Term
|
Definition
Microsofts directory service, which is a central database of all network resources and is used to manage the network and provide users with access to resources. |
|
|
Term
|
Definition
A set of technologies developed by Microsoft that specifies how applications should share information. |
|
|
Term
|
Definition
A specific way of implementing ActiveX; also called add-ons. |
|
|
Term
|
Definition
A specific way of implementing ActiveX; also called ActiveX controls. |
|
|
Term
Address Space Layout Randomization (ASLK) |
|
Definition
A Windows Vista feature that randomly assigns executable operating system code to different possible locations in memory. |
|
|
Term
|
Definition
Software that helps prevent computers from becoming infected by different types of spyware. |
|
|
Term
|
Definition
Software that can scan a computer for infections as well as monitor computer activity and scan all new documents, such as e-mail attachments, that might contain a virus. |
|
|
Term
Automated patch update service |
|
Definition
A locally managed patch update service that is used to distribute patches instead of relying upon the vendors online update service. |
|
|
Term
|
Definition
An advanced method for detecting spam. |
|
|
Term
|
Definition
A type of P2P network that maximizes transfer speeds by gathering pieces of a tile and downloading them separately. |
|
|
Term
|
Definition
A list of senders for which the user does not want to receive any e-mail. |
|
|
Term
|
Definition
A process that attempts to store data in random access memory (RAM) beyond the boundaries of a fixed length storage buffer. |
|
|
Term
|
Definition
Instant messaging between several users simultaneously. |
|
|
Term
|
Definition
Operating system configurations settings that will be used for each computer in the organization. |
|
|
Term
|
Definition
User-specific information stored in a file on the users local computer by a Web browser~ |
|
|
Term
Cross site scripting (XSS) |
|
Definition
Using client-side scripts typically written in JavaScript that are designed to extract information from the victim and then pass the information to the attacker |
|
|
Term
Data Execution Prevention (DEP) |
|
Definition
A Windows feature that uses a CPUs ability to mark sections of a computers memory as exclusively for data and not for code. |
|
|
Term
|
Definition
Antivirus update files; also known as signature files. |
|
|
Term
|
Definition
Hardware or software designed to prevent malicious packers from entering or leaving the computers; sometimes called a packet filter. |
|
|
Term
|
Definition
A cookie that is created from the Web site that a user is currently viewing. |
|
|
Term
|
Definition
A Microsoft Windows feature that provides centralized management and configuration of computers. |
|
|
Term
Host Intrusion Detection Systems (HIDS) |
|
Definition
Software that attempts to monitor and possibly prevent attempts to intrude into a system and network resources. |
|
|
Term
|
Definition
A software update that addresses a specific customer situation and often may nor he distributed outside that customers organization. |
|
|
Term
|
Definition
The current version of Internet Mail Access Protocol (IMAP). Input validation Verifying user input. |
|
|
Term
|
Definition
Real-time communication between two or more users. |
|
|
Term
Internet Mail Access Protocol (IMAP) |
|
Definition
An advanced e-mail protocol. IMAP4 is the current version. |
|
|
Term
|
Definition
A complete object-oriented programming language created by Sun Microsystems and can be used to create standalone applications. |
|
|
Term
|
Definition
A type of smaller Java program. |
|
|
Term
|
Definition
A programming scripting language developed by Netscape. |
|
|
Term
|
Definition
Part of the operating system that is responsible for managing the system resources. |
|
|
Term
MX (mall exchange) record |
|
Definition
An entry in the Domain Name System (DNS) that identifies the mail server responsible for handling that domain name. |
|
|
Term
|
Definition
A bit setting to designate a part of memory to contain only data, not executable code. |
|
|
Term
|
Definition
Another name for a firewall. |
|
|
Term
|
Definition
A general software security update intended to cover vulnerabilities that have been discovered. |
|
|
Term
Peer-to-peer (P2P) network |
|
Definition
A direct connection between users. |
|
|
Term
Personal software firewall |
|
Definition
Software that runs as a program on a local system to protect it against attacks. |
|
|
Term
|
Definition
The current version of Post Office Protocol (POP). |
|
|
Term
|
Definition
A small Web browser window that appears over the Web site that is being viewed. |
|
|
Term
|
Definition
Either a separate program or a feature incorporated within a browser to stop popups. |
|
|
Term
Post Office Protocol (POP) |
|
Definition
The TCP/IP protocol that handles incoming mail, POP3 is the current version. |
|
|
Term
|
Definition
A restrictive fence that surrounds a Java program and keeps it away from private data and other resources on a local computer. |
|
|
Term
|
Definition
A computer programming language that is typically interpreted into a language the computer can understand without the need of a compiler. |
|
|
Term
|
Definition
A document or series of documents that clearly defines the defense mechanisms an organization will employ in order to keep information secure. |
|
|
Term
|
Definition
A method to configure a suite of configuration baseline security settings |
|
|
Term
|
Definition
A cumulative package of all security updates plus additional features. |
|
|
Term
|
Definition
Antivirus update files; also known as definition files. |
|
|
Term
|
Definition
A Java applet from a trusted source. |
|
|
Term
Simple Mail Transfer Protocol (SMTP) |
|
Definition
The TCP/IP protocol that handles outgoing mail. SMTP open relay An uncontrolled SMTP relay. |
|
|
Term
|
Definition
Forwarding e-mail sent from an e-mail client to a remote domain through an SMTP server. |
|
|
Term
|
Definition
A software module that provides administrative capabilities for a device. |
|
|
Term
|
Definition
An injection attack that uses Structured Query Language. |
|
|
Term
|
Definition
Downloading parts of a BitTorrent file simultaneously from multiple users. |
|
|
Term
|
Definition
A cookie that is used by a Web site other than the site that created it. |
|
|
Term
|
Definition
Active Internet connections that download a specific file through BirTorrent. |
|
|
Term
|
Definition
A server program operated by the person or organization who wants to share a BirTorrent file. |
|
|
Term
|
Definition
A Java applet that does not come from a trusted source. |
|
|
Term
|
Definition
A list of senders for which the user will accept e-mail. |
|
|