Glossary
Audit Trail
The process of recording accesses to essential systems, software or files.
The recorded information (e.g. who, when, what) can be subsequently processed
and monitored to identify any security breaches.
Authentication
The process of determining the identity of a user that is attempting
to access a network service.
Authorisation
The process of determining what accesses or activities are or are not
permitted.
Encryption
The process of converting text or code into different code in order to
disguise its content thus providing confidentiality.
Extranet
An Internet-based service implemented by an organisation for restricted
internal use and with restricted access to customers and associated traders.
Sometimes called a 'shared Intranet' and is typically an extension to an
Intranet.
Firewall
A combination of hardware and software designed to enforce a boundary
between two or more networks and so protect an organisation's computer network,
Intranet or Extranet, against most security threats from Internet-based
sources.
Gateway
A hardware-based access point between a network service and the Internet,
often providing firewall protection.
Internet
The global network of computers which are digitally interconnected and
which support the World Wide Web, email, etc.
Intranet
A network developed for internal business within an organisation and
which uses Internet technology to publish, distribute and display information
and applications.
Logging
The process of storing information about events that occurred on a firewall
or network.
Proxy
A software agent that mediates between a company intranet and the Internet
by accepting a connection from a user, deciding whether or not the user
is permitted to use the proxy, and then completing the connection to the
remote destination on behalf of the user.
Virus
A piece of code that replicates by attaching itself to a program or data
file. A virus may or may not contain attack programs. Commonly used as a
generic name for any malicious code. Other specific names for such software
include Trojan horse (a piece of software that appears to do something normal
but which contains an attack program) and Worm (A standalone program that
when run, copies itself from one host to another and then runs on the new
host).
|