Education

Final exam

Home
About Our School
Academics
Programs
Activities
Directions
Contact Us
New Page Title
Final exam

Enter subhead content here

NET FRAMEWORK 

NET Framework is a software framework that is available with several Microsoft Windows operating systems. It includes a large library of coded solutions to prevent common programming problems and a virtual machine that manages the execution of programs written specifically for the framework. The .NET Framework is a key Microsoft offering and is intended to be used by most new applications created for the Windows platform.

ASP-Acteve Server Pages

Active Server Pages (ASP) is a server-side scripting environment that you can use to create and run dynamic, interactive Web server applications. With ASP, you can combine HTML pages, script commands, and COM components to create interactive Web pages and powerful Web-based applications that are easy to develop and modify.

ACCESS

  • a code (a series of characters or digits) that must be entered in some way (typed or dialed or spoken) to get the use of something (a telephone line or a computer or a local area network etc.)
  • obtain or retrieve from a storage device; as of information on a computer
  • (computer science) the operation of reading or writing stored information.
  • ACCES CONTROL

    Access control is the ability to permit or deny the use of a particular resource by a particular entity. Access control mechanisms can be used in managing physical resources (such as a movie theater, to which only ticketholders should be admitted), logical resources (a bank account, with a limited number of people authorized to make a withdrawal), or digital resources (for example, a private text document on a computer, which only certain users should be able to read).

    ACCESS CONTROL LIST

    Access control list (ACL) is a table that tells a computer operating system which access rights each user has to a particular system object, such as a file directory or individual file. Each object has a security attribute that identifies its access control list. The list has an entry for each system user with access privileges. The most common privileges include the ability to read a file (or all the files in a directory), to write to the file or files, and to execute the file (if it is an executable file, or program). Microsoft Windows NT/2000, Novell's NetWare, Digital's OpenVMS, and Unix-based systems are among the operating systems that use access control lists. The list is implemented differently by each operating system.

    ACCESS PRIVILEGES

    Access Privileges is the extent to which a user may operate a system resource on a network or a file server.In many cases, permission to access a server, view its contents and modify or create files is limited by the network's system administrator in order to maintain security.

    Active Hyperlink

    Administrator (as an IT resource)

    AUTHENTICATION

    Authentication is the act of establishing or confirming something (or someone) as authentic, that is, that claims made by or about the subject are true. This might involve confirming the identity of a person, the origins of an artifact, or assuring that a computer program is a trusted one.

    DATA ADMINISTRATOR

    Data Administrator is a person who coordinates activities within the data administration department. Same as "database analyst." See data administration and system development cycle.

    DEMILITARIZED ZONE (DMZ)

    Demilitarized Zone (DMZ) is a part of a network separated from other systems by a Firewall which allows only certain types of network traffic to enter or leave. For example, a company will protect its internal networks from the Internet with a Firewall, but will have a separate network, or DMZ, to which the public can gain limited access. Public web servers might be placed in such a DMZ. With the DMZ approach, large companies with complex e-commerce Internet and extranet applications may have a two-tiered approach to firewall security.

    ELECTRONIC COMMERCE

    Electronic commerce, commonly known as e-commerce or eCommerce, consists of the buying and selling of products or services over electronic systems such as the Internet and other computer networks. The amount of trade conducted electronically has grown extraordinarily since the spread of the Internet. A wide variety of commerce is conducted in this way, spurring and drawing on innovations in electronic funds transfer, supply chain management, Internet marketing, online transaction processing, electronic data interchange (EDI), inventory management systems, and automated data collection systems. Modern electronic commerce typically uses the World Wide Web at least at some point in the transaction's lifecycle, although it can encompass a wider range of technologies such as e-mail as well.

    ELECTORNIC GOVERNMENT

    Together with the rest of the public sector we at Tonbridge & Malling are trying very hard to modernise the way we provide services to the public.                 Making information, consultations, application forms, payments, bookings etc all available electronically is one of the many ways we are aiming to achieve this. This will help to make services more accessible at times and places more convenient for you.


    ENCRYPTION

    Encryption is the process of transforming information (referred to as planetext) using an algorithm (called chiper) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information (in cryptography, referred to as ciphertext). In many contexts, the word encryption also implicitly refers to the reverse process, decryption (e.g. “sorftware for encryption” can typically also perform decryption), to make the encrypted information readable again (i.e. to make it unencrypted).

    ENHANCED AUTHENTICATION

    Enhanced Authentication is a security feature that uses multiple factors to authenticate our Internet Banking/Bill Pay site to our end users and to validate end users when they log on to their Internet Banking/Bill Pay site.

    INFORMATION TECHNOLOGY

    Information technology is "the study, design, development, implementation, support or management of computer-based information systems, particularly software applications and computer hardware."[1] IT deals with the use of electronic computers and computer software to convert, store, protect, process, transmit, and securely retrieve information.


    Information Technology Resource (IT RESOURCE)

    Information Technology Resource (IT Resource) - A resource used for electronic storage, processing or transmitting of any data or information, as well as the data or information itself. This definition includes but is not limited to electronic mail, voice mail, local databases, externally accessed databases, CD-ROM, recorded magnetic media, photographs, digitized information, or microfilm. This also includes any wire, radio, electromagnetic, photo optical, photo electronic or other facility used in transmitting electronic communications, and any computer facilities or related electronic equipment that electronically stores such communications.

    INTELLECTUAL PROPERTY RIGHTS (IPR)

    Intellectual property rights are a bundle of exclusive rights over creations of the mind, both artistic and commercial. The former is covered by copyright laws, which protect creative works, such as books, movies, music, paintings, photographs, and software, and gives the copyright holder exclusive right to control reproduction or adaptation of such works for a certain period of time.

    INTELLECTUAL PROPERTY (IP)

    Intellectual property (IP) are legal property rights over creations of the mind, both artistic and commercial, and the corresponding fields of law. Under intellectual property law, owners are granted certain exclusive rights to a variety of intangible assets, such as musical, literary, and artistic works; ideas, discoveries and inventions; and words, phrases, symbols, and designs. Common types of intellectual property include copyrights, trademarks, patents, industrial design rights and trade secrets.

    ISO 17799 itself is actually a code of practice. It details over 130 specific controls, categorized into around 36 control objectives, listed in 11 distinct chapters:

    1. Risk Assessment and Treatment                                                               2. System Policy

    3. Organizing Information Security

    4. Asset Management

    5. Human Resources Security

    6. Physical and Environmental Security

    7. Communications and Operations Management

    8. Access Control

    9. Information Systems Acquisition, Development and Maintenance 

    10. Information Security Incident Management

    11. Business Continuity Management

    12. Compliance


    KEY MANAGEMENT

    Key management is a term used to describe two different fields; (1) cryptography, and (2) physical key management (or electronic key management) within building or campus access control.           Key management includes all of the provisions made in a cryptosystem design which are related to generation, exchange, storage, safeguarding, use, vetting, and replacement of keys. It includes cryptographic protocols in that design, Key server, user procedures, and so on. There is a distinction between key management, which concerns keys at the users' level (i.e., passed between systems or users or both), and key scheduling which is usually taken to apply to the handling of key material within the operation of a cipher

    LOGICAL ACCESS CONTROL      

    Logical access control refers to the collection of policies, procedures, organizational structure and electronic access controls designed to restrict access to computer software and data files.

    IOS

    MALICIOUS CODE

    Malicious code (also called vandals) is a new breed of Internet threat that cannot be efficiently controlled by conventional antivirus software alone. In contrast to viruses that require a user to execute a program in order to cause damage, vandals are auto-executable applications. 

                                                                                                                                    Malware (virus) Detection Software

                                                                                                                                        MOBILE CODE

    Mobile code is software obtained from remote systems, transferred across a network, and then downloaded and executed on a local system without explicit installation or execution by the recipient. Examples of mobile code include scripts (JavaScript, VBScript), Java applets, ActiveX controls, Flash animations, Shockwave movies (and Xtras), and macros embedded within Office documents. 
           Mobile code can also download and execute in the client workstation via email. Mobile code may download via an email attachment (e.g., macro in a Word file) or via an HTML email body (e.g., JavaScript). For example, the ILOVEYOU, TRUELOVE, and AnnaK email viruses/worms all were implemented as mobile code (VBScript in a .vbs email attachment that executed in Windows Scripting Host).

    NETWORK PERIMETER

    Network perimeter is the boundary between the private and locally managed-and-owned side of a network and the public and usually provider-managed side of a network. Network perimeter is the boundary between the private and locally managed-and-owned side of a network and the public and usually provider-managed side of a network.

    PATCH

    Patch is a Unix program that updates text files according to instructions contained in a separate file, called a patch file. The patch file (also called a patch for short) is a text file that consists of a list of differences and is produced by running the related diff program with the original and updated file as arguments. Updating files with patch is often referred to as applying the patch or simply patching the files.

    PERSONAL IT RESOURCES

    Purge

    REMOTE ACCESS

    Remote access is the ability to get access to a computer or a network from a remote distance. In corporations, people at branch offices, telecommuters, and people who are travelling may need access to the corporation's network.

    SOCIAL ENGINEERING

    Social engineering is the act of manipulating people into performing actions or divulging confidential information. While similar to a confidence trick or simple fraud, the term typically applies to trickery or deception for the purpose of information gathering, fraud or computer system access; in most cases the attacker never comes face-to-face with the victim.

    SPOOFING ATTACK

    Spoofing attack is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining an illegitimate advantage.

    STRONG ENCRYPTION

    Strong Encryption is an encryption method that uses a very large number as its cryptographic key. The larger the key, the longer it takes to unlawfully break the code. Today, 256 bits is considered strong encryption. As computers become faster, the length of the key must be increased.

    USERID

    User ID is the code used by a User to identify himself when he logs into a system and starts a Login session. It is used by the system to uniquely identitfy this User. A User ID is one-half of a set of Credentials.

    Enter content here

    Enter supporting content here