NET Framework
NET Framework is a software framework that is available with several Microsoft Windows operating systems. It includes a large
library of coded solutions to prevent common programming problems and a virtual machine that manages the execution of programs
written specifically for the framework. The .NET Framework is a key Microsoft offering and is intended to be used by most
new applications created for the Windows platform.
ASP
Active Server Pages - a scripting language created by Microsoft for dynamically created web pages and database functions.
Web pages created with ASP usually have an .asp suffix.
Access
Access is simply being able to get to what you need. Data access is being able to get to (usually having permission to use)
particular data on a computer. Web access means having a connection to the World Wide Web through an access provider or an
online service provider such as America Online.
Access Privileges
Active Hyperlink
A hyperlink is considered to be an active hyperlink from the time a user presses and releases the mouse button when clicking
on the hyperlink. When designing a Web page, you can choose a font color to represent active hyperlinks.
Administrator
A person who manages a computer, a network or specific software components. In a personal computer, users are typically the
administrators, also known as "system administrators" and have rights to perform all operations in the computer.
Authentication
The process of identifying an individual, usually based on a username and password. In security systems, authentication is
distinct from authorization , which is the process of giving individuals access to system objects based on their identity.
Authentication merely ensures that the individual is who he or she claims to be, but says nothing about the access rights
of the individual.
Data Administrator
A person who coordinates activities within the data administration department. Same as "database analyst."
E-commerce
Performing business transactions on the Internet - which may include the use of credit cards, 'shopping trolleys', forms,
and secure servers.
E-government
A generic term that refers to any government functions or processes that are carried out in digital form over the Internet.
Local, state and federal governments essentially set up central Web sites from which the public (both private citizens and
businesses) can find public information, download government forms and contact government representatives.
E-government also refers to the standard processes that different government agencies use in order to communicate with each
other and streamline processes.
Encryption
The translation of data into a secret code. Encryption is the most effective way to achieve data security. To read an encrypted
file, you must have access to a secret key or password that enables you to decrypt it. Unencrypted data is called plain text
; encrypted data is referred to as cipher text.
Information Technology
IT (information technology) is a term that encompasses all forms of technology used to create, store, exchange, and use information
in its various forms (business data, voice conversations, still images, motion pictures, multimedia presentations, and other
forms, including those not yet conceived). It's a convenient term for including both telephony and computer technology in
the same word. It is the technology that is driving what has often been called "the information revolution."
Information Technology Resource (ITR)
Includes, but is not limited to computers, databases, software, servers, and the Champaign County Information Network (CCIN);
files, folders, and documents; Internet access and web pages; and electronic mail including both Intranet and Internet.
Intellectual Property Right
Intellectual property refers to the ownership of intangible and non-physical goods. This includes ideas, names, designs, symbols,
artwork, writings, and other creations. It also refers to digital media, such as audio and video clips that can be downloaded
online.
ISO
ISO, founded in 1947, is a worldwide federation of national standards bodies from some 100 countries, with one standards body
representing each member country.
According to ISO, "ISO" is not an abbreviation. It is a word, derived from the Greek isos, meaning "equal", which is the root
for the prefix "iso-" that occurs in a host of terms, such as "isometric" (of equal measure or dimensions) and "isonomy" (equality
of laws, or of people before the law).
Malicious Code
Malicious code is the term used to describe any code in any part of a software system or script that is intended to cause
undesired effects, security breaches or damage to a system. Malicious code describes a broad category of system security terms
that includes attack scripts, viruses, worms, Trojan horses, backdoors, and malicious active content.
Malware (virus) Detection Software
Malware is code designed for a malicious purpose, such as obtaining root privilege on a host. A malware detector identifies
malware and thus prevents it from adversely affecting a host. In order to evade detection, malware writers use various obfuscation
techniques to transform their malware.
Patch
Also called a service patch, a fix to a program bug. A patch is an actual piece of object code that is inserted into (patched
into) an executable program. Patches typically are available as downloads over the Internet.
Personal IT Resources
Purge
To systematically and permanently remove old and unneeded data. The term purge is stronger than delete. It is often possible
to regain deleted objects by undeleting them, but purged objects are gone forever.
Remote Access
The ability to log onto a network from a distant location. Generally, this implies a computer, a modem, and some remote access
software to connect to the network. Whereas remote control refers to taking control of another computer, remote access means
that the remote computer actually becomes a full-fledged host on the network. The remote access software dials in directly
to the network server. The only difference between a remote host and workstations connected directly to the network is slower
data transfer speeds.
Social Engineering
In computer security, social engineering is a term that describes a non-technical kind of intrusion that relies heavily on
human interaction and often involves tricking other people to break normal security procedures. A social engineer runs what
used to be called a "con game".
Spoofing
Faking the sending address of a transmission in order to gain illegal entry into a secure system.
Strong Encryption
An encryption method that uses a very large number as its cryptographic key. The larger the key, the longer it takes to unlawfully
break the code. Today, 256 bits is considered strong encryption. As computers become faster, the length of the key must be
increased.
UserID
A number or name which is unique to a particular user of a computer or group of computers which share user information. The
operating system uses the uid to represent the user in its data structures, e.g. the owner of a file or process, the person
attempting to access a system resource etc.
|