt messages and is freely distributed to the public. |
|
|
Term
Secure Sockets Layer (SSL) |
|
Definition
A protocol for transmitting private information securely over the Internet. |
|
|
Term
|
Definition
A written statement describing assets to be protected, the reasons for protecting the assets, the parties responsilbe for proctections, and acceptable and unacceptable behaviors. |
|
|
Term
|
Definition
A cookie that exists only until you shut down your browser. |
|
|
Term
|
Definition
A programs that taps into the Intenet and records information that passes through a router from the data's source to its destination. |
|
|
Term
|
Definition
A connection between a client and server over the Internet in which each transmission of information is independent; no continuous connection is maintained. |
|
|
Term
|
Definition
a cookie that orginiates on a web site other than the site being visited. |
|
|
Term
|
Definition
A network that within/outside a firewall. |
|
|
Term
|
Definition
The practice of placing chalk mark on a building that has an easily entered wireless network. |
|
|
Term
|
Definition
networks attackers who drive around in cars using their wireless-equipped lap top computers to search for unprotected wireless network access points. |
|
|
Term
|
Definition
a program that secretly takes over another computer for the purpose of launching attacks on other computers. |
|
|