Index for glossary A
Download the full list of glossary (in PDF format)
( To view and print the downloaded document, you need to use an Adobe Acrobat Reader. Please click here to download if necessary.)
Access Control System
The system ensures that resources are only granted to those users who are entitled to them.
It’s simply an action to forging an address. One example is IP spoofing.
It refers to the use of management procedures and mechanisms to prevent unauthorised access to a system.
Adware is software that displays advertising banners while the program is running. A lot of adware is also spyware.
Advanced Encryption Standard (AES) Algorithm
AES algorithm is an encryption algorithm based on Rijndael algorithm, with key sizes of 128, 192, or 256 bits to operate on a 128-bit block. The algorithm described by AES is a symmetric-key algorithm, meaning the same key is used for both encryption and decryption. AES supersedes Data Encryption Standard (DES) and is currently used worldwide.
Anti-virus Software is computer software that is designed to stop computer viruses, eliminate computer viruses, and/or recover data affected by computer viruses.
A system used to restrict access to services or functions across a firewall boundary.
A relative measure of confidence in the quality of a credential. The assurance level ranges from level 1 (little or no confidence) to level 4 (very high degree of confidence).
Two different keys are used with one for encryption and the other for decryption. The decryption key cannot be derived from the encryption key.
Audit trail is defined as a chronological record of system activities to enable the reconstruction and examination of the sequence of events and/or changes in an event.
A process or method to identify and to prove the identity of a user/party who attempts to send message or access data. Message authentication refers to a process used to prove the integrity of specific information.
A portable device operates by using challenge/response, time sequence, or other techniques in order to authenticate a user.
A process to grant rights to a person for accessing data or using specific information resources.
A condition in which information or processes are reasonably accessible and used by an authorised party including timely and critical operations.