WWW.THESES.XLIBX.INFO
FREE ELECTRONIC LIBRARY - Theses, dissertations, documentation
 
<< HOME
CONTACTS



Pages:     | 1 |   ...   | 45 | 46 ||

«Securing Information in the Digital Age Information Security Policies This document presents a suite of integrated solutions which, together, offer ...»

-- [ Page 47 ] --

Virtual Private Network – VPN A Virtual Private Network – or VPN, is a network which emulates a private network, although runs over public network lines and infrastructure. Using specialist hardware and software, a VPN may be established running over the Internet. The use of encryption and a ‘tunnelling protocol’ maintains privacy.

Because public networks are used, the cost of a VPN costs a fraction of that of a traditional private network.

Virus A virus is a form of malicious code and, as such it is potentially disruptive. It may also be transferred unknowingly from one computer to another. The term Virus Glossary 491 includes all sort of variations on a theme, including the nastier variants of macroviruses, Trojans, and Worms, but, for convenience, all such programs are classed simply as ‘virus’.

Viruses are a very real problem for both organisation and individual computer users. At the present time there are very few, if any, virus which affect large computers, primarily because the programming languages which those systems use are not the same as those used to write virus code. Viruses, therefore are a problem primarily for users of PCs and servers.

As at April 2001, there were over 49,000 known viruses. Fortunately the great majority of these are classed as ‘rare’ and usually appear only in virus research centre files. However, that still leaves nearly 5,000 viruses, classed as ‘common’, roaming the world’s computer networks, so there is absolutely no room for complacency.

They tend to fall into 3 groups:Dangerous; - such as ‘Resume’ and ‘Loveletter’ which do real, sometimes irrevocable, damage to a computer’s system files, and the programs and data held on the computer’s storage media, as well as attempting to steal and transmit user ID and password information Childish; - such as ‘Yeke’, ‘Hitchcock’, ‘Flip’, and Diamond, which do not, generally, corrupt or destroy data, programs, or boot records, but restrict themselves to irritating activities such as displaying childish messages, playing sounds, flipping the screen upside down, or displaying animated graphics Ineffective - those, such as ‘Bleah’, which appear to do nothing at all except reproduce themselves, or attach themselves to files in the system, thereby clogging up the storage media with unnecessary clutter. Some of these viruses are ineffective because of badly written code, - they should do something, but the virus writer didn’t get it quite right.

Within all types there are some which operate on the basis of a ‘triggered event’ usually a date such as April 1st, or October 31st, or a time such 15:10 each day when the ‘Tea Time’ virus activates.

Organisations should maintain a ‘virus diary’ of known high risk dates/times to ensure that anti-virus measures are in place as required.

–  –  –

Voice Mailbox A mechanism whereby incoming telephone messages are recorded pending the availability of the intended recipient. Fancy IT version of the answer-phone.

Volume Testing Volume Testing, as its name implies, is testing that purposely subjects a system (both hardware and software) to a series of tests where the volume of data being processed is the subject of the test. Such systems can be transactions processing systems capturing real time sales or could be database updates and or data retrieval.

–  –  –

Vulcan Nerve Pinch [from the old ‘Star Trek’ TV series via Commodore Amiga hackers] Alternative name for the Three Finger Salute Web Site An organisation’s Web site is now as common as a Business Card but, unlike business cards, Web sites can offer anything from a simple ‘electronic brochure’, to an engaging experience of a product or service ‘on line’. In just a few years, web sites have grown from being static and ‘flat’ pages, to those with animated 3D graphics and sound and many pages are able to be built dynamically depending upon selections made.

The Web; it’s what most people mean by ‘the Internet’.

–  –  –

Weeding Selective stripping of records, files, data, etc. More refined than ‘stripping’ which is more wholesale in nature, weeding can be as precise as removing one particular field from a database.

Well don't do it then Standard help desk response to a Luser who complains that (for example) a particular combination of key strokes makes the PC do strange things. Derived from an old doctor's office joke about a patient with a trivial complaint.

Wetware The human nervous system, as opposed to electronic computer hardware or software. Also, human beings (programmers, operators, administrators) associated with a computer system, as opposed to the system's hardware or software. Probably from the novels of Rudy Rucker, or, possibly, Stanislav Lem.

White Hat / Black Hat Hackers Cyber terms. White Hat hackers are hackers who perform hacking for legitimate reasons; e.g. IT Security technicians testing their systems and researchers testing the limits of systems. On the other hand, Black Hat hackers are those who perform clandestine hacking for malicious reasons; such persons can also be referred to

–  –  –

Wide Area Network A communications network that extends beyond the organisation’s immediate premises.

WINTEL

WINTEL is the short form of Windows® Intel® meaning an Intel processor based PC running a version of Microsoft Windows® e.g. 3.1, 95,98, NT or 2000. All these are forms of WINTEL PC. Of course, there are other microprocessor (chip ) manufacturers who are making significant in roads into Intel’s domination of the PC chip market. Hence the demise of the term WINTEL!

Workstation The term workstation used to refer to extremely powerful desktop computers which were often (and still are) used by the scientific and research communities. They tend to run the UNIX® operating system using powerful RISC processors with massive screens and superb graphics!

Today, however, whilst the above definition remains broadly true, workstation can also be used interchangeably with ‘PC’ where the computer is attached to the corporate network / LAN.

Worm Classed as a type of virus. From ‘Tapeworm’ in the Science Fiction novel ‘The Shockwave Rider’ by John Brunner. A Worm is a malicious program that propagates itself over a network, reproducing itself as it goes.

The Anna Kournikova virus of March 2001, was written in the Visual Basic language with the code encrypted in an effort to disguise the contents.

Additionally, the file was disguised as a graphic (.jpg) image of the famous tennis player. This Worm, and others like it, replicate themselves by generating outbound emails to all those persons listed in your e-mail address book.

WORM Disk A ‘Write Once Read Many’ non-magnetic disk where, once data had been written to the disk, it could not be deleted, changed, or any more data added, but could be read, or copied to other media, as many times as required. Users of early CD drives used this technique to ‘burn’ programs and/or data onto a CD for distribution in the knowledge that it could not be altered in any way but was more reliable than removable magnetic media in situations where the disk would be accessed frequently.

Although advances in CD technology mean that in some cases more material can be added, and, most recently, can be deleted and the disk re-used, WORM disks are still the standard medium for distributing commercial software, and for companies distributing static data.

–  –  –

XML XML - eXtensible Markup Language is a markup language as is HTML for Web pages. However, whereas HTML describes data in terms of its display characteristics a page, XML describes data in terms of its content. In that respect XML is a markup language that has significant potential for the capture and onward processing of data directly from Web pages.

The real significance of this is that Business to Business data transfer will be greatly facilitated by XML as neither party needs to write interfaces to each other’s systems; they merely need to be able to accept and process XML.

–  –  –

Zip Disks Zip® Disks, introduced by the Iomega corporation, have become a de-facto standard for transportable data storage. Being physically a little large than a 3.5’ floppy disk, and yet able to store 250MB (or 100MB in older versions), makes the Zip® Disk an excellent choice for both transportable media and also security backups.

However, it is precisely because such large amounts of data may be easily copied and transported, that the use of such devices needs to be carefully controlled within the organisation. Please be aware that, only 10 years ago, 250MB was equivalent to the total storage capacity of most organisation’s data, and whilst this may appear small by today’s standards, it’s capacity ensure that ensure client databases, product details, plans and charts etc, can be reliably copied onto a disk that fits into a shirt pocket.

–  –  –



Pages:     | 1 |   ...   | 45 | 46 ||


Similar works:

«Gaceta de Economía, Suplemento Año 5, Núm. 9 Un panorama de la literatura económica en torno al manejo óptimo de la política fiscal † David Madero y Manuel Ramos Francia* Sumario El presente artículo resume selectivamente algunas de las prescripciones de la literatura económica en torno al tema del manejo óptimo de la política fiscal. El trabajo consta de siete secciones, las cuales analizan los principales puntos de vista expuestos por la teoría económica a este respecto. Las dos...»

«Department of Economics Being An Economist A Handbook for Students Interested in Economics Why Study Economics? Degree Programs in Economics Graduate Study in Economics College of Arts and Sciences Department of Economics 4202 E. Fowler Avenue CMC 342 Tampa, FL 33620 (813) 974-4252 College of Arts and Sciences Being An Economist A Handbook for Students Interested in Economics Prepared by: The Undergraduate Policy Committee Department of Economics University of South Florida 4202 E. Fowler...»

«National Museum Of Natural History 75 Years In The Natural History Building Resume C but Bank Depression occurs the rather important checking age that can check they hesitant. Offer you or you can have us where it are to remember. Latest at the venture, a flyer can put a caffeine to some agent manufacturing. Those is even where they have to learn your construction and her business in buyer because your costs. Another energy has mind-blowing massive self in clear value. If outsourced, good...»

«July 17, 2006 TAKEN FOR A RIDE: ECONOMIC EFFECTS OF CAR RENTAL EXCISE TAXES William G. Gale, Ph.D. and Kim Rueben, Ph.D Deputy Director & Senior Fellow Senior Research Associate The Brookings Institution Urban Institute This paper was prepared for Enterprise Rent-A-Car as a private consulting project undertaken by the authors and was not associated with their affiliations with the Brookings Institution, the Urban Institute, or The Tax Policy Center. The views expressed are our own and should...»

«“2015 – Año del Bicentenario del Congreso de los Pueblos Libres” Ministerio de Economía y Finanzas Públicas ANEXO I Licitación Pública N° 01/2015 Comisión Nacional de Valores ESPECIFICACIONES TECNICAS Objeto: provisión e instalación de un sistema de Climatización de Precisión para la Sala de Servidores del edificio de la Comisión Nacional de Valores (25 de Mayo 175 CABA). GENERALIDADES El objeto de la presente licitación es la provisión de materiales y mano de obra...»

«Policy No. 1001 AUXILIARY SERVICES Policy on Travel This policy is applicable to the following auxiliary corporations: Agricultural Foundation Association Associated Students, Inc. Athletic Corporation Foundation Programs for Children REVISION RECORD Date Version Revision Description 1/20/10 Final Amended by Associate Vice President (Non-Substantive) DOCUMENT CONTROL Approved By: Date(s) Approved: Next Review Date: Association – Board of Directors Association –1/20/09 January 2012...»

«High School Lesson Plan: PlayInsure.com – Home and Auto Insurance Experience An animated experience of insurance needs and risks Introduction: Insurance is essential to our daily lives. We need insurance to drive a car, buy a home, open a business, and so much more. As important as it is to purchase insurance, it is just as important to understand what your needs are and to make sure you are selecting the correct coverage to satisfy those needs. Objective: In this lesson, students will learn...»

«Informal care in the long-term care system European Overview Paper Judy Triantafillou | Michel Naiditch | Kvetoslava Repkova Karin Stiehr | Stephanie Carretero | Thomas Emilsson Patrizia Di Santo | Rastislav Bednarik | Lydia Brichtova Francesca Ceruzzi | Laura Cordero | Tasos Mastroyiannakis Maite Ferrando | Karl Mingot | Joachim Ritter Diamantoula Vlantoni Athens/Vienna, May 2010 Kai Leichsenring European Centre for Social Welfare Policy and Research (AT) • Ecole d'études sociales et...»

«Department of the Treasury Internal Revenue Service Washington, DC 20224 Number: 200433010 Release Date: 08/13/2004 Index Number: 274.08-00 Person To Contact:, ID No. Telephone Number:Refer Reply To: CC:ITA:B07 – PLR-123139-03 Date: April 27, 2004 Legend Taxpayer = Dear -: This responds to your request dated April 2, 2003, as modified by your letter of August 20, 2003, for a private letter ruling that digital or electronic receipts, as described below, without any accompanying paper receipts,...»

«FACING EAST Essay by Michiel Hulshof and Daan Roggeveen Even before he opens his mouth, the young man’s glassy eyes reveal that he’s had rather more than just the one drink. He walks straight towards us as we sip our beers on an outside balcony, enjoying the coolness of the Kenyan night. We’re at Tribeka, a popular nightclub in Nairobi’s central business district. The place rocks: a hip crowd is talking, laughing, drinking and dancing to African music. But the man now standing...»

«LOWER PAXTON TOWNSHIP BOARD OF SUPERVISORS Minutes of Board Meeting held February 2, 2016 The business meeting of the Board of Supervisors of Lower Paxton Township was called to order at 7:32 p.m. by Chairman William L. Hornung, on the above date, in the Lower Paxton Township Municipal Center, 425 Prince Street, Harrisburg, Pennsylvania. Supervisors present in addition to Mr. Hornung were: William C. Seeds, Sr., William B. Hawk, Gary A. Crissman, and Robin L. Lindsey. Also in attendance was...»

«Learning for Jobs OECD Reviews of Vocational Education and Training ENGLAND AND WALES Kathrin Hoeckel, Mark Cully, Simon Field, Gábor Halász and Viktória Kis October 2009 ORGANISATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT The OECD is a unique forum where the governments of 30 democracies work together to address the economic, social and environmental challenges of globalisation. The OECD is also at the forefront of efforts to understand and to help governments respond to new developments...»





 
<<  HOME   |    CONTACTS
2016 www.theses.xlibx.info - Theses, dissertations, documentation

Materials of this site are available for review, all rights belong to their respective owners.
If you do not agree with the fact that your material is placed on this site, please, email us, we will within 1-2 business days delete him.