.NET FRAMEWORKS
It is a software framework that is available with several Microsoft Windows operating systems. It includes a large library of coded solutions to prevent common programming problems and a virtual machine that manages the execution of programs written specifically for the framework. The .NET Framework is a key Microsoft offering and is intended to be used by most new applications created for the Windows platform.
ACTIVE SERVER PAGES (ASP),
It
is also known as Classic ASP, was Microsoft's first server-side script engine for dynamically-generated
web pages. Initially released as an add-on to Internet Information
Services (IIS) via the Windows NT 4.0
Option Pack, it was subsequently included as a free component of Windows Server (since the initial release of Windows 2000 Server).
ACCESS
Access is simply being able to get to what you need. Data access is being able
to get to (usually having permission to use) particular data on a computer. Web access means having a connection to the World
Wide Web through an access provider or an online service provider such as America Online. For data access, access is usually specified as read-only
access and read/write access.
ACCESS PRIVILEGES
It provide a level of security, preventing users from tampering with aspects of
the in which system they don't belong. Access privileges also allow a system to provide customized interfaces to users based
on their roles in group interactions.
ACTIVE HYPERLINK
A hyperlink is considered to be an active hyperlink from the time a user presses and releases the mouse button when clicking on
the hyperlink. When designing a Web page, you can choose a font color to represent active hyperlinks.
ADMINISTRATOR (as an IT resource)
It provides advanced delegation and robust, policy-based
administration capabilities that improve the security and efficiency of your Microsoft Windows environment and can assist
you in meeting regulatory requirements.
AUTHENTICATION
The exchange of security information in order
to verify the claimed identity of a communications partner. The act of identifying
or verifying the eligibility of a workstation, originator, or individual to access specific categories of information. It
is the process of determining whether someone or something is, in fact, who or what it is declared to be, based upon credentials
provided such as user ID and password combination. It is the process of determining
whether someone or something is, in fact, who or what it is declared to be.
DATA
ADMINISTRATOR
A person who coordinates activities within the data administration department. Same as "database analyst
ELECTRONIC
COMMERCE (ecommerce)
The purchase and distribution of goods and services across the Internet.
ELECTRONIC
GOVERNMENT (eGovernment)
It is also known as e-gov, digital government,
or online government): The application of information and communications technology to enhance the effectiveness of a legislature,
judiciary, or administration, either to improve efficiency or to change the relationships between citizen and government,
or both. The primary delivery models are government-to-consumer (G2C), government-to-business (G2B), and government to government
(G2G).
ENCRYPTION
A way of coding information in a file or e-mail message so that if it is intercepted
by a third party as it travels over a network it cannot be read. The conversion of data into a form that cannot be readily
understood by unauthorized people, to ensure that only the intended recipient is allowed to read the data. The term applies to
both data in transit (communications) and stored data.
INFORMATION TECHNOLOGY
Includes
matters concerned with the furtherance of computer science and technology, design, development, installation and implementation
of information systems and applications.
INFORMATION TECHNOLOGY RESOURCE (IT Resource)
A resource used for electronic storage, processing
or transmitting of any data or information, as well as the data or information itself. This definition includes but is not
limited to electronic mail, voice mail, local databases, externally accessed databases, CD-ROM, recorded magnetic media, photographs,
digitized information, or microfilm. This also includes any wire, radio, electromagnetic, photo optical, photo electronic
or other facility used in transmitting electronic communications, and any computer facilities or related electronic equipment
that electronically stores such communications.
INTELLECTUAL PROPERTY RIGHTS (IPR)
Protects the intangible
property created by corporations or individuals that is protected under copyright, trade secret and patent laws. IPR are temporary
grants of monopoly intended to give economic incentives for innovative activity.
ISO
International Organization for Standardization, a voluntary,
non-treaty, nongovernment organization, established in 1947, with voting members that are designated standards bodies of participating
nations and non-voting observer organizations. International
Organization for Standardization, the group that developed the OSI protocols.
MALICIOUS CODE
Viruses and worms are related classes of malicious
code; as a result they are often confused. Both share the primary objective of replication. However, they are distinctly different
with respect to the techniques they use and their host system requirements. This distinction is due to the disjoint sets of
host systems they attack. Viruses have been almost exclusively restricted to personal computers, while worms have attacked
only multi-user systems.
MALWARE (virus) Detection Software
Any program or file that is harmful to a computer
user. Thus, malware includes computer viruses, worms, Trojan horses, and also
spyware, programming that gathers information about a computer user without permission.
PATCH
A repair job for a piece of programming software. Patches
are usually released for three reasons:
1. To fix faults in an application or operating system.
2. To alter functionality or to address a new security threat.
3. To change or modify software configuration to make it less susceptible to attacks and more secure.
PURGE
It refers to the persistent free online multiplayer FPS that you can
download, install and join the Battle all completely free, originally released on 2002.
REMOTE ACCESS
The ability of a resource to access the state’s network
via an
external network connection. Remote access generally occurs from remote locations
such as homes, hotel rooms, and off-site offices; however, it may also occur locally within an agency’s physical facilities.
1. LAN-to-LAN connection -
A dial-up connection is used
to setup a connection between two local area networks over the Internet. This arrangement
is called a LAN-to-LAN connection. When a user on one network access a resource on another network, the remote access device
automatically dials the nearest ISP access number to establish a connection to the appropriate remote site.
2. Client-to-LAN connection - The remote user dials
into the nearest ISP access number to connect with the ISP’s remote access server, which then forwards the traffic to
central site system. This arrangement saves on long distance toll charges and eliminates the need for remote access servers
at the central site.
SOCIAL ENGINEERING
1) A non-technical kind of
intrusion that relies heavily on
human interaction and often
involves tricking other people to break normal security procedures, e.g., theft, trickery, coercion, to steal passwords,
keys, userids, telephone numbers used for remote dial in, and tokens;
2) A term used among hackers
and for
cracking techniques that rely
on weaknesses in human nature rather than software.
SPOOFING
An attempt by an unauthorized
entity to gain access to a system by posing as an authorized user. Also, sending messages or e-mail under a false identity.
Strong
Encryption
It is integrated into Private Encryptor™ when you install it,
so to uninstall, you need to uninstall Private Encryptor™.
User ID
The string of characters that identifies you. The name by which you are known
to the network. Also known as username. It is the identifier by which a person or entity is recognized.