Term
|
Definition
microsoft technonlogy for writing small applications that perform actions in web pages |
|
|
Term
|
Definition
a program that searches and ereases spyware from a user's computer. some ad blockers also prevent the browser from opening pop-ups windows and displaying advertisment |
|
|
Term
|
Definition
a general classicifation of browser extension that includes tools to enhnce your browsing experience, such as toolbars that let you access a search engine without opening its web site, or program that blcoks pop-up ads and additional browsers windows from opening when you view a web site |
|
|
Term
|
Definition
a catagory of software hat displays advertisement to help pay for the program |
|
|
Term
|
Definition
a formula or set of steps to solve a paritcular problem |
|
|
Term
|
Definition
a form of encryption that uses 2 different keys, a public key known to everyone and a provate or secret key known only to the person who owns both keys |
|
|
Term
|
Definition
a general term for the process of verifying the idenity of a source or sender of a message |
|
|
Term
|
Definition
a browser extension that plays sound files stored in various formats on th internet and on many wireless devices |
|
|
Term
|
Definition
application thats allows a web browser to perform tassk it was not origonal designed to perform , such as playing sound or video files |
|
|
Term
|
Definition
the process by which a cracker uses a program to enter character combination until the system accepts a user name and password , thereby gaining access to the system |
|
|
Term
|
Definition
a temporary storage area in a computer's memory |
|
|
Term
|
Definition
a feature by which music is downloaded and queued for play when the transfer/ play rate exceeds you modem's speed so you do not have to wait for your browser to download the enitre file |
|
|
Term
certificate authority(CA) |
|
Definition
a trusted third party that verifies the identity of a person or organization in the process of issuing a digital cetifaction |
|
|
Term
|
Definition
|
|
Term
|
Definition
a record of the link clicked by a user while visiting a web site |
|
|
Term
|
Definition
the protction of assets using non-physical means. |
|
|
Term
|
Definition
the general name foor a procedure, either phusical or logical, that recognizes, redduces, and eliminates a threat |
|
|
Term
|
Definition
a slng for a person who uses his knowledge of computers and programming to gain unauthorized access to a comp for the purpose of stelaing alternat data |
|
|
Term
|
Definition
the process of transforming data from a readable format to a unreadable format |
|
|
Term
|
Definition
the process of reviesing encrypted text into readable format |
|
|
Term
denial of service(DoS) attack |
|
Definition
a security threat wherein in a cracker bombbards a server or other comps with messages in an attemo to consume the networks bandwhich resource effectively disabling the organization's communcations |
|
|
Term
|
Definition
an ecrypted and password protcted file that contains sufficient info to authenticate and prove person's or organizations identity |
|
|
Term
|
Definition
an electronic file that you phurchase from a certificate authority and install into a program that uses it, such as an e-mail program or web browser. |
|
|
Term
|
Definition
a process that inserts a digital pattern containing copyright info into a digital image, animation, or audio video file. |
|
|
Term
|
Definition
a way of scrambling and encoding data transmitted that reduces the risk that a person who interceots the web page as it travels across the internet will be able tro decode and read transmitted contents |
|
|
Term
|
Definition
an open standard being developed but the web3d consortium that lets a developer creat 3D worlds |
|
|
Term
|
Definition
a software program or hardware device that contorls access between two networks, such as a local area network and the internet or the internet and a comp |
|
|
Term
|
Definition
a browser plug-in that displays simple animations, user interface, staic graphics, movies, sound, and text that was created using macromedia flash software |
|
|
Term
hash code function program |
|
Definition
a program that mainmtains the intgerity of an e-mail message by producing a unique indentifying codes called a message authentication code. |
|
|
Term
|
Definition
a program installed ona user's computer that the browser starts and uses to "help" display or play a file |
|
|
Term
|
Definition
a sercurity measure that prevents unauthorized data modification |
|
|
Term
|
Definition
a small program written in a java programming language |
|
|
Term
|
Definition
a small program that can be executed without first being cmopliled winto computer-readable codes |
|
|
Term
|
Definition
the protection of assets using non-physical means. |
|
|
Term
|
Definition
the process of identifying yourslef to a comp with a user name and apssword |
|
|
Term
message authentication code(MAC) |
|
Definition
a unique number that a message digest functions program uses to amintain the integirty of and e-mail message |
|
|
Term
message digest function program |
|
Definition
a program that maintains the integrity of an e-mail message by producing a unique identifying code called a message authentication code |
|
|
Term
|
Definition
security measures that prevent data delays |
|
|
Term
|
Definition
a security threat wherein a cracker bombards a server or other computer with message in an attempt to consume the network's bandwidth resources |
|
|
Term
|
Definition
a program that stores login info in a encrypted form on the users hard drive |
|
|
Term
|
Definition
an electronic file that you phurchase from a certificate authority and install into a program that uses it, such as an e-mail program or web browser. |
|
|
Term
|
Definition
a comp attck in which e-mail message claiming to be from a legitimate business direct recipient to a spoofed web site where the recipient is directed to provide sensitive info so the spoffed web site can steal the recipients personal info |
|
|
Term
|
Definition
a program that is a software extension of a web browser |
|
|
Term
|
Definition
a virtual door ina comp that permitts traffic to enter and leave the comp. |
|
|
Term
|
Definition
the process that occurs when one comp tests all or some of the ports of another comp to dtermine whether its ports are open |
|
|
Term
|
Definition
in the context of encryption, the key know only to its owner |
|
|
Term
|
Definition
a form of encrytion that uses a single key that is known by both the sander and reciever |
|
|
Term
|
Definition
a browser extemsion that plays video, sound, music, 3d, and virtual reality on macintoshes |
|
|
Term
|
Definition
a browser plug-in that plays streaming audio and video files |
|
|
Term
|
Definition
a security measure that prevents unauthorized data disclosure and ensure the authenticity of the data source |
|
|
Term
|
Definition
in the context of encryption, the key know only to its owner |
|
|
Term
secure sockets layer(SSL) |
|
Definition
a widely used protocal that acts as a serperate layer or "secure channel" on top of the TCP/IP internet protocal. |
|
|
Term
secure/ multipurpose intenet mail extension (S/MIME) |
|
Definition
a specification which,when combined with a person digital ID, provides authentication and encryption to e-mail messages |
|
|
Term
|
Definition
the protcetion of assets from unauthorized access, use, alteration, or destrction. |
|
|
Term
|
Definition
authentication for a web site's users that proves the site's indentity |
|
|
Term
|
Definition
a temp key used in the encryption porccess to ensure a secure connection |
|
|
Term
|
Definition
a program that you can use during an evaluation period, usually for free |
|
|
Term
|
Definition
software that covertly gathers info about a person or his click stream and sends that info to a third party, often a marketing or research firm |
|
|
Term
|
Definition
a porcess that hides and encryption message within differnt types of files |
|
|
Term
|
Definition
an encryption key that is 128 bits long |
|
|
Term
|
Definition
a form of encrytion that uses a single key that is known by both the sander and reciever |
|
|
Term
|
Definition
any act or object that endangers an asset |
|
|
Term
|
Definition
a samll program hidden inside another program that is created with the intent of causing damage |
|
|
Term
|
Definition
the process of associating a person and his identification with a very high level if assurence |
|
|
Term
|
Definition
the process of identifying yourself to a comp, usually b entering a user anem and password known only to you |
|
|
Term
virtual reality modeling language(VRML) |
|
Definition
an u=internet programming language that creates three-dimensional enviroments that can mimic known worlds or defines fictional ones |
|
|
Term
|
Definition
a small hidden graphic on a web page or in e-mail message that is desighned to work ion conjunction with a cookie ti obtain info about the person viewing the page or e-mail message and to send that info to a third party. |
|
|
Term
|
Definition
it is used weaknesses in e-mail programs and operating systems to distribute itself to some of the comp that were then connected to the internet |
|
|
Term
|
Definition
includes tangible protection device, such as lock, alarms, fireproof doors, securtiy fences, safe vaults, and bombporrf buildings |
|
|
Term
|
Definition
is also knowns as private or secret key known only to the person who owns both keys |
|
|
Term
|
Definition
|
|