A | B |
Internet Service Provider (ISP) | Provides a connection to the Internet |
PPPoE -Point-to Point Protocol over Ethernet | requires user name and password for Internet connection via ISP |
Broadband connection | always on, settings assigned by DHCP server |
dial-up | connect via a modem and phone line |
Web Proxy Auto-Discovry (WPAD) | notifies browsers of proxy servers on network |
Uniform Resource Locator (URL) | address of a location on the Internet |
https:// | secure connection using hypertext protocol- uses SSL encryption |
telnet:// | alows control of another computer |
file:// | local file system resource |
ipp:// | allows printing via Internet |
Idap:// | lightweight Directory Access Protocol |
host | domain name or IP address of system |
port | logical connection to a specific protocol |
proxy server | acts as an intermediary for requests from clients seeking resources from other servers |
Profile Assistant | maintains user information to auto complete web forms |
session cookie | destroyed when you close your browser |
P3P | standards that allows users to specify privacy preferences |
offline browsing | syncs files while online whether site is visited or not |
FTP | transfers files from a server via the Internet |
WebDAV | allows access to web folders |
group policy | allows remote configuration of Internet Explorer |
cross-site scripting | scripts or tags placed into a web page that call up forms or pages from attackers web site |
Zone Elevation | leverages scripts or controls from one site to carry out malicious actions on another site |
content zones | configures browser to repond the same way to a group of sites with similar levels of trust |
High Level | compact policy and explicit permission for personal info ist party |
Medium High Level | compact policy for 3rd parties and explicit permission for personal info 1st party |
Medium Level | compact policy for 3rd parties, allows personal infor from 3rd with implicit permission, delete personal info on close of browser |
Low Level | compact policy for 3rd parties, persoanl info obtained by 3rd party deleted on close of browser |
Accept all Cookies | saves all cookies, can be read by site that creates them |
compact policy | computer- readable privacy statment |
security zone | same as web content zones |
cookie | track data about user and save the info in your web browser |
restricted Zone | sites suspected of malicious code |
Internet zone | all sites not otherwise designated, prompts user |
Local Intranet zone | elevated level of trust, relaxed requirements |
Trusted sites zone | explicitly trusted by user, most prompts turned off |
Locked-Down Local Machine Zone | extra security user is prompted for settings to use |
Local Machine Zone | objects that exist on local machine |
pop-up | small window that shows ads |
cache | saved html files for faster loading of web pages |