Download drive - the usual name given to the floppy disk drive on a personal

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Net bias wikipedia , lookup

Deep packet inspection wikipedia , lookup

Wireless security wikipedia , lookup

Zero-configuration networking wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

List of wireless community networks by region wikipedia , lookup

Computer security wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

Transcript
A
A: drive - the usual name given to the floppy disk drive on a personal computer (PC).
Acceptable use policy - a written agreement that sets out how employees are allowed
to use the Internet. The policy should also specifically set out prohibited uses for the
Internet, rules of online behavior and access privileges. The agreement should be
signed by employees.
Access control - a way of controlling who has access to equipment, data, information,
systems or applications. This can include physical controls, such as locks on doors,
PIN entry systems, turnstiles and window bars, as well as logical controls such as user
names, passwords and file permissions for access to computer systems and networks.
ADSL - asymmetric digital subscriber line - an always-on technology for transmitting
digital information at high bandwidths using existing phone lines. It is asymmetric
because it can receive information faster than it sends it - on the basis that most users
download more information than they upload.
Affiliates - a partnership between a host site and other websites where the affiliate
sites assist the host site by promoting it and helping it to sell products. The host site
pays commission on the traffic it receives from links placed on the affiliate sites.
Always-on - always-on technologies such as broadband can receive data constantly,
rather than having to use a modem to dial up each time access is required. This kind
of access is paid for on a rental or leased-line basis, rather than according to the
amount of time spent using the connection.
Anti-virus software - software that scans emails, attachments and disks for malicious
viruses and worms, and removes them or prevents them entering your computer
system. Because of the rate at which new viruses emerge you should select software
that is capable of being updated on a regular basis, usually by means of a download
from the manufacturer's website. See virus.
Applet - a small application, written in the programming language Java, that is
intended for use within a web browser and cannot be run as a stand alone application.
Typically an applet extends the capabilities of the browser by providing interactive
animations or other simple tasks. See also hostile applet.
Application - or application program - a program designed to perform a specific
function directly for the user. Examples of applications include word processors,
database programs and spreadsheet programs.
ASP - application service provider - an ASP builds, hosts, runs and sells access to
applications over the Internet. This allows individuals and companies to outsource
various functions by leasing or renting applications and software.
Attachment - a file attached to an email that may contain text, spreadsheets, audio
data, pictures, animated graphics and video. The use of email attachments is a
favoured method of maliciously spreading viruses, so good security policies should
warn employees against opening attachments to unexpected mail items.
PDF created with pdfFactory Pro trial version www.pdffactory.com
Audit trail - provides a date and time stamped record of the usage of a system. It
records what a computer was used for, allowing a security manager to monitor the
actions of every user. Audit trails can help to establish an alleged fraud or security
violation.
Authentication - the process of accepting a user's claimed identity (their username)
and verifying they are actually that user.
B
B2B - business to business - a term that describes businesses that sell direct to other
businesses. This kind of terminology encompasses a whole range of acronyms where
B=business, C=consumer, E=employee, G=government, and P=person/peer.
Backdoor Trojan - a Trojan Horse program that provides a remote user or hacker
with the means to bypass the normal access control of a computer, giving them
unauthorised control over it. Once the computer is online, the person who sent the
Trojan can run programs on the infected computer, access personal files, modify and
upload files, and send out spam mail.
Backup - the essential job of saving and storing data on a tape or other storage device,
such as a CD-Rom, outside of a computer hard disk or network. This is done to
protect against the possibility of the original data being lost or corrupted and should
be undertaken on a regular basis.
Balanced scorecard - a method of analysing your business' overall performance.
Balanced scorecards measure performance in four areas: learning and growth,
business process, customer satisfaction and financial performance. Balanced
scorecards show how these areas are interlinked.
Bandwidth - the capacity of data that a line or channel can carry in a given amount of
time. Digital bandwidth is measured in bps - or bits per second. The bandwidth of
your Internet connection will have a significant impact upon your download times.
For example a typical webpage will take approximately 14 seconds to download using
a standard 56kbps modem, compared with 3 seconds for a 256kbps broadband
connection.
Banner - space on a webpage used for advertisements by a third party. The majority
are clickable - by clicking on them you are taken through to the advertiser's site.
Baseline security - method of selecting security measures for implementation within
a business, based upon measures used in similar businesses that are generally
accepted to be well run.
Biometrics - the measurement and analysis of physical characteristics to verify a
person's identity. For example, fingerprint scanning, voice recognition, retina or iris
scanning. This analysis is carried out as part of an authentication process and could
play an increasing role in e-business security.
Bluetooth - a method (protocol) of connecting mobile electronic devices that uses
radio waves without the need of cables. At present the maximum reach between
devices is about 10 metres.
PDF created with pdfFactory Pro trial version www.pdffactory.com
Boolean search - a formal way of searching for information in an archive or
document, connecting search terms with "Boolean operators" such as AND, OR and
NOT. This is similar to, but more formal than, search facilities often provided by
search engines.
BPS - bits per second - the unit used to measure the speed of data transfer. It is often
normally expressed in thousands, kbps, or millions, mbps.
Broadband - any system of connection to the Internet that is characterised as
high-speed - ie can carry data at speeds of more than 128kbps.
Browser - software that enables users to search and view information on the Internet.
Bug - a mistake in a computer program that results in the program or system not
working correctly. Later versions of the program typically contain corrections or
fixes.
Business continuity planning - prepared (and tested) measures for protection of
critical business operations from the effects of a loss, damage or other failure of
operational facilities, that provide crucial functions (eg programs and data). In terms
of information security, this comprises backups and archiving, stand-in hardware etc.
C
C: drive - the usual name given to the main hard disk drive in a PC. If the PC has
several hard drives fitted it may have D: and E: drives too.
CD-Rom - compact disk read-only memory - capable of storing up to 650MB, or
megabytes, of data. The CD-Rom has become popular as the preferred medium for
the distribution of software and the installation of computer programs.
Certification Authority - a trusted entity that confirms that the private key received
as part of a digital signature does belong to the person who is claiming to have signed
it.
CMS - content management system - a system used to manage the content of a
website or intranet. Typically a CMS allows staff to amend and add information and
content to a website using a set of templates without the need for specialist knowledge
of HTML or other web authoring software.
Click and mortar - used to describe companies that do business in both the online
and the real world. The "click" element is used to describe the web browsing activity
and "mortar" used to indicate their involvement in traditional business.
Click streams - the click sequence or path that a user takes as they move between
webpages. Software is available that is capable of tracking users' click streams. The
resultant data can be used by website owners or designers to identify visitors'
preferences and interests and help in planning future developments.
Client-server - a network that has a powerful central computer - the server or file
server, which acts as a data store and controls resources that can be accessed by a
string of desktop PCs or workstations commonly referred to as clients.
PDF created with pdfFactory Pro trial version www.pdffactory.com
Compression - a method by which data of any type is scaled down in size so that it
uses less space for storage and needs a narrower bandwidth for transmission. Data
compression techniques have become increasingly important as the size of files,
particularly those containing image and video data, have become significantly larger.
Contact management software - software that compiles all of your information on
contact names, dates, places and times, and how they relate to staff, customers,
meetings, deliveries and sales in an accessible and practical way.
Cookie - a file downloaded from a web server to the PC of a visitor to a website. This
can be retrieved by the server when the website is subsequently revisited. The file
contains details on the user's preferences and information on previous visits, all of
which can be used to personalise the content for returning visitors.
CPU - central processing unit - the electronic chip at the heart of your computer.
CRM - customer relationship management - the process of targeting, acquiring,
transacting, servicing, retaining and building long-term relationships with customers.
CRM strategies involve improving the people, processes and technology associated
with marketing, sales and services in order to increase customer satisfaction.
Cryptography - the study and practice of scrambling information in a way that
makes it difficult to unscramble, and makes scrambled information intelligible. It is
used as the basis for much computer security as it can keep information confidential,
and can also preserve the integrity of data, particularly when being stored or
transmitted.
D
Data warehouse - a database with reporting and query tools that stores large amounts
of information extracted from a business' various operational systems and organises
this information in a way that helps in management reporting, analysis and
decision-making within the business.
Digital rights management - software-based technologies aimed at protecting the
copyright of data available via the Internet, by enabling secure distribution and/or
disabling illegal distribution of the data. Digital rights management protects
intellectual property by either encrypting the data so that it can only be accessed by
authorised users or marking the content with a digital watermark, or similar method,
so that the content cannot be freely distributed.
Digital signature - the process of adding an electronic marker to the information to
validate both the content and the originator of the data. Digital signatures are easily
transportable, cannot be imitated by someone else, and can be automatically
time-stamped. The ability to ensure that the original signed message arrived means
that the sender cannot easily refuse to accept it later. A digital signature can be used
with any kind of message, whether it is encrypted or not, simply so that the receiver
can be sure of the sender's identity.
PDF created with pdfFactory Pro trial version www.pdffactory.com
DMZ - demilitarised zone - an area that exists between "trusted" and "untrusted"
networks to provide additional levels of security while enabling external access to
information. Typically this involves putting a firewall behind the servers that require
expanded Internet access, so that if they are breached the remainder of the internal
networks are still protected.
Domain name - the unique name that identifies a website, and is also used to describe
the name to the right of the @ sign in an email address, eg
[email protected] and www.businesslink.gov.uk.
DNS - domain name system - the mechanism used to convert a website domain name
to the unique IP address of the server it is housed on. This allows users to locate a
remote server by its name, which is easier to remember than its somewhat obscure IP
address that is made up of digits. You will often see the IP address displayed by your
browser when you are connecting to a particular website.
DVD - digital versatile disk - similar to CD-Roms but with a much greater capacity
and faster access time making them ideal for digital video.
E
E-business - the conduct of business on the Internet. It includes promotion and
marketing, buying and selling goods and services, collaborative design, managing
relationships with trading partners and online recruitment. It also applies to internal
processes, such as the integration of office systems or HR management.
E-commerce - the buying and selling of goods and services over the Internet.
E-government - the provision of government services over the Internet.
EDI - electronic data interchange - used to electronically transfer structured business
data (such as orders and invoices) by agreed message standards, from one trading
partner to another. Standards were agreed before Internet activities were established in
a business context and so formed the forerunner of much of today's business to
business e-commerce.
Email - a written message sent electronically between two or more computers. Emails
can also contain documents, images, video clips or music.
E-marketing - using digital technologies such as the Internet, email and mobile
phones to market your business.
Encryption - scrambling information to prevent unauthorised disclosure or
modification using mathematical techniques. Techniques normally use an encryption
algorithm with a key to ensure that only the intended recipient can read the
information. Encryption can be either:
•
•
symmetric - where the same key is used to encrypt and decrypt
asymmetric - where two mathematically related keys are used, one (the public
key) to encrypt, and the other (the private key) to decrypt
PDF created with pdfFactory Pro trial version www.pdffactory.com
E-procurement - using Internet technologies to help find and buy new services from using email to place orders, to taking part in Internet auctions and marketplaces.
ERP - enterprise resource planning - this is a software system that handles all of a
business' departments and functions in one seamless process. It will typically
incorporate fully integrated packaged software applications, including product
planning, purchasing parts, maintaining inventories, interacting with suppliers,
providing customer service, and tracking orders.
E-tail - the sale of products and services on the Internet, ordinarily used to refer to the
sale of consumer goods.
Ethernet - a local area network protocol supporting the connection of devices such as
computers, printers, workstations, terminals and servers within the same office or
building.
Exchanges - term used in the business to business environment to describe a
website-based service that enables suppliers, buyers and intermediaries to come
together and offer products or services to each other according to set criteria. A third
party usually operates the exchange, stipulating what these criteria are and charging a
fee for sales made.
Executable file - a file that contains a program which will run when the file is opened.
Of particular concern in the email environment are .exe and .com files which, when
opened, cause the operating system to run the attached program. Users who receive
such files as email attachments should always be sure that they come from a trusted
source, since they are often used as a means of transmitting computer viruses.
Extranet - a restricted-access website, accessible to selected external partners (such
as trading partners) for exchanging data and applications and sharing specific business
information. The users of the extranet are a well defined group and access should be
protected by rigorous security features.
F
Firewall - a hardware or software security device that blocks unwanted data and
traffic to a computer network based on set security guidelines. It controls access to the
Internet by internal users and prevents outside parties gaining access to systems and
information on the internal network.
FireWire - based on the IEEE 1394 standard for connecting high-speed external
devices to a computer, such as video and audio-editing devices. It is a complementary
technology to Universal Serial Bus, but with a higher bandwidth.
Flash - a software product that allows users to produce websites with high quality
animation, graphics and interactivity. Most browsers support Flash but a Flash plug-in
can be downloaded free of charge.
G
PDF created with pdfFactory Pro trial version www.pdffactory.com
Gateway - a bridge between two networks, often another name for a firewall or
application proxy.
H
Hacker - a person who attempts to gain unauthorised access to your computers,
usually for the purposes of stealing, deleting or altering information on your system.
Hard disk - a disk that is the main storage unit of a computer and is used to store its
permanent memory even when the computer itself is switched off.
Home page - the main page of a website from which most areas of the site are
accessible. It is usually the first page of the site that the user comes to.
Host - a computer that houses, serves and maintains files for a website. A critical
element in any hosting solution is a fast connection to the Internet.
Hostile applet - an applet that can be embedded in any HTML file such as a web
page, and which is designed to be malicious or cause damage when it is downloaded
onto your IT system.
Hotspot - any location where Wi-Fi network access (usually Internet access) is made
publicly available. Hotspots can often be found in airports, hotels, coffee shops, and
other places where business people tend to congregate. They enable a user with a
laptop equipped for Wi-Fi to contact a local hotspot and get connected through its
network to reach the Internet. If required, a user can access their own business
remotely with a secure connection.
HTML - hypertext mark-up language - is the authoring software language used on the
Internet for the creation of webpages. It uses a set of markup symbols or codes that
tell the web browser how to display a webpage's words and images for the user. Each
individual markup code is commonly referred to as a tag.
HTTP - hypertext transfer protocol - HTTP is the standard way of transferring
information across the Internet and the world wide web. It supports a variety of
different media and file formats, across a variety of platforms, and is invisible to the
user.
Hub - the central point of a network where circuits are connected, with data arriving
from one or more directions then being forwarded out in one or more directions.
Network hubs act as junction boxes, permitting new computers to be connected to the
network as easily as plugging a power cord into an electrical socket.
Hyperlink - a link on which a user can click in order to access related information on
the same webpage, different pages within the same website, or to a different site
altogether, making navigation much easier. The hyperlink is normally indicated by
underlined or coloured text.
I
PDF created with pdfFactory Pro trial version www.pdffactory.com
Imaging - a technique for taking an exact copy of storage media such as a hard drive.
In addition to data files, imaging applies to systems areas, errors and hidden files. It is
often used as a means to preserve digital forensic evidence. Imaging is normally
performed using specialist equipment and software.
Infrared - method of exchanging information between enabled devices such as
mobiles phones and personal digital assistants (PDAs) without the need for cables.
Internet - a global network of computers with users all over the world. Anyone can
join this network and from your computer you can send and receive information
anywhere in the world 24 hours a day.
Interstitial - this is an advertisement that appears in a separate browser window while
you wait for a webpage to load. Interstitials typically contain large graphics and
streaming presentations.
Intranet - a privately maintained computer network, using the same browser
technology and network protocols as the Internet, that can be accessed only by
authorised users, typically employees of the organisation that owns it.
Intrusion detection - detection of break-ins or attempted break-ins by manual means
or by software expert systems operating on the basis of log files or other information
available on the network. An Intrusion Detection System (IDS) effectively acts a
"burglar alarm" for a network or a system. Additionally, it can monitor and log
forensic evidence to support any legal case.
IPsec - Internet protocol security - a protocol that provides encryption, and
authenticates the sender of the information. IPsec is most commonly used in the
implementation of VPNs (virtual private networks) and for remote user access
through dial-up connection to private networks.
ISDN - integrated services digital network - a set of international standards for a high
speed digital network used for transmitting digital voice and data over telephone lines
at speeds up to 128kbps.
ISP - Internet service provider - a company that provides its customers with access to
the Internet. Some ISPs also offer a number of email addresses and web space on
which customers can house their own websites.
J
JPEG - an internationally agreed standard for the compression and decompression of
still images, such as photographs. The compression rates used do not compromise the
quality of the image and their fast transfer rate and high quality make them ideal for
use on the Internet. JPEGs can be recognised by the file extensions .jpg and .jpeg.
K
Knowledge management - the technologies involved in gathering, organising,
sharing and using the knowledge within a company. This knowledge can be structured
PDF created with pdfFactory Pro trial version www.pdffactory.com
information held in systems and files, or pointers to the skills and experience that
employees possess.
L
LAN - local area network - a communications network that links together computers
that are close to each other, for example in the same office or floor of a building. This
enables them to share facilities such as printers, exchange files or access the Internet
through a single connection.
Location aware services - the use of positioning technologies to enable content and
other service providers to exploit knowledge of the geographical location of the user
of a mobile device. They can then offer a range of customised information relating to
the location of the user.
Log file - a file that tracks the access activity for a host computer or server. For
example a log file may contain information about people accessing your website or
attempting to gain access to your corporate network. Log files can be used to gather
information on usage patterns, for troubleshooting purposes, or to spot suspicious
activity.
M
Macro virus - a computer virus that is embedded within word processing documents
or spreadsheets that will activate when the file is opened. The effect can range from
minor inconvenience to substantial corruption, where the data is rendered unusable or
inaccessible.
Malicious code - a term for a virus, hostile applet or code fragment downloaded
from a web server or sent directly from one system to another.
Management information system - a type of computer system used by managers to
support the functions of planning, controlling and decision making by providing
summaries and reports on the business' basic operations. See data warehouse.
MB - megabyte - term used to represent 1,000,000 bytes worth of information or
computer memory.
Metadata - a definition or description of data, in effect "data about data". Metadata is
commonly used in content management systems and data warehouses, with tags or
descriptors added to information to help with its subsequent retrieval.
Mirror sites - websites that are an exact replica of the original site and have been
copied to other servers in order to spread the load on the original server. They can
assist in reducing network traffic, provide improved access to the files held on the
website and speed up the download times for users.
Modem - modulator/demodulator - a device that converts the digital signals from
computers into analogue signals and vice versa, so they can be transmitted over phone
lines.
PDF created with pdfFactory Pro trial version www.pdffactory.com
Multimedia - applications combining the use of more than one media, such as data,
voice and video.
N
Network - a computer network is used to connect all types of computers and related
things such as terminals, printers and modems. There are local area networks (LANs)
that exist in a limited geographical area such as an office or building, or wide area
networks (WANs) that connect computers over large geographic areas, perhaps even
internationally.
Node - any computer or device connected to a network.
O
Operating system - the software program that manages the basic operations of a
computer system. This includes loading, scheduling, resource allocation, event
processing and termination.
Outsourcing - contracting another company to provide a service or group of services,
rather than doing it in-house.
P
Packet filtering - a type of firewall that, although fast, has little intelligence. This
reduces its effectiveness and flexibility.
Parallel port - the socket on a computer that a printer usually plugs in to.
Password - an easily remembered but hard to guess string of letters and numbers that
you have to enter in order to use a protected resource such as a computer system. In
practice this offers only basic security by itself.
Patch - updated computer code that is published either as part of ongoing
development, or to meet known vulnerabilities and other problems in code. Most
software vendors have sites that provide patches and hot fixes. All systems should be
patched to the level recommended by the vendor as un-patched systems are open to
threats.
PDA - personal digital assistant - a small, handheld computer with, typically, diary
and address book applications and, increasingly, mobile phone connections built-in
(also known as Palmtops).
PDF - portable document format - a type of file created by Adobe Systems that
captures all of the elements of a printed document as an electronic image that can be
viewed, navigated and printed but, importantly, not edited by the end user. These
images can be easily transmitted across the Internet and viewed on any computer that
has Adobe Acrobat Reader software. A proprietary reader is available free of charge
at the Adobe website. PDF files are especially useful for documents such as magazine
PDF created with pdfFactory Pro trial version www.pdffactory.com
articles or product brochures in which you want to preserve the original graphic
appearance online.
Peer-to-peer - a network in which each computer node has equal abilities. A
computer can serve as both a server and a user, and each computer has access to all
the network's resources on an equal basis.
Penetration testing - the portion of security testing in which the testers attempt to
circumvent the security features of a system. The testers sometimes use system design
and implementation documentation, which may include listings of system source code,
manuals, and circuit diagrams. They can also work under the same constraints applied
to ordinary users. This practice is sometimes called "ethical hacking".
Peripheral - any device that is not part of the main computer but that is situated
relatively close by, for example a printer or scanner.
Phishing - term used to describe the use of bogus e-mails and websites to trick the
user into supplying confidential or personal information such as bank account
numbers, PINs or passwords.
PKI - public key infrastructure - the use of public key technology in e-commerce to
help identify people and secure transactions. This uses cryptography to support a
variety of functions, including the ability to confirm the identity of an individual or
company as established by an intermediary (the Certification Authority), and the
ability to prove that a transaction originated with that individual or company, so it
cannot subsequently be denied (often called non-repudiation).
Plug-in - a specialised software program that is used to expand the capability of a
web browser. It is generally used to provide interactivity and functions (such as
moving and animated objects and live audio) that make use of the computer's sound
or video cards.
Portal - a website that acts as a gateway to access the web. Portals offer services
including directories of websites, facilities to search for other sites, news, weather
information, travel news and online shopping. There are also business to business
portals that address specific business groups or communities of users.
Privacy policy - any business engaged in online activities or electronic commerce has
a responsibility to adopt and implement a policy for protecting the privacy of
individually identifiable information. The policy must state clearly what information
is being collected, how that information is to be used, and any possible third party
distribution of that information. It should also incorporate a statement of the business'
commitment to data security. At a minimum, individuals should be given the
opportunity to opt out of any use that is unrelated to the purpose for which the
information was collected.
Processor - the brain of a computer, also known as the central processing unit.
Proxy - a computer (server) that sits between a client application (for example, a web
browser) and a real server. The proxy intercepts all requests to the real server to see if
it can fulfil the requests itself. If not, it forwards the request to the real server.
PDF created with pdfFactory Pro trial version www.pdffactory.com
Pull technology - type of technology used on the Internet where visitors to websites
search for and request information for subsequent downloading to their computer.
Push technology - technology that enables information to be automatically delivered
from the website to the customer. The information may be customised to the
requirements of individual users and can include new product information or regular
content updates. This contrasts with pull technology where the user initiates the
downloading of content.
R
RAM - random access memory - a computer's main working memory, where the
operating system, applications programs and data in current use are kept. It retains
memory for as long as the computer is running, but loses its data as soon as the
computer is turned off.
Relational database - a database that is organised and accessed according to
relationships between data items. The connections or relations between the different
sets of data mean that if you update one area, other areas are updated too.
Remote access - the connection of a device through communications lines such as
phone lines, wide area networks (WANs) or virtual private networks (VPNs) in order
to access applications and information hosted elsewhere.
RFID - radio frequency identification - technology that enables the tracking of goods
and assets, particularly in the retail supply chain. It is increasingly used as an
alternative to the bar code, with major retailers using RFID tags for the pallets and
cases they distribute. The data held on the tag can be transmitted wirelessly to a
receiver via radio waves enabling its identity, position and state to be established.
Risk management - planning and taking preventative action to minimise any risks to
a business and its efficiency, profitability and overall performance.
Router - a communications device that connects two networks, for example a local
area network to the Internet. A router sends its traffic by reading the destination
addresses of the blocks of data (packets) and deciding on the best route to send them
so that they arrive at the correct network address.
S
Satellite - an alternative way of achieving a broadband connection where the
conventional broadband Internet access via telephone lines is not available, for
example in rural or isolated areas. It requires the installation of a special satellite dish.
Scalability - the ability to expand the number of users or increase the capabilities of a
computing solution, without making major changes to the systems or application
software. Essential to prevent a technology solution from being a stumbling block to
organisational growth.
PDF created with pdfFactory Pro trial version www.pdffactory.com
Scanner - a device that captures images from photographic prints, magazine pages,
and similar sources for subsequent storage, editing and modification. Scanners come
in hand-held, feed-in, and flatbed types.
SCM - supply chain management - managing your supply chain involves focusing on
how materials, information and finance move along the chain, and making these flows
as seamless and efficient as possible.
Search engine - a tool that creates indices of websites, usually based upon their
content and key words. The search engine has an interface that allows the user to key
in specific search terms and then presents them with a list of those web addresses that
meet the specified requirement. The list is presented in hypertext form which means
that the user can click on any item in the list and go directly to that website.
Serial port - a socket on a computer that is used for serial communication (one bit at
a time) between a computer and another device. The serial port is normally used for
the connection of a modem.
Server - a powerful computer on a network that acts as a store for data and software.
It also controls access to workstations, printers and other parts of the network.
Site analysis tool - a piece of software that enables the owner of a website to measure
the usage patterns of the site by monitoring the activity of its visitors.
SLA - service level agreement - A contract between a service provider and a customer
that specifies, in measurable terms, what services the provider will deliver to the
customer. Typically used by commercial service providers such as ISPs and
outsourcing companies. The agreement is likely to include the percentage of time that
a specified service should be available (the up-time), performance benchmarks against
which actual system performance can be measured, and the expected response times
for dealing with a variety of technical issues and problems.
Smart Card - a card with an embedded chip used for a variety of purposes such as
proving the user is valid (authentication). It does this by storing authentication
credentials and submitting them, or by actually performing an operation on the card
itself (using a specific key), to demonstrate the validity of the user.
Sniffer - a program that monitors data travelling over a network. While it can be used
as a legitimate network management tool to detect bottlenecks and problems, it can
also be used for illicit purposes as it may provide a hacker with the ability to read the
data in a packet as well as the source and destination addresses.
Spam - unsolicited emails sent to large numbers of recipients.
Specification - a formal statement of what a computer program or system must do.
Spoofing - a term used to describe an online imposter who is pretending to be
someone or something they are not. The most common form of spoofing is the
forging of an email header so that the message appears to have come from someone
other than the actual source. This approach is frequently used by distributors of spam.
PDF created with pdfFactory Pro trial version www.pdffactory.com
SSL - secure sockets layer - a network protocol that provides security to web-based
network traffic via authentication, encryption and message integrity services. It is
used in e-commerce to prevent hackers from stealing sensitive information contained
in electronic transactions.
Supply chain - the chain of relationships between your business and your customers
and suppliers, and the links and processes that join you together.
T
Teleworking - a type of working that relies on IT to allow people to operate from
remote locations such as their homes or "telecottages" and communicate
electronically with their corporate systems and colleagues.
Trojan Horse - a program that causes unexpected and undesirable effects when
installed or run by an unsuspecting user. These effects may be immediate or they may
wait for some predetermined time or condition before they are triggered.
U
URL - uniform resource locator - a standard form for addresses on the Internet. A
URL can lead you to a file on any computer connected to the Internet anywhere in the
world. Usually this is a page of a website (frequently the home page) but it can also be
a downloadable file or an audio or video stream.
USB - universal serial bus - this is fast becoming the usual way to plug additional
devices such as printers and cameras into a PC. USB is cabled in a daisy-chain
fashion and up to 127 devices can be supported from a single USB connection.
User acceptance testing - a phase of software development in which the software is
tested in the "real world". It can be undertaken in-house but increasingly the test
version is made available for downloading and free trial over the web. User comments
are fed back to the developers who make final changes before releasing the software
commercially.
User ID - a unique name assigned to each user of a computer system in conjunction
with a secret password. One of the key enablers of security is accountability - any
action can be attributed to a specific user ID. This means that user IDs should never
be shared and that you should never give your password to anyone else.
V
Virus - a malicious computer program that can cause damage to systems and
potential corruption or destruction of information. These can be contracted through
loading software, opening attachments in unchecked emails and downloading
programs or documents from websites. You should always use up-to-date anti-virus
software to detect viruses, prevent access to infected files and help eliminate the
infection. See worm.
PDF created with pdfFactory Pro trial version www.pdffactory.com
Virtual team working - using communications technologies to work collaboratively,
no matter where team members are based.
VoIP - Voice over Internet Protocol - uses the Internet to make phone calls across
computer networks. It allows you to integrate call handling and reporting with other
business processes, and can be used in individual office networks or between sites.
VPN - virtual private network - a VPN is a private data network that makes use of a
public network such as the Internet. VPNs maintain privacy through the use of
tunnelling protocol (which provides a secure point-to-point "tunnel" for data transfer)
and other security procedures, particularly data encryption. They are a significantly
cheaper option than a dedicated private network.
W
WAN - wide area network - a network that spans a large geographical distance.
Increasingly it may be made up of cable, satellite and microwave technologies.
WAP - wireless application protocol - a carrier-independent, transaction-oriented
protocol for wireless data networks that allows Internet access over wireless devices
such as mobile phones.
War driving - the practice of driving around a city searching for unsecured wireless
local area network (WLAN) signals within a geographic area. Because a WLAN can
have a range that extends beyond an office building, a hacker may be able to gain
access to the network and subsequently obtain a free Internet connection or attempt to
gain access to corporate records and other information.
Web server - a specific type of server that contains pages, images and files, which are
accessed and displayed by a browser. Each page can contain links to other pages,
which a user clicks on to move from one page to another.
Web Services - a standards-based initiative (primarily using XML) that aims to bring
together existing protocols and standards and tie them together in a way that allows
the delivery of components using the Internet as the backbone method of delivery.
Wi-Fi - wireless fidelity - a high frequency, wireless, local area network (LAN) that
operates over a short distance.
Wireless LAN - wireless local area network - a local network that allows devices to
connect to each other using radio wave technology rather than conventional cabling or
fibre optics.
Website - a collection of webpages in a specific location on the Internet, on a
particular subject, beginning with a home page.
Workflow - describes the analysis of tasks, procedures, sequences of steps and
required information that should be undertaken to support a business process.
Workflow software can be used to automate the business procedures by ensuring that
the correct steps are followed and providing the correct forms and information to
support the individual tasks.
PDF created with pdfFactory Pro trial version www.pdffactory.com
World wide web - commonly referred to as the web, it is the HTTP server network
that can combine text, graphics, audio and other formats in one document and make
them available to anyone in the world via the Internet. The web uses hypertext and
multimedia techniques to make it easy for anyone to roam and view documents using
a browser.
Worm - similar to viruses but they do not need a carrier program or document. They
typically spread themselves without any action by a computer user. Worms simply
create exact copies of themselves and travel between connected computers by
exploiting security "holes" in the computer's operating system. As the worm spreads,
it can create a lot of traffic on the Internet, slow down communications or cause
computers to crash. A worm may carry a virus, but it more commonly causes
computer tasks to slow down or completely halt. See virus.
XYZ
XML - extensible markup language - used extensively in e-commerce, XML is a
standard for data formats that is designed to enable different computer programs,
including business software packages, to share and process data. XML uses a tag
system that allows companies or trading communities wishing to exchange business
information, to agree upon a standard or common way to describe, for example,
individual products and elements. This exchange of information can then take place
irrespective of the different software or hardware platforms that may be in place.
From: http://www.businesslink.gov.uk/
PDF created with pdfFactory Pro trial version www.pdffactory.com