| A | B |
| Windows Registry | is a hierarchical database that stores configuration settings and options on Microsoft Windows operating systems. |
| FAT | File Allocation Table |
| NTFS | (New Technology File System) is the file system that the Windows NT operating system (XP, Windows 7, 8, 10) uses for storing and retrieving files on a hard disk. |
| Active Directory | Is a special-purpose database run on a Windows Server to provide authentication and authorization to resources. |
| Windows Permissions | Allows or denies changing the attributes of a file or folder, such as read-only or hidden. Attributes are defined by NTFS. The Write Attributes permission does not imply creating or deleting files or folders, it only includes the permission to make changes to the attributes of a file or folder. |
| Auditing | Establishing audit policy is an important facet of security. Monitoring the creation or modification of objects gives you a way to track potential security problems, helps to ensure user accountability, and provides evidence in the event of a security breach. |
| Wiretapping | the practice of connecting a listening device to a telephone line to secretly monitor a conversation. |
| Worm | is a standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. Unlike a computer virus, it does not need to attach itself to an existing program. |
| Trojan Horse | is a program in which malicious or harmful code is contained inside apparently harmless programming or data in such a way that it can get control and do its chosen form of damage, such as ruining the file allocation table on your hard disk. |
| Malware | software that is intended to damage or disable computers and computer systems |
| Buffer Overflow | In computer security and programming, a buffer overflow, or buffer overrun, is an anomaly where a program, while writing data to a buffer, overruns the buffer's boundary and overwrites memory in adjacent locations. This is a special case of the violation of memory safety. |
| Security Zones | Internet Explorer divides your Internet world into zones, so that you can assign a Web site to a zone with a suitable security level. There are four zones: Internet, Local Intranet, Trusted Sites and Restricted Sites |
| Cookies | A small text file (up to 4KB) created by a Web site that is stored in the user's computer either temporarily for that session only or permanently on the hard disk (persistent cookie). Cookies provide a way for the Web site to recognize you and keep track of your preferences. |
| Encryption | is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it. Unencrypted data is called plain text ; encrypted data is referred to as cipher text. |
| Symmetric encryption | is the oldest and best-known technique. A secret key, which can be a number, a word, or just a string of random letters, is applied to the text of a message to change the content in a particular way. |
| Asymmetric encryption | is a form of Encryption where keys come in pairs. What one key encrypts, only the other can decrypt. Frequently (but not necessarily), the keys are interchangeable, in the sense that if key A encrypts a message, then B can decrypt it, and if key B encrypts a message, then key A can decrypt it. |
| Inherited permissions | are those that are propagated to an object from a parent object. Inherited permissions ease the task of managing permissions and ensure consistency of permissions among all objects within a given container. |
| Group Policies | is an infrastructure that allows you to implement specific configurations for users and computers. Group Policy settings are contained in Group Policy objects (GPOs), which are linked to the following Active Directory directory service containers: sites, domains, or organizational units (OUs). |
| Cryptography | The conversion of data into a secret code for transmission over a public network. Today, most cryptography is digital, and the original text ("plaintext") is turned into a coded equivalent called "ciphertext" via an encryption algorithm. |
| Stream Cipher | is a symmetric key cipher where plaintext digits are combined with a pseudorandom cipher digit stream (keystream). In a stream cipher each plaintext digit is encrypted one at a time with the corresponding digit of the keystream, to give a digit of the ciphertext stream. |
| Block Ciphers | is a deterministic algorithm operating on fixed-length groups of bits, called blocks, with an unvarying transformation that is specified by a symmetric key. |
| PKI | (Public key infrastructure) In cryptography, this is an arrangement that binds public keys with respective user identities by means of a certificate authority (CA). The user identity must be unique within each CA domain. |