The Security Guide Security Guide RSS Feed
*
Accessibility

Background

Internet and Data Security Knowledgebase

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 

...A...

ItemDescription
AES In cryptography, the Advanced Encryption Standard (AES), also known as Rijndael, is a block cipher adopted as an encryption standard by the U.S. government.
Access point A wireless hub that links together different 802.11 network cards to form an ├Žinfrastructure├ć wireless network (as opposed to ad-hoc).
ActiveX A Microsoft system that allows reusable software components, especially applied to those downloaded on web pages to make them interactive.
Ad-hoc network A wireless network that links computers on a peer-to-peer basis rather than routing traffic through a central access point.
Adware Software that runs on a computer without the owner's consent, much like spyware. However, instead of taking information, it typically runs in the background and displays random or targeted pop-up advertisements.
Anti-spyware An Anti Spyware software is similar to an Anti Virus, but it works on programs that don't try to take over your system, but instead pop up ads and unwanted messages.
They are just as nasty, and using Anti Spyware will help identify them. One popular such program is Ad-Aware which is free.
Anti-virus Software to deal with programs like computer viruses, worms, trojan horses and spyware. These programs are all characterised as being unwanted software that install themselves on your computer through deception.
In order to prevent damage by viruses and worms, users typically install antivirus software, which runs in the background on the computer, detecting any suspicious software and preventing it from running.
Application layer Application hardening practices and antivirus software.
Audit security policy Documented controls such as:
- Where and how sensitive data are stored;
- How sensitive data are classified and prioritised;
- Who has access to what data, under what circumstances;
- How data are protected: physically, electronically, procedurally, in storage and in transit;
- Software download policies;
- How data are used, transmitted, retained and destroyed, and what data are not permitted to be transported over the Internet.
Authentication The process for verifying that someone or something is who or what it claims to be. In private and public computer networks (including the Internet), authentication is generally done with passwords.

© RuleWorks - All Rights Reserved - Policy -