You are here

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Z
Termsort descending Book Chapter Abbrev
abstraction

To examine a system in terms of its generic features and behavior, not its implementation details

EIS 5
acceptable use policy

A written set of rules for the use of certain assets, typically information assets

EIS 1 AUP
access control list

A list of access rights associated with a single file, directory, or other resource

EIS 4 ACL
access matrix

A 2D table showing access rights of entities to resources

EIS 2
access right

A permission granted to an entity to view or modify a resource

EIS 2
Acknowledgment

A message that indicates an earlier message was received correctly

EIS 10 ACK
active attack

An attack on network communications that actively creates or modifies network traffic

EIS 14
Active Server Pages

An older, standard format for dynamic web pages used by Microsoft's IIS

EIS 16 ASP
Active Server Pages, Extended

A newer, standard format for dynamic web pages used by Microsoft's IIS

EIS 16 ASPX
active token

An authentication device that produces a different credential each time it is used

EIS 6
Address Resolution Protocol

A LAN protocol that determines which IP addresses belong to which MAC addresses, and vice versa

EIS 11 ARP
address scope

The network environment or domain within which a particular address can be reached

EIS 11
address variable

A variable that indicates where data resides instead of actually containing the data; a pointer variable

EIS 5
administrative group

A user group whose members are granted administrative privileges on a system

EIS 4
administrator

A person who manages the technical and/or procedural aspects of an activity

EIS 1
admissible

Evidence in a legal proceeding that meets the rules and standards for use in court

EIS 5
Adobe Portable Document Format

A popular document format that rigidly preserves page layouts and formatting

EIS 3 PDF
advance fee fraud

A fraud in which a very large payment is promised in exchange for a relatively smaller fee paid in advance

EIS 15
Advanced Encryption Standard

The US federal standard symmetric encryption algorithm; supports 128-, 192-, and 256-bit keys

EIS 7 AES
Advanced Research Projects Agency

The original name for the Defense Advanced Research Projects Agency

EIS 11 ARPA
Advanced Technology Attachment

A standard used in PCs to connect high-speed devices like hard drives and DVD players

EIS 2 ATA
adversary

A risk or threat agent that threatens a nation or large enterprise

EIS 17
aggregation and inference

A technique for extracting restricted data from a database by performing a series of queries

EIS 16
algorithm

A mathematical term for a step-by-step procedure like a computer program

EIS 7
American National Standards Institute

A US organization that maintains standards for various industries including the US banking industry

EIS 9 ANSI
American Society for Industrial Security

A professional society for experts in physical, industrial, and business security

EIS 1 ASIS
Amplitude modulation

Radio transmissions that vary the signal strength to send information

EIS 10 AM
analog signal

A signal whose varying features carry information, and the information may vary continuously

EIS 10
annual solar limit

The total amount of energy produced by the Sun in a single year

IC 0
anonymous proxy

A host that can forward an Internet connection to another host; obscuring the originating hosts' address

EIS 16
ANSI X9.17

A now-obsolete standard for secret key exchange, formerly used by the banking industry

IC 0
anti-replay

Network mechanisms to detect a message that has been transmitted more than once

IC 0
antitamper

Hardware features that prevent attackers from disassembling a device and extracting secret information

EIS 9
Apple Macintosh OS-X

A Unix-based operating system used on modern Apple Macintosh computers

EIS 2
application encryption

Cryptographic functions that are built into a network's application layer software

IC 0
application filtering

Firewall filtering that accepts or rejects traffic by analyzing application layer messages

EIS 15

Pages

Theme by Danetsoft and Danang Probo Sayekti inspired by Maksimer