A | B |
access-control software | Software that only allows user access according to the user's needs. Some users can open only files that are related to their work. Some users are allowed read-only access to files they can see but not change. |
active badge | A microprocessor-controlled ID badge that broadcasts infrared identification codes to a network receiver that updates a badge-location database. |
antivirus | A program designed to search for viruses, notify users when they're found, and remove them from infected files. |
authentication mechanisms | Computer network security measures that ensure that only legitimate users have access to the system by asking potential users to identify themselves. |
authorization mechanisms | Computer network security measures that guarantee that users have permission to perform particular actions. |
autonomous systems | Complex systems that can assume almost complete responsibility for a task without human input, verification, or decision making. |
backup | The process of saving data-especially for data recovery. Many systems automatically back up data and software onto disks or tapes. |
biometrics | Measurements of individual body characteristics, such as a voice print or fingerprint; sometimes used in computer security. |
Code of Ethics | Policies and procedures, such as those developed by companies and by organizations such as the ACM (Association for Computing Machinery), to guide the behavior of information workers. |
computer crime | Any crime accomplished through knowledge or use of computer technology. |
computer security | Protecting computer systems and the information they contain against unwanted access, damage, modification, or destruction. |
denial of service (DoS) attack | A type of computer vandalism that bombards servers and Web sites with so much bogus traffic that they're effectively shut down, denying service to legitimate customers and clients. |
encryption | Protects transmitted information by scrambling the transmissions. When a user encrypts a message by applying a secret numerical code (encryption key), the message can be transmitted or stored as an indecipherable garble of characters. The message can be read only after it's been reconstructed with a matching key. |
ethics | Moral philosophy-philosophical thinking about right and wrong. |
hacking | Electronic trespassing and vandalism. |
identity (ID) theft | The crime, committed by hackers or other unscrupulous individuals, of obtaining enough information about a person to assume his or her identity, often as a prelude to illegally using the victim's credit cards. |
logic bomb | A program designed to attack in response to a particular logical event or sequence of events. A type of software sabotage. |
malware | Malicious software, especially destructive programs such as the viruses, worms, and Trojan horses devised and spread by computer saboteurs. |
passwords | The most common security tools used to restrict access to computer systems. |
plagiarism | The act of presenting someone else's work as one's own. |
smart weapon | A missile that uses computerized guidance systems to locate its target. |
social engineering | Slang for the use of deception to get individuals to reveal sensitive information. |
spoofing | A process used to steal passwords online. |
spyware | Technology that collects information from computer users without their knowledge or consent. |
Trojan horse | A program that performs a useful task while at the same time carrying out some secret destructive act. A form of software sabotage. |
uninterruptible power supply (UPS) | A hardware device that protects computers from data loss during power failures. |
viruses | Software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. A form of software sabotage. |
worms | Programs that use computer hosts to reproduce themselves. Worm programs travel independently over computer networks, seeking out uninfected workstations to occupy. A form of software sabotage. |