Glossary of Key Terms

A

Advanced Encryption Standard (AES)

Also known as Rijndael, a block cipher encryption standard that creates keys from 128 bits to 256 bits in length.

Adware

Adware is any software application in which advertising banners are displayed while the program is running.

Affiliate marketing

In this model, companies affiliated with advertising agencies place ads on their sites for a financial incentive.

Analog transmissions

A method for voice transmissions using a continuous signal that varies in frequency, amplitude, and range.

Application hardening

The process of securing applications in use on a network.

Archie

The early search tool of Gopher.

ARPANET

The first computer network based on the packet-switching principle.

Attack

Execution of a plan to bypass security of systems and gain unauthorized access to a resource.

Audio conferencing

Establishing an audio meeting over a network or PSTN line.

Auditing

Keeping records of operations and transactions to assess the accuracy of processes.

Authentication Header (AH)

A protocol primarily responsible for the authentication and integrity verification of data packets. AH does not provide any form of encryption.

Authentication

The process of establishing the validity of a person's identity.

Authorization

The process of giving an individual access to information after authentication.

Automatic directory listing

Identifies all of the files within a given directory on a Web server if the base file is not found. The base files refer to such files as index.html, default.htm, index.php, and so on.

Availability

The degree to which a system is operable and committable at a start of a process or function.

B

Batch processing

A processing strategy in which transactions are not handled immediately; rather, receipts are collected and processed as a batch.

Black box testing

A software testing methodology that looks at available inputs for an application and the expected outputs from each input.

Blacklist

A practice to define what is unacceptable, excluding all other input as acceptable.

Bounce rate

The percentage of single-page visits to a Web site, or those visitors that "bounce away" to another site. The bounce rate is a standard measure of quality and relevance to the visitor. The lower the bounce rate, the better the site.

Broken authentication

The result when an attacker compromises authentication credentials, gaining access to all resources associated with those credentials. Social engineering is a common method of obtaining user IDs and passwords.

Brute-force attack

An attack that attempts to crack a cryptographic key.

Buffer overflow

Occurs in an application when more information is stored in the buffer than the space reserved for it.

Bulletin Board System (BBS)

A centralized system through which users can exchange messages; a message board.

C

Calendaring software

Software used to maintain personal or group schedules.

Canonicalization attacks

Backtracking up a directory path using "../" or dot, dot, slash to access areas not intended to be accessible.

CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart)

Mechanisms used to protect against automated attacks. The function of CAPTCHA is to provide a challenge/response mechanism to help ensure that a Web form is being filled out by a human and not an automated process.

Carbon copy (CC)

Named when carbon paper was used to make a copy, this is an e-mail sent to one or more recipients apart from the primary (To:) recipient.

Centralized processing

Processing is offloaded from the client onto a centralized server. Cloud computing is an example of centralized processing.

Change management

A standardized approach to handling changes to the IT infrastructure.

Circuit switching

A dedicated, physical, point-to-point connection between the sending and receiving devices.

Click-through rate (CTR)

Measures the number of times an Internet ad is clicked, versus the times it's viewed.

Client privacy agreement

An agreement that outlines what can and cannot be done with the personal data of visitors to a Web site.

Client/server

A computing environment in which one machine (the client) makes requests while another machine (the server) fulfills the requests.

Client-side validation

Input validation mechanisms on the client side using the client browser.

Cloud computing

Delivering hosted services over the Internet, which includes providing infrastructures, platforms, and software as services.

Common Gateway Interface (CGI)

A standard that enables communication between Web forms and your program.

Common message store (CMS)

Centralized storage for unified messages.

Common Vulnerabilities and Exposures (CVE) list

Run for the Department of Homeland Security by the MITRE Corporation, a basic description of computer application and operating system vulnerabilities.

Compatibility testing

A software testing method designed to verify how well an application functions with other software, such as the operating system or other Web applications. Interoperability is a significant concern, and application testing must ensure compatibility with other popular software.

Computer incident response team (CIRT)

CIRTs are now normally higher level coordination bodies with wider responsibilities for vulnerability and attack research and issuing warning and vulnerability notices. The original term for what is now commonly called a CSIRT.

Computer security incident response team (CSIRT)

An all-hours or on-call group for an organization, corporation, or country designed to respond to online attacks or similar events. May also be called an information system incident response team (ISIRT).

Confidentiality

Ensuring that information is accessible only to authorized users.

Content adaptation

How mobile phones handle Web and multimedia content intended for more powerful systems with larger screens.

Content spoofing

Creating a fake Web site or Web application and fooling victims into thinking it is a legitimate one. An attacker lures victims to an authentic-looking but illegitimate Web site. The attacker then steals logon credentials, credit card information, or other forms of personal data.

Convergence

The evolution of different types of devices into a more common form that has a combination of features.

Conversion rate

Represents the percentage of visitors who perform a desired action against those that do not. The higher the conversion rate, the better the site.

Cost per click (CPC)

Represents the amount an advertiser pays each time a user clicks an ad.

Cracker

A cybercriminal intending harm to systems and networks.

Cross-site request forgery (CSRF) attack

Exploits the trust a Web site has for a user's browser. This can occur because once a visitor is authenticated and logged onto a particular Web site, that site trusts all requests that come from the browser.

Cross-site scripting (XSS)

A well-known Web application vulnerability in which attempts are made to execute malicious code by injecting it and running it in the client browser. If the script code can be executed, the attacker may have access to your data, financial information, and more. See also XSS attack.

Cryptographic key

The confidential component of a cryptographic system. The key defines how the cryptographic algorithm converts plaintext to encrypted text and back.

Cyberstalking

Constant and unwelcome electronic tracking of another person.

D

Data Encryption Standard (DES)

An encryption standard using a 56-bit key encryption method.

Denial of service (DoS)

An attack that can result in decreased availability of the targeted system.

Development environment

The environment in which programmers develop, test, and upgrade software systems applications. Compare with a production environment.

Digital certificate

A small electronic file that serves to validate or encrypt a message or browser session. Digital certificates are often used to create a digital signature which offers non-repudiation of a user or a Web site.

Digital transmissions

A method of voice transmissions in which sounds are encoded digitally as a series of numbers that represent pitch and volume at each instant in time.

Discretionary access control (DAC)

An access control method in which access is not forced from the administrator or the operating system; rather, access is controlled by the information's owner.

Distributed application

An application whose processing is divided across multiple computers over a network. Typically, the divisions, or tiers, are presentation, business logic, and data store layers.

DNS namespace

An organized, hierarchical division of DNS names.

Domain Name System (DNS)

A hierarchical system for naming resources on a network as well as providing translation between the resource's IP address and its domain name.

E

E-commerce

The buying and selling of goods and services over electronic systems such as the Internet.

Electronic cash

Currency that you purchase with a credit, charge, or debit card, and then download to your computer or smart card.

Electronic wallet

An electronic storage device for electronic currency and information about the owner of the wallet.

E-mail filtering

The process of identifying potentially risky e-mail and stopping it from reaching the end user.

E-mail filtering software

A program that can identify a potentially risky e-mail and stop it from reaching the end user.

Encapsulating Security Payload (ESP)

A protocol that provides encryption services to network data. Can also be used for authentication and integrity services. Differs from AH authentication in that ESP includes only the ESP header, trailer, and payload portions of a data packet. The IP header is not protected, unlike with AH, which protects the entire data packet.

Encryption

The process of encoding information. The act of making text or data unreadable without possession of a translation key.

Endpoint device

A device or system that connects users to a communications or data network.

Enumeration

Identifying the types of services components that are running on a system.

E-reader

An electronic tablet device that allows a user to download, store, and read digital books.

Extensible Markup Language (XML)

A set of rules for encoding documents electronically. XML was chosen as the standard message format because of its widespread use and open source development efforts.

F

Failure to restrict URL access attack

Occurs when an attacker browses unprotected areas and data on a Web server. This attack is enabled by Web applications that fail to restrict vulnerabilities.

Fax server

A computer-based fax machine.

Feature freeze

A software state in which development continues but no additional features are added to the product.

Federal Desktop Core Configuration (FDCC)

A regularly updated U.S. federal government project that sets a minimum security configuration for Microsoft Windows XP and Windows Vista computers that are used as general-purpose desktops.

File Transfer Protocol (FTP)

A protocol used for file exchange.

Fingerprinting

Identifying the type and version of operating system that is running on a system.

Forum of Incident Response and Security Teams (FIRST)

A worldwide voluntary and collaborative body bringing together incident response teams and related organizations. It encourages rapid and secure communications between affected communities and allows in-confidence information sharing. It also supports an annual conference and hosts special interest groups and regular training events.

G

Google Docs

Google's proprietary Web-based office application software that offers word processing, spreadsheets, and presentations.

Gopher

An early computer network that featured searches through a file tree.

Graphical user interface (GUI)

An interface based on graphical elements as opposed to text only.

Gray box testing

A software testing methodology that provides the middle ground between black box and white box testing. It looks at the input and output of applications and the inner workings of the application.

Groupware

A system of tools that facilitates group collaboration. Groupware may include calendar software and instant messaging applications.

Guideline

A non-enforced suggestion for increasing functioning and performance.

H

Hacker

Generally known as a cybercriminal. However, hackers are actually well-intentioned or "good" infiltrators who edit and modify applications. Crackers are those with malicious intent. Most people today use the term "hacker" to mean "cracker."

Honeypot

A carefully monitored system set up by security professionals to be attacked, so that attack sources and methods can be analyzed.

Host-based security

Security measures such as firewalls, IDSs, and antivirus solutions installed directly on a client system.

Hypertext

Text as non-sequential links to other text or documents.

Hypertext Markup Language (HTML)

A set of tags, or rules, primarily used to specify formatting of Web documents.

Hypertext Transfer Protocol (HTTP)

A transfer protocol for exchanging hypertext documents over the Internet or an intranet.

Hypertext Transfer Protocol Secure (HTTPS)

Combines the HTTP protocol with the SSL protocol to provide secure online transactions.

I

Identify theft

Assuming the online identity of a person.

Impersonation

From a Web site or Web application perspective, an attacker's attempt to use the session credentials of a valid user.

Indexing

An automatic process in which software programs known as spiders or bots examine Web sites collecting data and analyzing the Web sites' keywords. The results are stored and indexed in the search engine's database.

Information leakage

The exploitation by an attacker of information found or gathered which was intended only for authorized users.

Infrastructure as a Service (IaaS)

Delivery of infrastructure on demand, usually billed per amount of resources consumed.

Injection flaw attack

Enables an attacker to bypass an application's access controls and create, change, delete, or read any data the application can access. The end result is compromised data. One of the most common forms of an injection flaw attack is the SQL injection attack.

Input validation

The verification of all data that is received. This helps prevent malicious data from entering an application. Input validation is a form of filtering in which unexpected or unwanted input is automatically rejected and the underlying database remains inaccessible.

Insecure direct object reference vulnerability

A threat that occurs when an administrator fails to secure directories and folders in a Web server. Enables an attacker to traverse through a Web server's directories, leading to the access of sensitive resources and information leakage. Also referred to as directory traversal.

Instant messaging (IM)

A program that allows users to exchange messages in real time.

Integration testing

A software testing method in which individual software modules are combined and tested as a group. Integration testing typically occurs after unit testing.

Integrity

Emphasizes the need for information to be delivered unaltered to the recipient.

International Information Systems Security Certification Consortium (ISC)2

A nonprofit professional and certification body that provides related programs for information security professionals.

Internet Key Exchange (IKE)

A protocol that manages the SA negotiation process for IPSec connections.

Internet Message Access Protocol (IMAP)

A TCP/IP protocol designed for downloading, or pulling, e-mail from a mail server. IMAP is used because although the mail is transported around the network via SMTP, users cannot always read it immediately, so it must be stored in a central location. From this location, it needs to be downloaded, which is what IMAP allows you to do.

Internet Protocol (IP)

The set of techniques used by many hosts for transmitting data over the Internet. Internet Protocol version 4 (IPv4) is still in common use today. IPv4 addresses use 32 bits. Internet Protocol version 6 (IPv6) is a more recent version of IP, and it uses 128 bits.

Internet Protocol Security (IPSec)

Secures communication between systems within a network as well as communications transmitted outside a LAN; can be used to encrypt, authenticate, and verify the integrity of communications.

Internet Relay Chat (IRC)

An early form of synchronous online conferencing.

Intrusion detection system (IDS)

A security mechanism that monitors data packets traveling across a network, comparing traffic against parameters of known threats. An IDS is a passive security measure in that it only monitors the network and doesn't take steps to mitigate the risk.

Intrusion prevention system (IPS)

A security mechanism that monitors and reacts to data packets traveling across a network. An IPS is an active security measure because it not only monitors but also blocks suspect traffic identified by the device.

IP address

A unique numeric value assigned to a device in a network.

ISO 17024

The international standard for accrediting schemes that certify personal competences.

J

JavaScript

A scripting programming language most commonly used to add interactive features to Web pages.

L

Latency

A delay. Can apply to the sending, processing, transmission, storage, or receiving of information.

Least privilege

See principle of least privilege.

Lightweight Directory Access Protocol (LDAP)

A protocol that provides a mechanism to access and query directory services systems. Directory services include systems such as Novell Directory Services (NDS) and Microsoft Active Directory, database servers, Web servers, and Web application servers.

Local area network (LAN)

A computer network covering a small physical area, such as an office or the floor of a building.

M

Macro viruses

Designed to infect, corrupt, and damage Microsoft Office documents.

Mainframe

A high-performance computer usually used by large businesses requiring large-scale processing and availability.

Malicious software

Software designed to damage or disrupt the operation of a system. Also referred to as malware.

Malware

Software designed to damage or disrupt the operation of a system, such as a Trojan horse, worm, or virus. Also known as malicious software.

Malware hoax

An illegitimate announcement of new malware.

Mandatory access control (MAC)

An access control mechanism in which access is controlled and dictated by the network administrator.

Man-in-the-middle attack

An attack that relies on eavesdropping between the sender and receiver. Attackers use their position to listen and perhaps redirect or alter communication.

Microblogging

A form of blogging using limited content, such as Twitter.

Minicomputer

A computer of medium size with less processing capability than a mainframe, but more than a PC.

Mobile broadband

The ability to communicate at broadband (cable modem/DSL or faster) speeds while being connected to a cellular network.

Multimedia Messaging Service (MMS)

A service provided by cellular networks that allows the sending and receiving of multimedia messages between users. MMS content includes audio, video, digital images, ringtones, and more.

Multimedia Messaging Service Encapsulation Protocol

A specification from the Open Mobile Alliance. The specification details implementation requirements for any organization interested in providing Multimedia Messaging Service.

Multiple Points of Presence (MPOP)

Presence information is aggregated from several devices to a single presence status. The reported status is provided to other users.

N

Network Time Protocol (NTP)

A protocol within the TCP/IP protocol suite designed to synchronize clocks of computer systems over packet-switched networks.

O

Open source

A copyright or licensing system that, compared with conventional commercial licensing schemes, allows wide use and modification of the material.

Open Web Application Security Project (OWASP)

An organization that researches and publishes known security threats to Web applications and Web services.

Output handling

The way applications control their output data. Output data from an application may take the form of logging, printing, coding, error messages, or raw data to be passed on to another application.

Outsourcing

Companies send their information to third-party service providers for storage, processing, or transmission.

P

Packet switching

A method for moving data over a network. Data is split into chunks (packets), and each packet contains destination details. The packets of the original entity being transmitted are recomposed at the destination. Packets may travel though different paths from the source to the destination in the network.

Password

A secret word used for authentication.

Path traversal attack

An attack in which the attacker attempts to circumvent acceptable file and directory areas to access files, directories, and data located elsewhere on the server. This is accomplished by changing the URL to point to other areas on the server.

Payment Card Industry Data Security Standard (PCI DSS)

A set of standards designed to help organizations that process credit card payments prevent fraud by having increased control over data and its exposure.

Pay-per-click (PPC) revenue model

An affiliate-based e-commerce model where sites pay affiliates for generating traffic to them.

PayPal

A transaction broker that facilitates payments between individuals or individuals and businesses. Located at http://www.paypal.com.

Penetration testing

An attempt to circumvent various layers of a system or application's security controls for the purpose of seeing how far into the system the attacker can get.

Performance testing

A software testing method that provides an accurate view of how applications perform in a large-scale deployment in a variety of production environments. These tests determine responsiveness under various workloads to ensure that the application works well under normal operational circumstances.

Personal identification number (PIN)

An authentication method that validates a user.

Phishing

A scam in which an impostor pretends to be a legitimate entity and tries to lure customers into divulging confidential information.

Physical security

A type of computer security that includes tangible protection devices.

Ping sweep

The act of sending TCPIP packets to various IP addresses and determining which of those addresses are active based on the responses that are received.

Platform as a Service (PaaS)

Delivery of a computing platform as a service.

Podcast

A podcast is a recorded audio program available for download from a Web site.

Point-to-Point Tunneling Protocol (PPTP)

Protocol used to establish and secure VPN connections.

Policies

An organization's documented basic requirements supported by senior management.

Portal

A single point of access to a collection of resources.

Presence

The state or availability of a remote object.

Presence and availability

The ability and willingness of an end user to engage in communication. The information is controlled by the end user and gives real-time confidence that the user is accessible. Delivery is not automatic, but relies on technology or applications being enabled to provide it.

Principle of least privilege

The concept of providing users with as few privileges as possible, just enough to fulfill their network needs. It is a security measure that ensures users are not granted more permissions than needed.

Privacy

The protection of individual rights to non-disclosure.

Procedure

A task or set of tasks performed to implement a process.

Process validation

The correct sequence of steps in a transaction or online process.

Production environment

A real-world practical environment in which applications are used for business purposes. Compare with a development environment.

Protocol Security (IPSec)

Communication protocol used to secure communications over an IP network.

Protocol

A defined policy or standard that users adhere to. Protocols are well-defined and accepted procedures. In computer networking, the term refers to algorithms for exchanging various types of data and their interpretation at origination and destination.

Public switched telephone network (PSTN)

The global collection of interconnected public telephone networks designed primarily for voice traffic.

Q

Qualified Security Assessor (QSA)

A person trained to conduct PCI DSS Security Assessments.

Qualified traffic

Web site visitors who are searching specifically for your goods or services.

R

Really Simple Syndication (RSS)

A family of standardized Web feeds used to publish changes in recently updated work, such as news.

Real-time communication

An immediate exchange of information.

Real-time processing

A credit card transaction in which processing is immediate.

Real-time Transport Control Protocol (RTCP)

The protocol for the purpose of managing and maintaining the quality of RTP.

Real-time Transport Protocol (RTP)

The protocol used for streaming audio or video in packets over an IP network.

Recovery testing

A software testing method that gauges the recovery capabilities of an application in the event of failure. Recovery testing determines whether an application can recover from a crash or hardware failure.

Reflected XSS attack

Uses social engineering to initiate an XSS attack. A reflected XSS attack uses a malicious script that is embedded in a URL link to target a single victim.

Regression testing

A software testing method that checks for additional errors in software that may have been introduced in the process of upgrading or patching to fix other problems.

Regulation

A legal restriction with legal consequences. Regulations are not set by an organization but by applicable laws.

Regulatory compliance testing

A software testing method that ensures an application meets and adheres to appropriate standards.

Request for Comments (RFC)

A formal document from the Internet Engineering Task Force (IETF) that is the result of committee drafting and revision of a technical document.

Resource Description Framework (RDF)

A framework for conceptual modeling.

Risk

Source of danger, exposure to unauthorized use or compromise.

Rivest Cipher

A family of secret key cryptographic algorithms from RSA Security, Inc. The family includes RC2, RC4, RC5, and RC6.

Role-based access control

An access control mechanism in which access decisions are determined by the roles that individual users have as part of an organization.

Routing detour attack

A form of man-in-the-middle attack in which an intermediary attacker reroutes data to an alternate location.

Rule-based access control

An access control mechanism in which access to objects is controlled according to established rules.

S

Sandbox

A strategy for separating programs and running them in their own virtual space.

Sanitization

Inspection of user input for potentially harmful code and modifying the code according to predetermined guidelines. Sanitization often involves identifying and disallowing specific characters and syntax sequences.

Search engine optimization (SEO)

Refers to the strategies used to make a site more browser-friendly.

Secrecy

Protection from inadvertent information disclosure.

Secure Sockets layer (SSL)

The standard security technology for establishing an encrypted link between a Web server and a Web browser. This link ensures that all data passed between the Web server and browsers remains private and intact. SSL is an industry standard and is used by millions of Web sites to protect their online transactions with their customers.

Security association (SA)

A security agreement between two systems on a network that enables the secure exchange of data. For communication to occur, the sending system and receiving system must agree on the same SA.

Security testing

A software testing method that checks the security of an application. This includes testing for injection attacks, path traversal attacks, and if the software is vulnerable in other ways. Vulnerabilities need to be addressed before the software can be released.

Server

Combination of hardware and software intended to provide services to clients, usually over the Internet.

Server-side include (SSI) injection

An injection attack that occurs on the server and not on the client system. In an SSI attack, malicious code is placed in a Web application that is then stored on the server. When the Web application is executed locally on the Web server, the malicious code carries out its function. The SSI injection attack is successful when the Web application is ineffective in filtering user-supplied input.

Service set identifier (SSID)

A unique client identifier sent over a wireless network as a simple password that is used for authentication between a wireless client and an access point.

Session

The tracking of requests and communications between a Web server and a user. Because HTML is "stateless" by design, Web applications and Web sites must create a session to pass information and authentication from page to page.

Session hijacking

The exploitation of a valid computer session to gain unauthorized access to information and services within the targeted computer system.

Session ID

Identifies previous users to a Web site and stores user-specific information about a session.

Session Initiation Protocol (SIP)

An application-layer protocol designed to establish and maintain multimedia sessions.

Session management

Defines how systems handle and manage user sessions.

Short Message Service (SMS)

A service provided by cellular networks that allows the sending and receiving of short messages between users. SMS is more popularly known as "texting."

Simple Mail Transfer Protocol (SMTP)

Protocol used for e-mail exchange.

SIP user agent (UA)

A network endpoint that is enabled to function as a either a SIP user agent client or user agent server.

SIP user agent client (UAC)

A SIP user agent that makes requests and receives responses.

SIP user agent server (UAS)

A SIP user agent that acts as a proxy between two SIP user agent clients for the purpose of facilitating a SIP session. The UAS acts as both client and server to receive and forward session control requests and responses.

Skype

Software application that allows the user to make video and audio calls over the Internet.

Social engineering

A practice of obtaining confidential information by manipulating users in social communication.

Social media

A blanket term that describes social applications, including forums, message boards, blogs, wikis, and podcasts. Social media applications include Google, Facebook, and YouTube.

Social networking

An online service designed to establish friendships and find like-minded people.

Software Configuration Management (SCM)

The mechanisms used to track and control changes in software.

Software Development Life Cycle (SDLC)

The process of planning, designing, creating, testing, deploying, and maintaining software.

Software stress testing

A software testing method that pushes an application to its limits to see where the breaking points are. Stress tests go well beyond normal, real-world scenarios trying to find the limits of an application.

Software as a Service (SaaS)

A model of software deployment or service where customers use applications on demand.

Spam

Unwanted and unsolicited e-mail.

Spyware

A form of malware that covertly gathers system information through the user's Internet connection without his or her knowledge.

SQL injection attack

A type of attack designed to break through database security and access the information. A SQL injection attack "injects" or manipulates SQL code.

Standard

An established and proven norm or method. A standard provides a means of ensuring quality by setting a uniform expectation for development.

Store-and-forward communication

The technique of relaying communications between two or more users by intermediate storage. Delivery from sender to a central storage is immediate, but the final transmission to the recipient depends upon availability and a request for the stored information.

Stored XSS attack

An attack that embeds malicious script into a Web page that permits and stores user-supplied content, such as a social networking site or an online forum, where it will be accessible to multiple potential victims. The victim retrieves the malicious script from the Web server when it requests the stored information. Also known as a persistent XSS attack.

System access control list (SACL)

The special type of access control list that monitors attempts to get into secured objects on a system.

System testing

A software testing method that combines all components that have successfully passed integration testing and assesses the system as a whole. System testing tests combined components to determine their interoperability.

T

T.38

A protocol for sending faxes over an IP network or the Internet.

Telnet

A protocol for synchronous access to a remote machine.

Theft

The unauthorized use of goods or services.

Transmission Control Protocol/Internet Protocol (TCP/IP)

A protocol for packet switching used on the Internet.

Transport Layer Security (TLS)

As the successor to Secure Socket Layer (SSL), TLS provides secure communications at the Transport layer from end to end.

Triple Data Encryption Standard (3DES)

An encryption method that uses three 56-bit encryption keys.

Trojan horse

A form of malware application hidden within another application that introduces backdoor access.

Trust icons

Trust logos and icons used to associate a Web site with a known and trusted entity.

U

Unified collaborative communications (UCC)

Integration of voice, video, and Web or data conferencing. See also unified communications.

Unified communications

The combination of real time and non-real time into a single communication strategy. See also unified collaborative communications (UCC).

Unified messaging (UM)

The storage of fax, e-mail, and voice communications in a single location.

Unit testing

A software testing method in which a programmer verifies that individual units of source code are fit for use. A unit is the smallest testable part of an application.

Unix-to-Unix Copy Protocol (UUCP)

A protocol that emerged prior to high-speed Internet connections, which permitted the exchange of e-mail and Usenet news over dial-up link speeds.

Usability testing

A software testing method designed to check the usability of an application. This may be done in a limited production environment to get a sampling of potential application users. The usability test helps ensure that the application is user friendly and provides an intuitive interface.

Usenet

The first Internet discussion service, started around 1980.

V

Veronica (Very Easy Rodent-oriented Net-Wide Index of Computerized Archives)

A search tool used across the Gopher network.

Virtual private network (VPN)

A secure communication tunnel used to connect a remote client to a network.

Virtualization

The creation of a virtual version of actual services, applications, or resources.

Virus

Malicious software that cannot spread to another computer on its own, without human assistance.

Voice messaging

The storage of voice messages for later retrieval.

Voice over Internet Protocol (VoIP)

Technology allowing voice transmissions over the Internet.

Vulnerability management

The ongoing maintenance and management of existing Web sites and applications.

W

Web 1.0

The infancy stage of the Web (1990-2003), based on presentation of information towards the users. Also referred to as the Static Web.

Web 2.0

Web advancements between 2003 and 2010, where social networking activities and tools greatly improved. Also referred to as the Social Web.

Web 3.0

The stage of the Web expected between 2010 and 2020. The focus will shift from documents and their relationships to data and its meaning, with services that are personally relevant to the user. Also referred to as the Semantic Web.

Web application

A software program containing computer scripts that interact with the end user. Examples include Web mail, shopping carts, portals, games, forums, forms, online auctions, and other interactive Web page elements.

Web Application Security Consortium (WASC)

A nonprofit group dedicated to improving application security practices.

Web ontology language (OWL)

A collection of languages used for describing ontologies.

Web site defacement

A type of attack in which the attacker changes the appearance of a Web site. The attacker might replace a company's home page, for example, with a Web page that displays messages from the attacker.

White box testing

A software testing methodology that examines the code of an application. This contrasts with black box testing, which focuses only on inputs and outputs of an application.

Whitelist

A practice to define what is acceptable, excluding all others as unacceptable.

Wide area network (WAN)

A data communications network that encompasses a large geographical area and travels beyond the boundaries of a local area network.

Wi-Fi Protected Access (WPA)

Data encryption method used on 802.11 wireless LANs.

World Wide Web

Commonly called the Web, a collection of HTML documents, audio, and video that resides on the Internet, which is accessible by browsers using the HTTP protocol.

Worms

Self-replicating malware designed to infect systems.

X

XML Path (XPath) language

Used for navigating XML documents and for retrieving data from within them. User input and queries are used with XPath to access XML information.

XPath injection attack

An attack in which the attacker injects data into an application so that the application executes user-controlled XPath queries. When successfully exploited, this vulnerability may allow an attacker to bypass authentication mechanisms and access XML information without proper authorization.

XSS attack

An attack in which malicious scripts are saved to a Web server but run in a client browser. If the script code is executed, the attacker gains access to personal data on the Web server or the victim's personal computer.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.139.82.23