Glossary Flashcards
Abend
abnormal end to computer job; termination to a task prior to its completion. Because an error condition that cannot be resolve by recovery facilities while the task is executing.
Acceptable use policy(AUP)
Policy that establish an agreement between user and the enterprise and define for all parties’ the ranges of use that are approved before gaining access to a network or the internet
Access Control
Process, rule, and development mechanisms that control access to information systems, resource and physical access to premises
ACL - Access Control List
Internal computerized table of access rules regarding the levels of computer access permitted to logon IDs and computer terminals.
Access Control Table
Internal computerized table of access rules regarding the levels of computer access permitted to logon IDs and computer terminals.
Access Method
Technique used for selecting records in a file, one at a time, for processing, retrieval or storage. Access method is related to, nut distinct from, the file organization, which determines how the records are stored
Access Path
Logical route an end user takes to access computerized information. Typically, includes a route through the operating system, telecommunications software selected application software and the access control system
Access Rights
Permission / privileges granted to users, programs or workstations to create, change, delete or view data and files within a system, as defined by rules established by data owners and the information security policy
Access server
Provides centralized access control for managing remote access dial-up service
address
Within computer storage, the code used to designate the location of a specific piece of data
address space
The number of distinct locations that may be referred to with the machine address. For most binary machines, it is equal to 2n, where n is the number of bits in the machine address.
Addressing
The method used to identify the location of a participant in a network. Ideally,
addressing specifies where the participant is located rather than who they are (name) or how to
get there (routing).
Administrative Controls
The rules, procedures and practices dealing with operational
effectiveness, efficiency and adherence to regulations and management policies
Adware
A software package that automatically plays, displays or downloads advertising
material to a computer after the software is installed on it or while the application is being used.
In most cases, this is done without any notification to the user or without the user’s consent. The
term adware may also refer to software that displays advertisements, whether or not it does so
with the user’s consent; such programs display advertisements as an alternative to shareware
registration fees. These are classified as adware in the sense of advertising supported software,
but not as spyware. Adware in this form does not operate surreptitiously or mislead the user, and
provides the user with a specific service.
Alpha
The use of alphabetic characters or an alphabetic character string
Alternative routing
A service that allows the option of having an alternate route to complete a
call when the marked destination is not available. In signaling, alternate routing is the process of
allocating substitute routes for a given signaling traffic stream in case of failure(s) affecting the
normal signaling links or routes of that traffic stream.
Analog
Transmission signal that varies continuously in amplitude and time is generated in a wave formation. Analog singals are used in telecommunications
Anonymous File Transfer Protocol (FTP)
method for downloading public files using the
File Transfer Protocol. Anonymous FTP is called anonymous because users do not need to
identify themselves before accessing files from a particular server. In general, users enter the
word “anonymous” when the host prompts for a username; anything can be entered for the
password such as the user’s email address or simply the word “guest.” In many cases, an
anonymous FTP site will not even prompt users for a name and password.
Antivirus software
An application software deployed at multiple points in an IT architecture.
It is designed to detect and potentially eliminate virus code before damage is done and repair or
quarantine files that have already been infected.
Applet
program written in a portable, platform independent computer language such as Java,
JavaScript or Visual Basic. An applet is usually embedded in a Hypertext Markup Language
(HTML) page downloaded from web servers and then executed by a browser on client machinesto run any web-based application (e.g., generate web page input forms, run audio/video
programs, etc.). Applets can only perform a restricted set of operations, thus preventing, or at
least minimizing, the possible security compromise of the host computers. However, applets
expose the user’s machine to risk if not properly controlled by the browser, which should not
allow an applet to access a machine’s information without prior authorization of the use
Application
computer program or set of programs that perform the processing of records for
a specific function. Contrasts with systems programs, such as an operating system or network
control program, and with utility programs, such as copy or sort
application controls
The policies, procedures and activities designed to provide reasonable
assurance that objectives relevant to a given automated solution (application) are achieved
Application Layer
Open Systems Interconnection (OSI) communications model, the
application layer provides services for an application program to ensure that effective
communication with another application program in a network is possible. The application layer
is not the application that is doing the communication; a service layer that provides these
services.
Application Program
program that processes business data through activities such as data
entry, update or query. Contrasts with systems programs, such as an operating system or network
control program, and with utility programs such as copy or sort.
Application programming
act or function of developing and maintaining applications
programs in production
Application programming interface (API)
set of routines, protocols and tools referred to
as “building blocks” used in business application software development. A good API makes it
easier to develop a program by providing all the building blocks related to functional
characteristics of an operating system that applications need to specify, for example, when
interfacing with the operating system (e.g., provided by Microsoft Windows, different versions
of UNIX). A programmer utilizes these APIs in developing applications that can operate
effectively and efficiently on the platform chosen.
Application software tracing and mapping
Specialized tools that can be used to analyze the
flow of data through the processing logic of the application software and document the logic,
paths, control conditions and processing sequences. Both the command language or job control
statements and programming language can be analyzed. This technique includes
program/system: mapping, tracing, snapshots, parallel simulations and code comparisons
Arithmetic logic unit (ALU)
The area of the central processing unit that performs
mathematical and analytical operations
Artificial intelligence
Advanced computer systems that can simulate human capabilities, such
as analysis, based on a predetermined set of rules
ASCII
Representing 128 characters, the American Standard Code for Information Interchange
(ASCII) code normally uses 7 bits. However, some variations of the ASCII code set allow 8 bits.
This 8-bit ASCII code allows 256 characters to be represented.
Assembler
program that takes as input a program written in assembly language and
translates it into machine code or machine language
Asymmetric key (public key)
cipher technique in which different cryptographic keys are
used to encrypt and decrypt a message (See public key encryption)
Asynchronous Transfer Mode (ATM)
high-bandwidth low-delay switching and
multiplexing technology that allows integration of real-time voice and video as well as data. It is
a data link layer protocol. ATM is a protocol-independent transport mechanism. It allows highspeed data transfer rates at up to 155 Mbit/s.
Asynchronous transmission
Character-at-a-time transmission