Term
|
Definition
| Microsofts technology for writing small aplications that perform actions in web pages |
|
|
Term
|
Definition
| a program that searches for and erases spyware from a users computer |
|
|
Term
|
Definition
| a general classification of browser extensions that includes tools to enhance your browsing experience |
|
|
Term
|
Definition
| a category of software that displays advertisements to help pay for the program |
|
|
Term
|
Definition
| a formula or set of steps to solve a particular problem |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| a temporary storage area in a computers memory |
|
|
Term
|
Definition
| a feature by which music is downloaded and qued for play when the transfer play rate exceeds your modems speed |
|
|
Term
|
Definition
| a trusted third party that verifies the identity of a person or organization in the process of issuing a digital certificate |
|
|
Term
|
Definition
|
|
Term
|
Definition
| a record of the links clicked by a user while visiting a website |
|
|
Term
|
Definition
| the protection of assets using non-physical means |
|
|
Term
|
Definition
| the general name for a procedure, whether phyisical or logical, that recognizes, reduces, or eliminates a threat |
|
|
Term
|
Definition
| a slang term for a person who uses his knowledge of computers and programming to gain unauthorized access to a computer for the purpose of stealing or altering data |
|
|
Term
|
Definition
| the process of transforming data from a readable format to an unreadable format |
|
|
Term
|
Definition
| the process of reversing encrypted text into a readable format |
|
|
Term
|
Definition
| a security threat where a cracker bombards a server or other computer with messages in an attempt to consume the networks bandwith resources, efectively disabling the organizations communications |
|
|
Term
|
Definition
| an encrpyted and password-protected file that contains sufficient information to authenticate and prove a persons or oganizations identity |
|
|
Term
|
Definition
| An electronic file that you purchase from a certificate authority and install into a program that uses it, such as an e-mail program or web browser |
|
|
Term
|
Definition
| a process that inserts a digital pattern cantaining copyright information into a digital image, animation or audio or video file. |
|
|
Term
|
Definition
| a way of scrambling and encoding data transmissions that reduces the risk that a person who intercepts the Web page as it travels across the internet will be able to decode and read the transmissions contents |
|
|
Term
|
Definition
| An open standard being developed by the Web3D consortion that lets a developer create 3D words |
|
|
Term
|
Definition
| a software program or hardware device that controls access between two networks, such as a local are network and the internet or the internet and a computer. |
|
|
Term
|
Definition
| a browser pluf-in that displays simple animations, user interfaces, static graphics, movies, sound, and text that was created using macromedia flash software |
|
|
Term
| Hash code function program |
|
Definition
| a program that maintains the integrity of an e-mail message by producing a unique identifying code called a message authentication code |
|
|
Term
|
Definition
| A program installed on a user's computer that the browser starts and uses "help" display or play a file |
|
|
Term
|
Definition
| a security measure that prevents unauthorized data modification. |
|
|
Term
|
Definition
| a small program written in the java programming language |
|
|
Term
|
Definition
| A small program that can be executed without first being compiled into computer readable codes |
|
|
Term
|
Definition
| The protection of assets using non-physical means |
|
|
Term
|
Definition
| the process of identifying yourself to a computer with a user name and password |
|
|
Term
| Message Authentication Code (MAC) |
|
Definition
| unique number that a message digest function program uses to maintain the integrity of an e-mail |
|
|
Term
| Message Digest function program |
|
Definition
| a program that maintains the integrity of an e-mail message by producing a unique identifying code called a message authentication code |
|
|
Term
|
Definition
| A security threat wherin a cracker bobmards a server or other computer with messages in an attempt to consume bandwith resources, thus eliminating their ability to communicate |
|
|
Term
|
Definition
| security measures that prevent data delays or denials |
|
|
Term
|
Definition
| a program that stores login information in an encrypted form on the user's hard drive |
|
|
Term
|
Definition
| an electronic file that you purchase from a certificat authority and install into a program that uses it, such as e-mail program or web browser |
|
|
Term
|
Definition
| a computer attack in which e-mail messages claiming to be from a legitimate business direct recipients to a spoofed web site where the recipient is directed to provide sensitive information so the poofed web site can steal the recipients personal information |
|
|
Term
|
Definition
| Tangible devices such as locks alarms fireproof doors security fences safes or vaults, and bombproof buildings, that protect assets from unauthorized access, use alteration or destruction |
|
|
Term
|
Definition
|
|
Term
|
Definition
| a program that is a software extension of a browser |
|
|
Term
|
Definition
| a virtual door on a computer that permits virtual traffic to enter and leave the computer |
|
|
Term
|
Definition
| when a computer tests ports on another computer |
|
|
Term
|
Definition
| the key known only to its owner |
|
|
Term
|
Definition
| a form of encryption that uses only one key known to the senderr and reciever |
|
|
Term
|
Definition
| a form of encryption that uses 2 different keys a public key and a private or secret key |
|
|
Term
|
Definition
| plays videos and other media stuff |
|
|
Term
|
Definition
| plays streaming audio and video files |
|
|
Term
|
Definition
| security measures that prevent bad stuff from happenin |
|
|
Term
|
Definition
| the key known only to its owner |
|
|
Term
|
Definition
| a video protocol that acts as a separate layer or "secure channel" on top of the tcp/ip internet protocol. |
|
|
Term
| secure/multipurpose internet mail extentions |
|
Definition
| provides authentication and encryption to e-mail messages |
|
|
Term
|
Definition
| protects all your stuff from bad things you dont want to happen |
|
|
Term
|
Definition
| authentication for a web sites users that proves the site's identity |
|
|
Term
|
Definition
| a temporary key used in the encryption process to ensure a secure connection |
|
|
Term
|
Definition
| a browser extension that provides animated three dimensional interfaces, interactive advertisements and product demonstrations |
|
|
Term
|
Definition
| software that tells bad people what you are doing on your computer, and gets information from it about personal thinga |
|
|
Term
|
Definition
| a widely used protocol that acts as a secure channel |
|
|
Term
|
Definition
| a process that hides an encrypted message within different types of files |
|
|
Term
|
Definition
| an encryption key that is 128 bits long |
|
|
Term
|
Definition
| an encryption process that uses a single key that is known by both the sender and the reciever |
|
|
Term
|
Definition
| anything that is bad oor can possibly damage files on your pc |
|
|
Term
|
Definition
| a small program hidden inside of another program that is created with the intent of causing damage |
|
|
Term
|
Definition
| The process of associating a person and his identification with a very high level of assurance |
|
|
Term
|
Definition
| the process of identifying yourself to a computer |
|
|
Term
| Virtual Reality Modeling language (VRML) |
|
Definition
|
|
Term
|
Definition
| ljljljlkljlkjljkhdkjlhcxzkvlhxzcjkvhxczvkljxvzcxvxcvcxvxcv |
|
|
Term
|
Definition
|
|