| A | B |
| ACL | A checklist permitting or denying users access to and from resources. |
| Active X Controls | Technology developed by Microsoft that allows software components to interact with one another in networked environments, like the Internet. |
| Back Door | A hole left in software by its designer for them to be able to get into it to maintain it; sometimes used by crackers to maliciously break into the software to cause harm. |
| Content Filtering | A security feature that blocks certain websites because of the type of information displayed on those pages. |
| Cyberterrorism | The process of using the Internet and technology to cause lphysical, real wod harm by political or religious organizations. |
| Digital Certificate | Identification issued by a trusted third party that verifies the identification and that it belongs to the company or individual that it claims to be from. |
| DoS | Denial of Service; attack that floods a network with requests so that it slows or completely interupts network traffic. |
| Encryption Algorithm | Code used to turn ordinary data into a scrambled form that makes it hard for someone to decode. |
| Exploit | A way to take advantage of some vulnerability of computer software or hardware such as bugs or glitches. |
| Hashing | An encryption technique that uses keys to store and retrieve data. |
| Hoaxes | Email sent to intentionally intimidate the receiver. |
| Intrusion Detection Systems | used to detect malicious traffic and computer usage on a network that a firewall cannot detect. |
| Kerberos | Authentication system that uses a master ticket that is fgiven out by the Key Distribution Center and tehn service tickets are issued if additional resources are needed. |
| Meta Data | Information about information. |
| Phishing | Email scam intended to trick a user by sending them emails that look like they're from reputable sources and asking for personal information like passwords and credit card information to use for fraudulent purposes. |
| Ping | A troubleshooting tool used to verify connectivity to network resources. |
| RAID | Using multiple hard drives to improve performance or for fault tolerance. |
| Sniffer | A progrma that watches packets going across a network. |
| Social Engineering | Illegally entering computer systems by getting people to reveal IDs, passwords, and aother confidential information. |
| Software Exploitation | Programs that are written to go after software weaknesses over a network or the Internet. |
| Spoofing | Similar to phishig; making something appear to be something else by deception. |
| TCP/IP Hijackig | Inserting commands into active communication between two machines on a network but looking like the communication is coming from one of the authenticated users. |
| Threat | Forewarning of an attack on a computer system. |
| Tokens | Security device given to a network user either physically, like a credit card, or in software. |
| Vulnerability | A weakness in software of hardware that may results in the system, data or applications being at risk. |