Term
|
Definition
reports that are not predefined by a programmer but designed as needed by a user |
|
|
Term
|
Definition
a report containing detailed transactions or records |
|
|
Term
|
Definition
a report that recaps or summarizes detailed information over a period of time or some category |
|
|
Term
|
Definition
a report that contains only information about nonstandard or exception conditions |
|
|
Term
|
Definition
a summary report from various information sources that is normally used for strategic decisions |
|
|
Term
|
Definition
a printed report or document produced for use inside an organization |
|
|
Term
|
Definition
printed documents such as statements, notices, form letters, and legal documents produced for outside an organization |
|
|
Term
|
Definition
an external output that includes a portion that is returned to the system as an input |
|
|
Term
|
Definition
a report that includes detailed and summary information |
|
|
Term
|
Definition
to link a summary field to its supporting detail and enable users to view the detail dynamically |
|
|
Term
|
Definition
mechanisms and procedures that are built into an application system to safeguard information contained within it |
|
|
Term
field combination control |
|
Definition
an integrity control that verifies the date in one field based on data in another field or fields |
|
|
Term
|
Definition
an integrity control that identifies when a value in a field is too large or too small |
|
|
Term
|
Definition
an integrity control to ensure that all necessary fields on an input form have been entered |
|
|
Term
|
Definition
an integrity control to validate the input data for correctness and appropriateness |
|
|
Term
|
Definition
an integrity control that determines who has access to a system and its data |
|
|
Term
|
Definition
a technique whereby all updates to a database are recorded with the information of who when and how the update was performed |
|
|
Term
|
Definition
integrity controls to ensure that output information is channeled to the correct people |
|
|
Term
|
Definition
mechanisms usually provided by operating system or environment to protect the data and processing systems from malicious attack |
|
|
Term
|
Definition
a person who does not have authorized access to a system |
|
|
Term
|
Definition
a user who is registered or known to the system and is authorized to access some part of it |
|
|
Term
|
Definition
the process of determining whether a user is permitted to have access to the system and the data |
|
|
Term
|
Definition
the list of users who have rights to access the system and data |
|
|
Term
|
Definition
a user who has special security access privileges to a system |
|
|
Term
|
Definition
the process of identifying a user to verify that he can have access to the system |
|
|
Term
|
Definition
a computer readable plastic card with security information embedded within it |
|
|
Term
|
Definition
the process of altering data so that it is unreadable by unauthorized users |
|
|
Term
|
Definition
the process of converting encrypted data back in to a readable format |
|
|
Term
|
Definition
a complex mathematical formula and process that encrypts or decrypts data |
|
|
Term
|
Definition
a binary field that the encryption algorithm uses to transform the data |
|
|
Term
|
Definition
an encryption process that uses the same key to encrypt and decrypt the data |
|
|
Term
asymmetric key encryption |
|
Definition
an encryption process that uses one key to encrypt and a different key to decrypt the data |
|
|
Term
|
Definition
an asymmetric key method in which one key is publicized and the other key is kept private |
|
|
Term
|
Definition
a technique in which a document is encrypted using a private key to verify who wrote the document |
|
|
Term
certificate or digital certificate |
|
Definition
a text message that is encrypted by verifying authority and used ot broadcast an organization's name and public key |
|
|
Term
|
Definition
a well known third party that sells digital certificates to organizations |
|
|
Term
|
Definition
a standard protocol to connect and transmit encrypted data |
|
|
Term
|
Definition
|
|
Term
Secure hypertext transport protocol |
|
Definition
an internet standard for transmitting web pages securely |
|
|