NET FRAMEWORK
NET Framework is a software framework that is available with several Microsoft Windows operating systems. It includes a large library of coded solutions to prevent common programming problems and a virtual machine that manages the execution of programs written specifically for the framework. The .NET Framework is a key Microsoft offering and is intended to be used by most new applications created for the
Windows platform.
ASP-Acteve Server Pages
Active Server Pages (ASP) is a server-side scripting
environment that you can use to create and run dynamic, interactive Web server applications. With ASP, you can combine HTML
pages, script commands, and COM components to create interactive Web pages and powerful Web-based applications that are easy
to develop and modify.
ACCESS
a code (a series of characters or digits) that must be entered in some way (typed or dialed or spoken) to
get the use of something (a telephone line or a computer or a local area network etc.)
obtain or retrieve from a storage device; as of information on a computer
(computer science) the operation of reading or writing stored information.
ACCES CONTROL
Access control is the ability to permit or deny
the use of a particular resource by a particular entity. Access control mechanisms can be used in managing physical resources
(such as a movie theater, to which only ticketholders should be admitted), logical resources (a bank account, with a limited
number of people authorized to make a withdrawal), or digital resources (for example, a private text document on a computer,
which only certain users should be able to read).
ACCESS CONTROL LIST
Access control list (ACL) is a table that tells
a computer operating system which access rights each user has to a particular system object, such as a file directory or individual file. Each object has a security attribute that identifies its access control list.
The list has an entry for each system user with access privileges. The most common privileges include the ability to read
a file (or all the files in a directory), to write to the file or files, and to execute the file (if it is an executable file,
or program). Microsoft Windows NT/2000, Novell's NetWare, Digital's OpenVMS, and Unix-based systems are among the operating systems that use access control lists.
The list is implemented differently by each operating system.
ACCESS PRIVILEGES
Access Privileges is the extent to which a user may operate a system resource on a
network or a file server.In many cases, permission to access a server, view its contents and modify or create files is limited
by the network's system administrator in order to maintain security.
Active Hyperlink
Administrator (as an IT resource)
AUTHENTICATION
Authentication is the act of establishing
or confirming something (or someone) as authentic, that is, that claims made by or about the subject are true. This
might involve confirming the identity of a person, the origins of an artifact, or assuring that a computer program is a trusted one.
DATA ADMINISTRATOR
Data Administrator is a person who coordinates activities within the data administration
department. Same as "database analyst." See data administration and system development cycle.
DEMILITARIZED ZONE (DMZ)
Demilitarized Zone (DMZ) is a part of a network separated from other systems by a
Firewall which allows only certain types of network traffic to enter or leave. For example, a company will protect its internal
networks from the Internet with a Firewall, but will have a separate network, or DMZ, to which the public can gain limited
access. Public web servers might be placed in such a DMZ. With the DMZ approach, large companies with complex e-commerce Internet
and extranet applications may have a two-tiered approach to firewall security.
ELECTRONIC COMMERCE
Electronic commerce, commonly known as e-commerce
or eCommerce, consists of the buying and selling of products or services over electronic systems such
as the Internet and other computer networks. The amount of trade conducted electronically has grown extraordinarily since
the spread of the Internet. A wide variety of commerce is conducted in this way, spurring and drawing on innovations in electronic funds transfer, supply chain management, Internet marketing, online transaction processing, electronic data interchange (EDI), inventory management systems, and automated data collection systems. Modern electronic commerce typically
uses the World Wide Web at least at some point in the transaction's lifecycle, although it can encompass
a wider range of technologies such as e-mail as well.
ELECTORNIC GOVERNMENT
Together with the rest of the public sector we at Tonbridge & Malling
are trying very hard to modernise the way we provide services to the public.
Making information, consultations, application forms, payments, bookings
etc all available electronically is one of the many ways we are aiming to achieve this. This will help to make services more
accessible at times and places more convenient for you.
ENCRYPTION
Encryption
is the process of transforming information (referred
to as planetext) using an algorithm (called chiper) to make it unreadable to anyone except those possessing special knowledge, usually
referred to as a key. The result of the process is encrypted
information (in cryptography, referred to as ciphertext). In many contexts, the word encryption also implicitly refers
to the reverse process, decryption (e.g. “sorftware for encryption” can typically also perform decryption), to make the encrypted information readable again (i.e. to make it unencrypted).
ENHANCED
AUTHENTICATION
Enhanced
Authentication is a security feature that uses multiple factors to authenticate our Internet Banking/Bill
Pay site to our end users and to validate end users when they log on to their Internet Banking/Bill Pay site.
INFORMATION
TECHNOLOGY
Information technology is "the study,
design, development, implementation, support or management of computer-based information systems, particularly software applications and computer hardware."[1] IT deals with the use of electronic computers and computer software to convert, store, protect, process, transmit, and securely retrieve information.
Information
Technology Resource (IT RESOURCE)
Information Technology Resource (IT Resource)
- A resource used for electronic storage, processing or transmitting of any data or information, as well as the
data or information itself. This definition includes but is not limited to electronic mail, voice mail, local databases, externally
accessed databases, CD-ROM, recorded magnetic media, photographs, digitized information, or microfilm. This also includes
any wire, radio, electromagnetic, photo optical, photo electronic or other facility used in transmitting electronic communications,
and any computer facilities or related electronic equipment that electronically stores such communications.
INTELLECTUAL PROPERTY RIGHTS (IPR)
Intellectual
property rights are a bundle of exclusive rights over creations of the mind, both artistic and commercial. The former is covered by copyright laws, which protect creative works, such as books, movies, music, paintings, photographs, and software, and
gives the copyright holder exclusive right to control reproduction or adaptation of such works for a certain period of time.
INTELLECTUAL PROPERTY (IP)
Intellectual property (IP) are legal property rights over creations of the mind, both artistic and commercial, and the corresponding fields of law. Under intellectual
property law, owners are granted certain exclusive rights to a variety of intangible assets, such as musical, literary, and artistic works; ideas, discoveries and inventions;
and words, phrases, symbols, and designs. Common types of intellectual property include copyrights, trademarks, patents, industrial design rights and trade secrets.
ISO 17799 itself is actually a code of practice. It details over 130 specific controls,
categorized into around 36 control objectives, listed in 11 distinct chapters:
1. Risk Assessment and Treatment
2. System Policy
3. Organizing Information Security
4. Asset Management
5. Human Resources Security
6. Physical and Environmental Security
7. Communications and Operations
Management
8. Access Control
9. Information Systems Acquisition,
Development and Maintenance
10. Information Security Incident
Management
11. Business Continuity Management
12. Compliance
KEY MANAGEMENT
Key management is a term used to describe two different fields; (1) cryptography, and (2) physical key management (or electronic key management) within building or campus access control. Key management includes
all of the provisions made in a cryptosystem design which are related to generation, exchange, storage, safeguarding, use, vetting, and replacement of keys. It includes cryptographic protocols in that design, Key server, user procedures, and so on. There
is a distinction between key management, which concerns keys at the users' level (i.e., passed between systems or users or
both), and key scheduling which is usually taken to apply to the handling of key material within the operation of a
cipher.
LOGICAL ACCESS CONTROL
Logical access control refers to the collection of policies, procedures, organizational structure
and electronic access controls designed to restrict access to computer software and data files.
IOS
MALICIOUS CODE
Malicious code (also called vandals) is a new breed of Internet threat that cannot
be efficiently controlled by conventional antivirus software alone. In contrast to viruses that require a user to execute
a program in order to cause damage, vandals are auto-executable applications.
Malware (virus) Detection Software
MOBILE CODE
Mobile code is software obtained from remote systems, transferred across a network,
and then downloaded and executed on a local system without explicit installation or execution by the recipient. Examples of
mobile code include scripts (JavaScript, VBScript), Java applets, ActiveX controls, Flash animations, Shockwave movies (and
Xtras), and macros embedded within Office documents.
Mobile code can also download and execute in
the client workstation via email. Mobile code may download via an email attachment (e.g., macro in a Word file) or via an
HTML email body (e.g., JavaScript). For example, the ILOVEYOU, TRUELOVE, and AnnaK email viruses/worms all were implemented
as mobile code (VBScript in a .vbs email attachment that executed in Windows Scripting Host).
NETWORK PERIMETER
Network perimeter is the boundary between the private and locally managed-and-owned
side of a network and the public and usually provider-managed side of a network. Network perimeter is the boundary between
the private and locally managed-and-owned side of a network and the public and usually provider-managed side of a network.
PATCH
Patch is a Unix program that updates text files according to instructions contained
in a separate file, called a patch file. The patch file (also called a patch for short) is a text file that
consists of a list of differences and is produced by running the related diff program with the original and updated
file as arguments. Updating files with patch is often referred to as applying the patch or simply patching the
files.
PERSONAL
IT RESOURCES
Purge
REMOTE ACCESS
Remote
access is the ability to get access to a computer or a network from a remote distance. In corporations, people
at branch offices, telecommuters, and people who are travelling may need access to the corporation's network.
SOCIAL ENGINEERING
Social engineering is the act of manipulating people into performing actions or divulging confidential
information. While similar to a confidence trick or simple fraud, the term typically applies to trickery or
deception for the purpose of information gathering, fraud or computer system access; in most cases the attacker never comes
face-to-face with the victim.
SPOOFING ATTACK
Spoofing attack is a situation in which one person or program successfully masquerades
as another by falsifying data and thereby gaining an illegitimate advantage.
STRONG
ENCRYPTION
Strong Encryption is an encryption
method that uses a very large number as its cryptographic key. The larger the key, the longer it takes to unlawfully break
the code. Today, 256 bits is considered strong encryption. As computers become faster, the length of the key must be increased.
USERID
User
ID is the code used by a User to identify himself when he logs into a system and starts a Login session.
It is used by the system to uniquely identitfy this User. A User ID is one-half of a set of Credentials.
|