access levels anti-virus asymmetric key encryption authentication backdoor biometric enrolment biometric template biometrics botnet brute force attack CAPTCHA Certificate Authority ciphertext Computer Misuse Act cracking DDoS denial of service attack dictionary attack digital signatures Distributed Denial of Service attack DNS poisoning DoS Drive-by download encryption encryption key EV SSL false negative false positive full disk encryption hacking home directory https identity theft key escrow key logger Settings that determine who can access an item and what they can do with it (read, write, delete). Applies to files, folders and databases among other things. Software to detect and remove viruses and other malware. Encryption system in which two keys are used: a public key used only to encrypt data, and a private key used only to decrypt it. Establishing a user's identity. Method of bypassing security in a system, built in by the system designers. Process of registering a user for a biometric system by taking an initial sample. Measurements taken from a biometric sample. Use of fingerprints, retina scans, or other body features as an authentication mechanism. Group of zombie computers under the control of a criminal. Attempt to break a password by trying all possible combinations of letters, numbers, and symbols. “Scribble text” displayed as an image, which the user must type in to verify that they are a person. Organisation that issues digital certificates to individuals and companies. Result of encrypting plaintext. UK law governing criminal offences committed using a computer. Gaining illegal access to a computer system Denial of service attack committed using dozens of computers, usually zombies on a botnet. Flooding a computer system with data so that it cannot respond to genuine users. Attempt to break a password by trying all possible words. Technique used to authenticate remote users, such as online shopping businesses. Denial of service attack committed using dozens of computers, usually zombies on a botnet. Technique used by criminals to alter DNS records and drive users to fake sites, to committing phishing. Flooding a computer system with data so that it cannot respond to genuine users. Program which automatically downloads when a user visits a web page, usually without their knowledge or consent. System of encoding plaintext so that it cannot be understood with access to an encryption key. Used to encrypt and decrypt data. Extended Validation SSL. Digital certificate validation technique used on the world wide web. When a system incorrectly rejects an action instead of accepting it. When a system incorrectly accepts an action instead of rejecting it. System that encrypts all data saved to a hard disk automatically and transparently. Gaining illegal access to a computer system Directory that contains a users personal files. Protocol used to send web pages securely over the Internet. Stealing personal data in order to impersonate a person. Idea of having encryption keys stored by a third party company so the government can access them if needed. Software or hardware which records all key strokes on a computer system. key pair macro virus malware Multi-factor authentication one time password packet sniffer passphrase password pharming phishing physical security plaintext private key public key public key encryption root user rootkit secret key encryption Secure Socket Layer security token security update smishing social engineering spam spam bot spam filters spyware SSL symmetric key encryption system administrator TLS Transport Layer Security trojan horse unauthorised access Virus virus definition file vishing vulnerability scanner web bug A public key and private key that work together in a public encryption system. Virus that takes advantage of the macro programming languages built into some software. Generic name for malicious software Use of several authentication techniques together, such as passwords and security tokens. Password generated by a security token, which expires as soon as it is used. Software or hardware used to collect data travelling over a network. Word or phrase used to authenticate a user. Word or phrase used to authenticate a user. Technique used by criminals to alter DNS records and drive users to fake sites, to committing phishing. Use of fake emails and web sites to trick users into revealing sensitive data. Locks, alarms, and other techniques used to securely a building or computer room. Message before it is encrypted, or after it has been decrypted. Key used for decryption in a public key encryption system. Key used for encryption in a public key encryption system. Encryption system in which two keys are used: a public key used only to encrypt data, and a private key used only to decrypt it. User will full control over a computer system. Type of malware which infiltrates the operating system and attempts to hide itself from view. Encryption system in which a single key is used for both encryption and decryption. System used to encrypt https web traffic. Hardware device that must be present during login to authenticate a user. Software update to fix a security problem discovered in software. Phishing attacks committed using text messages (SMS). Tricking a user into revealing their password or other sensitive data. Unwanted, bulk email. Program that scans web pages for email address, in order to send spam. Program designed to identify and block spam messages while letting genuine messages through. Malware which covertly records a user's actions, such as their key presses. System used to encrypt https web traffic. Encryption system in which a single key is used for both encryption and decryption. Personal in overall charge of a computer system in an organisation. System used to encrypt https web traffic. System used to encrypt https web traffic. Malware which pretends to be a genuinely useful program to trick the user into using it. Gaining illegal access to a computer system Computer program which damages files and data spreads when infected programs are copied. Used by anti-virus programs to recognise known viruses. Phishing attacks committed using telephone calls or VoIP systems. Software to scan a system for potential security problems. Technique used by spammers to detect if an email address is valid or not. WEP worm WPA WPA2 zombie AAC alignment AVI Bit depth bit rate bitmap graphics blue screen BMP buffer CAD CGI citation cloning colour balance colour depth colour levels Colour management colour profile Colour synchronisation composite image compression Computer Aided Design Computer Generated Imagery copyright Creative Commons Cropping desktop publishing software digital effects Digital Rights Management digitisation DOC dots per inch DPI Wired Equivalence Protocol. Wireless network encryption system. Malicious software which replicates itself and spreads between computer systems and over networks. Wireless Protected Access. Wireless network encryption system. Wireless Protected Access 2. Wireless network encryption system. Computer which has been compromised by malware and is part of a botnet. Lossy file format for audio. Tools to control placement of objects in presentation or DTP software. Lossy file format for video. Refers to the number of colours in an image. Amount of data used to represent a single sample in a video or audio file. Graphics composed of rectangular grids of pixels. Technique used to replace part of a video image matching a certain colour with computer graphics. Lossless file format for audio. Temporary storage area used to store video or audio data ready for playing. Technical graphics software used to design products for manufacture. Graphics created entirely on a computer, using 2D or 3D graphics software. Acknowledge to a piece of work used as a source. Graphics technique which copies one part of an image to another, often to remove something from the image. Graphics filtering for altering the tones and intensities of colours in an image. Refers to the number of colours in an image. Graphics filtering for altering the tones and intensities of colours in an image. Ensuring printed output colours accurately match those on the screen. Used as part of colour synchronisation to specify how a device represents colour. Ensuring printed output colours accurately match those on the screen. Image which was created from several separate images. Reduction in the amount of data used to store a file. Technical graphics software used to design products for manufacture. Graphics created entirely on a computer, using 2D or 3D graphics software. Legal concept which protects intellectual property from authorised copying, alteration, or use. Licensing system for authors who wish to distribute their work freely. Taking a small part (subset) of an image. Software used for laying out text and images on pages. Commonly used for books, magazines, and brochures. General name for operations performed on an image using graphics software. Software which restricts the actions a user can perform with a file, such as copying or printing. The process of converting analog data into digital computer data. File format for documents, used by Microsoft Office. Also known as printer resolution. The number of dots of colour a printer is capable of producing in a certain amount of space. Also known as printer resolution. The number of dots of colour a printer is DRM DTP fair use filters FLAC flipping footer GIF GNU Free Documentation License green screen header image editor intellectual property JPG layer lossless compression lossy compression master page megapixel MIDI morphing motion capture MOV MP3 MP4 MPEG object oriented graphics ODT PDF pixel pixels per inch plain text file PNG Portable Document Format PPI raster graphics capable of producing in a certain amount of space. Software which restricts the actions a user can perform with a file, such as copying or printing. Software used for laying out text and images on pages. Commonly used for books, magazines, and brochures. Exceptions to copyright law that allow copying in certain limited circumstances. General name for operations performed on an image using graphics software. Lossless file format for audio. Image effect found in most graphics software. Area of a document which appears the same on every page. Lossless file format for images. Licensing system for authors who wish to distribute their work freely. Technique used to replace part of a video image matching a certain colour with computer graphics. Area of a document which appears the same on every page. Software used to create or edit bitmap graphics. Refers to creations of the mind – non-physical property such as photographs, music, stories, and films. Lossy file format for images. Technique used in graphics software to place digital images or effects on top of each other to build up a final image. Compression technique in which the original file is completely recoverable, with no loss of quality. Compare lossy compression. Compression technique in which some file data is sacrificed in order to reduce file size. A template page which is used to include standard features (such as page numbers or a header) on each page of a document in a consistent manner. Unit used to measure the resolution of digital cameras. Refers to 1 million pixels. Musical Instrument Digital Interface. System for communication between musical hardware and software applications. Effect that transforms one image into another over a series of frames. A system used to capture human movement into a computer by attaching sensors to an actor and tracking their location. Lossy file format for video. Lossy file format for audio. Lossy file format for video. Lossy file format for video. Graphics which are stored as a series of mathematical shapes and properties that can be independently manipulated at any time. File format for documents, used by LibreOffice. Common file format for the exchange of documents, which appears on screen exactly as it will appear on the printer. Individual dots which make up bitmap graphics. Number of pixels displayed in each inch of screen output. File format that stores characters using ASCII or Unicode encoding. Lossless file format for images. Common file format for the exchange of documents, which appears on screen exactly as it will appear on the printer. Number of pixels displayed in each inch of screen output. Graphics composed of rectangular grids of pixels. resolution Rich Text Format rotating RTF sample rate scaling selection tools streaming media SVG template text file TIF true colour TXT typography vector graphics video CODECs (coder-decoders) virtual actors Vorbis watermarking WAV WMA WYSIWYG zip file alternative key auditing Boolean operators character check check digit Comma Separated Values composite key computer matching consistency check CSV Refers to the number of pixels in an image. File format for documents, which can store text and some basic formatting information. Image effect found in most graphics software. File format for documents, which can store text and some basic formatting information. Number of samples taken each second when recording sound. Changing the size of an image. Tools in graphics software for selecting only a subset of an image. Video or audio data that is played while it is downloading. Standard file format for vector image data. A page which is used to include standard features (such as page numbers or a header) on each page of a document in a consistent manner. File format that stores characters using ASCII or Unicode encoding. Lossless file format for images. Image with 24 bit colour depth. File format that stores characters using ASCII or Unicode encoding. The proficient use of fonts, font sizes, and font properties such as leading and kerning to display text in an appropriate manner. Graphics which are stored as a series of mathematical shapes and properties that can be independently manipulated at any time. Software required to view certain compressed video and audio formats. Animated characters used in films, created entirely using computer graphics software. Lossy file format for audio. The process of adding an author name or logo into an image to identify its owner and prevent intellectual property theft. Lossless file format for audio. Lossy file format for video. What You See Is What You Get. Refers to programs that present their output onscreen exactly as it will appear when printed. Compressed file format for general data. Field by which a database is often searched. Recording database transactions made by users (e.g. all edits, reads) for security purposes. AND, OR, and NOT operators used in a query. Ensuring a field contains only the specified character types. Way of checking mathematically if a item of data has been correctly entered. File format for transferring data, which stores fields and records in a plain text file, separated by commas. See also TSV (Tab Separated Values). Primary key which consists of more than one field. Combining several databases to build up more information about a person or set of people. Validation check in which two fields' values are mutually dependent. File format for transferring data, which stores fields and records in a plain text file, separated by commas. See also TSV (Tab Separated Values). data entry form data integrity data matching data mining Data Protection Act data redundancy data types data warehouses Database Management System DBMS field field size flat file database foreign key forms index input mask key field knowledge discovery length check lookup normalization online encyclopaedias opt-in opt-out parameter query personal data personally identifiable data presence check primary key privacy policy queries range check RDBMS record redundancy redundant data relational database Screen used to input data into a database. Ensuring data is correct, consistent, and update to date. Combining several databases to build up more information about a person or set of people. Searching collections of data for hidden patterns. UK law that governs the collection and use of personal data. Data in a database which is needlessly duplicated. Format of data in a field, such as text, number, or date. Vast databases containing many gigabytes of data. Software used to create, enter, edit, and retrieve data in a database. Software used to create, enter, edit, and retrieve data in a database. Single item of data about a single record in a database. Validation technique. Number of characters that can be stored in a field. Database which consists of just one table. Database field whose sole purpose is to form part of a relationship with another table. Screen used to input data into a database. Field by which a database is often searched. Validation technique. Ensures only the specified characters can be entered into a field. Field which contains a different value for every record in that table. Searching collections of data for hidden patterns. Validation technique. Number of characters that can be stored in a field. Using a list of values to limit what can be entered into a field. For example, for the 'Gender' field, the values are limited to 'male' and 'female' Process of converting a database from a flat file database to a relational database. Web site containing a large number of articles for research purposes. System in which users must explicitly decide to participate. System in which users must explicitly decide not to participate. Database query whose criteria are decided by the user at run-time. Data which could identify a user, or lead to social impacts such as identity theft. Data which could identify a user, or lead to social impacts such as identity theft. Validation technique. Requires a field to be completed. Field which contains a different value for every record in that table. Policy governing what data a company or web site will collect about you and how it will be used. Method of extracting data from a database that matches specific criteria Validation technique. Ensures a field is between a certain range of values. Relational DBMS. See Database Management System. Collection of fields that represent a single entity, such as a person. Data in a database which is needlessly duplicated. Data in a database which is needlessly duplicated. Database containing multiple related tables and no redundant data. searching secondary key secondary use sensitive data sorting SQL Structured Query Language Tab Separated Values tab-delimited text files table Trans-border data flow TSV validation verification absolute cell reference assumptions car crash model cell format cell range cell reference centralized processing CFD climate model Computer model Computer simulation Decision Support System distributed processing feedback loop flight simulator formula full motion platform function Method of extracting data from a database that matches specific criteria Field by which a database is often searched. Using data for a purpose other than the one for which it was collected. Data such as medical records which, if shared, could cause serious negative impacts on the data subject. Ordering records based on a field (e.g. alphabetically). Language for managing databases by typing commands. Language for managing databases by typing commands. File format for transferring data, which stores fields and records in a plain text file, with fields separated by a tab character. See also CSV. File format for transferring data, which stores fields and records in a plain text file, with fields separated by a tab character. See also CSV. In databases, a collection of records representing a type of item. Transfer of data between countries. File format for transferring data, which stores fields and records in a plain text file, with fields separated by a tab character. See also CSV. Checks to ensure whether data is in the correct format. Checking whether data is correct – i.e. is the value entered in a field the actual value? In a spreadsheet, a cell reference which does not change when moved. Often made during the construction of a computer model, as part of the simplification process. Used to predict the results of car crashes. In spreadsheets, the properties of a cell such as its colour, font, and cell type. In spreadsheets, reference to a range of continuous cells. In spreadsheets, a combination of row number and column letter to refer to a single cell (e.g. A2). Single computer with multiple processors working on a task. Computational Fluid Dynamics. A technique used to model airflow in computer models. Computer model used to predict possible future climate change. Mathematical representation of the real world using computer software. Based on computer models, gives users experience of events such as flying a plane. Use of models or expert systems to aid (business) decision making processes. Use of multiple separate computers working together on a common task. Comparing the results of a computer model to actual (real life) results, and using the differences to improve the model for the future. Simulator hardware and software used to train pilots. In spreadsheets, a combination of cell references and mathematical operations. Hardware device which can move in many directions to increase the realism of simulators. Built in features of spreadsheets for performing common calculations. Global Climate Model goal seek grid computing high performance computing parallel processing prediction relative cell reference simplification spreadsheet supercomputer variables visualisation What-if scenario Computer model used to predict possible future climate change. Spreadsheet tool used to determine the required values to meet a certain goal. Use of multiple separate computers working together on a common task. High speed computing using multiple processors High speed computing using multiple processors Output of a computer model. In a spreadsheet, a cell reference which updates when moved. Difference between a computer model's representation of a process, and the real life process. Application software for performing numerical calculations and analysis. Fastest computers available, capable of performing trillions of calculations per second. Components of a computer model which can be altered to vary the output. Graphical or animated output from a computer model or simulation. Use of a computer model to test the results of different situations and scenarios.