Contents

Glossary

Audit Trail

The process of recording accesses to essential systems, software or files. The recorded information (e.g. who, when, what) can be subsequently processed and monitored to identify any security breaches.

Authentication

The process of determining the identity of a user that is attempting to access a network service.

Authorisation

The process of determining what accesses or activities are or are not permitted.

Encryption

The process of converting text or code into different code in order to disguise its content thus providing confidentiality.

Extranet

An Internet-based service implemented by an organisation for restricted internal use and with restricted access to customers and associated traders. Sometimes called a 'shared Intranet' and is typically an extension to an Intranet.

Firewall

A combination of hardware and software designed to enforce a boundary between two or more networks and so protect an organisation's computer network, Intranet or Extranet, against most security threats from Internet-based sources.

Gateway

A hardware-based access point between a network service and the Internet, often providing firewall protection.

Internet

The global network of computers which are digitally interconnected and which support the World Wide Web, email, etc.

Intranet

A network developed for internal business within an organisation and which uses Internet technology to publish, distribute and display information and applications.

Logging

The process of storing information about events that occurred on a firewall or network.

Proxy

A software agent that mediates between a company intranet and the Internet by accepting a connection from a user, deciding whether or not the user is permitted to use the proxy, and then completing the connection to the remote destination on behalf of the user.

Virus

A piece of code that replicates by attaching itself to a program or data file. A virus may or may not contain attack programs. Commonly used as a generic name for any malicious code. Other specific names for such software include Trojan horse (a piece of software that appears to do something normal but which contains an attack program) and Worm (A standalone program that when run, copies itself from one host to another and then runs on the new host).

 © 1999 Learned Information Europe Ltd