Term
|
Definition
Microsofts technology for writing small aplications that perform actions in web pages |
|
|
Term
|
Definition
a program that searches for and erases spyware from a users computer |
|
|
Term
|
Definition
a general classification of browser extensions that includes tools to enhance your browsing experience |
|
|
Term
|
Definition
a category of software that displays advertisements to help pay for the program |
|
|
Term
|
Definition
a formula or set of steps to solve a particular problem |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
a temporary storage area in a computers memory |
|
|
Term
|
Definition
a feature by which music is downloaded and qued for play when the transfer play rate exceeds your modems speed |
|
|
Term
|
Definition
a trusted third party that verifies the identity of a person or organization in the process of issuing a digital certificate |
|
|
Term
|
Definition
|
|
Term
|
Definition
a record of the links clicked by a user while visiting a website |
|
|
Term
|
Definition
the protection of assets using non-physical means |
|
|
Term
|
Definition
the general name for a procedure, whether phyisical or logical, that recognizes, reduces, or eliminates a threat |
|
|
Term
|
Definition
a slang term for a person who uses his knowledge of computers and programming to gain unauthorized access to a computer for the purpose of stealing or altering data |
|
|
Term
|
Definition
the process of transforming data from a readable format to an unreadable format |
|
|
Term
|
Definition
the process of reversing encrypted text into a readable format |
|
|
Term
|
Definition
a security threat where a cracker bombards a server or other computer with messages in an attempt to consume the networks bandwith resources, efectively disabling the organizations communications |
|
|
Term
|
Definition
an encrpyted and password-protected file that contains sufficient information to authenticate and prove a persons or oganizations identity |
|
|
Term
|
Definition
An electronic file that you purchase from a certificate authority and install into a program that uses it, such as an e-mail program or web browser |
|
|
Term
|
Definition
a process that inserts a digital pattern cantaining copyright information into a digital image, animation or audio or video file. |
|
|
Term
|
Definition
a way of scrambling and encoding data transmissions that reduces the risk that a person who intercepts the Web page as it travels across the internet will be able to decode and read the transmissions contents |
|
|
Term
|
Definition
An open standard being developed by the Web3D consortion that lets a developer create 3D words |
|
|
Term
|
Definition
a software program or hardware device that controls access between two networks, such as a local are network and the internet or the internet and a computer. |
|
|
Term
|
Definition
a browser pluf-in that displays simple animations, user interfaces, static graphics, movies, sound, and text that was created using macromedia flash software |
|
|
Term
Hash code function program |
|
Definition
a program that maintains the integrity of an e-mail message by producing a unique identifying code called a message authentication code |
|
|
Term
|
Definition
A program installed on a user's computer that the browser starts and uses "help" display or play a file |
|
|
Term
|
Definition
a security measure that prevents unauthorized data modification. |
|
|
Term
|
Definition
a small program written in the java programming language |
|
|
Term
|
Definition
A small program that can be executed without first being compiled into computer readable codes |
|
|
Term
|
Definition
The protection of assets using non-physical means |
|
|
Term
|
Definition
the process of identifying yourself to a computer with a user name and password |
|
|
Term
Message Authentication Code (MAC) |
|
Definition
unique number that a message digest function program uses to maintain the integrity of an e-mail |
|
|
Term
Message Digest function program |
|
Definition
a program that maintains the integrity of an e-mail message by producing a unique identifying code called a message authentication code |
|
|
Term
|
Definition
A security threat wherin a cracker bobmards a server or other computer with messages in an attempt to consume bandwith resources, thus eliminating their ability to communicate |
|
|
Term
|
Definition
security measures that prevent data delays or denials |
|
|
Term
|
Definition
a program that stores login information in an encrypted form on the user's hard drive |
|
|
Term
|
Definition
an electronic file that you purchase from a certificat authority and install into a program that uses it, such as e-mail program or web browser |
|
|
Term
|
Definition
a computer attack in which e-mail messages claiming to be from a legitimate business direct recipients to a spoofed web site where the recipient is directed to provide sensitive information so the poofed web site can steal the recipients personal information |
|
|
Term
|
Definition
Tangible devices such as locks alarms fireproof doors security fences safes or vaults, and bombproof buildings, that protect assets from unauthorized access, use alteration or destruction |
|
|
Term
|
Definition
|
|
Term
|
Definition
a program that is a software extension of a browser |
|
|
Term
|
Definition
a virtual door on a computer that permits virtual traffic to enter and leave the computer |
|
|
Term
|
Definition
when a computer tests ports on another computer |
|
|
Term
|
Definition
the key known only to its owner |
|
|
Term
|
Definition
a form of encryption that uses only one key known to the senderr and reciever |
|
|
Term
|
Definition
a form of encryption that uses 2 different keys a public key and a private or secret key |
|
|
Term
|
Definition
plays videos and other media stuff |
|
|
Term
|
Definition
plays streaming audio and video files |
|
|
Term
|
Definition
security measures that prevent bad stuff from happenin |
|
|
Term
|
Definition
the key known only to its owner |
|
|
Term
|
Definition
a video protocol that acts as a separate layer or "secure channel" on top of the tcp/ip internet protocol. |
|
|
Term
secure/multipurpose internet mail extentions |
|
Definition
provides authentication and encryption to e-mail messages |
|
|
Term
|
Definition
protects all your stuff from bad things you dont want to happen |
|
|
Term
|
Definition
authentication for a web sites users that proves the site's identity |
|
|
Term
|
Definition
a temporary key used in the encryption process to ensure a secure connection |
|
|
Term
|
Definition
a browser extension that provides animated three dimensional interfaces, interactive advertisements and product demonstrations |
|
|
Term
|
Definition
software that tells bad people what you are doing on your computer, and gets information from it about personal thinga |
|
|
Term
|
Definition
a widely used protocol that acts as a secure channel |
|
|
Term
|
Definition
a process that hides an encrypted message within different types of files |
|
|
Term
|
Definition
an encryption key that is 128 bits long |
|
|
Term
|
Definition
an encryption process that uses a single key that is known by both the sender and the reciever |
|
|
Term
|
Definition
anything that is bad oor can possibly damage files on your pc |
|
|
Term
|
Definition
a small program hidden inside of another program that is created with the intent of causing damage |
|
|
Term
|
Definition
The process of associating a person and his identification with a very high level of assurance |
|
|
Term
|
Definition
the process of identifying yourself to a computer |
|
|
Term
Virtual Reality Modeling language (VRML) |
|
Definition
|
|
Term
|
Definition
ljljljlkljlkjljkhdkjlhcxzkvlhxzcjkvhxczvkljxvzcxvxcvcxvxcv |
|
|
Term
|
Definition
|
|