Accessibility Links

Infosec
English 繁體版 简体版

Navigation Menu 1

General UsersYoungsters & StudentsParents and TeachersIT ProfessionalsSME
FAQ Search :
Change text size: Text Size: Default Size (A) Text Size: Larger (A) Text Size: Largest (A)
general user youngsters and students parents and teachers IT professionals sme

Navigation Menu 2

 

  

 
 
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z

Index for glossary A

 

Access Control System

Address Spoofing

Administrative Security

Adware

Advanced Encryption Standard (AES) Algorithm

 

Anti-virus Software

Application Gateway

Assurance Level

Asymmetric Cryptography

Audit Trail

 

Authentication

Authentication Token

Authorisation

Availability

 

Download the full list of glossary (in PDF format)

( To view and print the downloaded document, you need to use an Adobe Acrobat Reader. Please click here to download if necessary.Download Adobe Acrobat Reader)

 

Access Control System

The system ensures that resources are only granted to those users who are entitled to them.

back to top Top

Address Spoofing

It’s simply an action to forging an address. One example is IP spoofing.

back to top Top

Administrative Security

It refers to the use of management procedures and mechanisms to prevent unauthorised access to a system.

back to top Top

Adware

Adware is software that displays advertising banners while the program is running. A lot of adware is also spyware.

back to top Top

Advanced Encryption Standard (AES) Algorithm

AES algorithm is an encryption algorithm based on Rijndael algorithm, with key sizes of 128, 192, or 256 bits to operate on a 128-bit block. The algorithm described by AES is a symmetric-key algorithm, meaning the same key is used for both encryption and decryption. AES supersedes Data Encryption Standard (DES) and is currently used worldwide.

back to top Top

Anti-virus Software

Anti-virus Software is computer software that is designed to stop computer viruses, eliminate computer viruses, and/or recover data affected by computer viruses.

back to top Top

Application Gateway

A system used to restrict access to services or functions across a firewall boundary.

back to top Top

Assurance Level

A relative measure of confidence in the quality of a credential. The assurance level ranges from level 1 (little or no confidence) to level 4 (very high degree of confidence).

back to top Top

Asymmetric Cryptography

Two different keys are used with one for encryption and the other for decryption. The decryption key cannot be derived from the encryption key.

back to top Top

Audit Trail

Audit trail is defined as a chronological record of system activities to enable the reconstruction and examination of the sequence of events and/or changes in an event.

back to top Top

Authentication

A process or method to identify and to prove the identity of a user/party who attempts to send message or access data. Message authentication refers to a process used to prove the integrity of specific information.

back to top Top

Authentication Token

A portable device operates by using challenge/response, time sequence, or other techniques in order to authenticate a user.

back to top Top

Authorisation

A process to grant rights to a person for accessing data or using specific information resources.

back to top Top

Availability

A condition in which information or processes are reasonably accessible and used by an authorised party including timely and critical operations.

 
 
     
Back back to topTop
 

Footer Menu

Sitemap | Contact Us | Privacy Policy | Important Notices
 
General Users Youngsters & Students Parents & Teachers IT Professionals SME