access levels Settings that determine who can access an item and

advertisement
access levels
anti-virus
asymmetric key
encryption
authentication
backdoor
biometric enrolment
biometric template
biometrics
botnet
brute force attack
CAPTCHA
Certificate Authority
ciphertext
Computer Misuse
Act
cracking
DDoS
denial of service
attack
dictionary attack
digital signatures
Distributed Denial of
Service attack
DNS poisoning
DoS
Drive-by download
encryption
encryption key
EV SSL
false negative
false positive
full disk encryption
hacking
home directory
https
identity theft
key escrow
key logger
Settings that determine who can access an item and what they can do with it
(read, write, delete). Applies to files, folders and databases among other things.
Software to detect and remove viruses and other malware.
Encryption system in which two keys are used: a public key used only to
encrypt data, and a private key used only to decrypt it.
Establishing a user's identity.
Method of bypassing security in a system, built in by the system designers.
Process of registering a user for a biometric system by taking an initial sample.
Measurements taken from a biometric sample.
Use of fingerprints, retina scans, or other body features as an authentication
mechanism.
Group of zombie computers under the control of a criminal.
Attempt to break a password by trying all possible combinations of letters,
numbers, and symbols.
“Scribble text” displayed as an image, which the user must type in to verify that
they are a person.
Organisation that issues digital certificates to individuals and companies.
Result of encrypting plaintext.
UK law governing criminal offences committed using a computer.
Gaining illegal access to a computer system
Denial of service attack committed using dozens of computers, usually zombies
on a botnet.
Flooding a computer system with data so that it cannot respond to genuine
users.
Attempt to break a password by trying all possible words.
Technique used to authenticate remote users, such as online shopping
businesses.
Denial of service attack committed using dozens of computers, usually zombies
on a botnet.
Technique used by criminals to alter DNS records and drive users to fake sites,
to committing phishing.
Flooding a computer system with data so that it cannot respond to genuine
users.
Program which automatically downloads when a user visits a web page, usually
without their knowledge or consent.
System of encoding plaintext so that it cannot be understood with access to an
encryption key.
Used to encrypt and decrypt data.
Extended Validation SSL. Digital certificate validation technique used on the
world wide web.
When a system incorrectly rejects an action instead of accepting it.
When a system incorrectly accepts an action instead of rejecting it.
System that encrypts all data saved to a hard disk automatically and
transparently.
Gaining illegal access to a computer system
Directory that contains a users personal files.
Protocol used to send web pages securely over the Internet.
Stealing personal data in order to impersonate a person.
Idea of having encryption keys stored by a third party company so the
government can access them if needed.
Software or hardware which records all key strokes on a computer system.
key pair
macro virus
malware
Multi-factor
authentication
one time password
packet sniffer
passphrase
password
pharming
phishing
physical security
plaintext
private key
public key
public key encryption
root user
rootkit
secret key
encryption
Secure Socket Layer
security token
security update
smishing
social engineering
spam
spam bot
spam filters
spyware
SSL
symmetric key
encryption
system administrator
TLS
Transport Layer
Security
trojan horse
unauthorised access
Virus
virus definition file
vishing
vulnerability scanner
web bug
A public key and private key that work together in a public encryption system.
Virus that takes advantage of the macro programming languages built into
some software.
Generic name for malicious software
Use of several authentication techniques together, such as passwords and
security tokens.
Password generated by a security token, which expires as soon as it is used.
Software or hardware used to collect data travelling over a network.
Word or phrase used to authenticate a user.
Word or phrase used to authenticate a user.
Technique used by criminals to alter DNS records and drive users to fake sites,
to committing phishing.
Use of fake emails and web sites to trick users into revealing sensitive data.
Locks, alarms, and other techniques used to securely a building or computer
room.
Message before it is encrypted, or after it has been decrypted.
Key used for decryption in a public key encryption system.
Key used for encryption in a public key encryption system.
Encryption system in which two keys are used: a public key used only to
encrypt data, and a private key used only to decrypt it.
User will full control over a computer system.
Type of malware which infiltrates the operating system and attempts to hide
itself from view.
Encryption system in which a single key is used for both encryption and
decryption.
System used to encrypt https web traffic.
Hardware device that must be present during login to authenticate a user.
Software update to fix a security problem discovered in software.
Phishing attacks committed using text messages (SMS).
Tricking a user into revealing their password or other sensitive data.
Unwanted, bulk email.
Program that scans web pages for email address, in order to send spam.
Program designed to identify and block spam messages while letting genuine
messages through.
Malware which covertly records a user's actions, such as their key presses.
System used to encrypt https web traffic.
Encryption system in which a single key is used for both encryption and
decryption.
Personal in overall charge of a computer system in an organisation.
System used to encrypt https web traffic.
System used to encrypt https web traffic.
Malware which pretends to be a genuinely useful program to trick the user into
using it.
Gaining illegal access to a computer system
Computer program which damages files and data spreads when infected
programs are copied.
Used by anti-virus programs to recognise known viruses.
Phishing attacks committed using telephone calls or VoIP systems.
Software to scan a system for potential security problems.
Technique used by spammers to detect if an email address is valid or not.
WEP
worm
WPA
WPA2
zombie
AAC
alignment
AVI
Bit depth
bit rate
bitmap graphics
blue screen
BMP
buffer
CAD
CGI
citation
cloning
colour balance
colour depth
colour levels
Colour
management
colour profile
Colour
synchronisation
composite image
compression
Computer Aided
Design
Computer
Generated Imagery
copyright
Creative Commons
Cropping
desktop publishing
software
digital effects
Digital Rights
Management
digitisation
DOC
dots per inch
DPI
Wired Equivalence Protocol. Wireless network encryption system.
Malicious software which replicates itself and spreads between computer
systems and over networks.
Wireless Protected Access. Wireless network encryption system.
Wireless Protected Access 2. Wireless network encryption system.
Computer which has been compromised by malware and is part of a botnet.
Lossy file format for audio.
Tools to control placement of objects in presentation or DTP software.
Lossy file format for video.
Refers to the number of colours in an image.
Amount of data used to represent a single sample in a video or audio file.
Graphics composed of rectangular grids of pixels.
Technique used to replace part of a video image matching a certain colour with
computer graphics.
Lossless file format for audio.
Temporary storage area used to store video or audio data ready for playing.
Technical graphics software used to design products for manufacture.
Graphics created entirely on a computer, using 2D or 3D graphics software.
Acknowledge to a piece of work used as a source.
Graphics technique which copies one part of an image to another, often to
remove something from the image.
Graphics filtering for altering the tones and intensities of colours in an image.
Refers to the number of colours in an image.
Graphics filtering for altering the tones and intensities of colours in an image.
Ensuring printed output colours accurately match those on the screen.
Used as part of colour synchronisation to specify how a device represents
colour.
Ensuring printed output colours accurately match those on the screen.
Image which was created from several separate images.
Reduction in the amount of data used to store a file.
Technical graphics software used to design products for manufacture.
Graphics created entirely on a computer, using 2D or 3D graphics software.
Legal concept which protects intellectual property from authorised copying,
alteration, or use.
Licensing system for authors who wish to distribute their work freely.
Taking a small part (subset) of an image.
Software used for laying out text and images on pages. Commonly used for
books, magazines, and brochures.
General name for operations performed on an image using graphics software.
Software which restricts the actions a user can perform with a file, such as
copying or printing.
The process of converting analog data into digital computer data.
File format for documents, used by Microsoft Office.
Also known as printer resolution. The number of dots of colour a printer is
capable of producing in a certain amount of space.
Also known as printer resolution. The number of dots of colour a printer is
DRM
DTP
fair use
filters
FLAC
flipping
footer
GIF
GNU Free
Documentation
License
green screen
header
image editor
intellectual property
JPG
layer
lossless
compression
lossy compression
master page
megapixel
MIDI
morphing
motion capture
MOV
MP3
MP4
MPEG
object oriented
graphics
ODT
PDF
pixel
pixels per inch
plain text file
PNG
Portable Document
Format
PPI
raster graphics
capable of producing in a certain amount of space.
Software which restricts the actions a user can perform with a file, such as
copying or printing.
Software used for laying out text and images on pages. Commonly used for
books, magazines, and brochures.
Exceptions to copyright law that allow copying in certain limited circumstances.
General name for operations performed on an image using graphics software.
Lossless file format for audio.
Image effect found in most graphics software.
Area of a document which appears the same on every page.
Lossless file format for images.
Licensing system for authors who wish to distribute their work freely.
Technique used to replace part of a video image matching a certain colour with
computer graphics.
Area of a document which appears the same on every page.
Software used to create or edit bitmap graphics.
Refers to creations of the mind – non-physical property such as photographs,
music, stories, and films.
Lossy file format for images.
Technique used in graphics software to place digital images or effects on top of
each other to build up a final image.
Compression technique in which the original file is completely recoverable, with
no loss of quality. Compare lossy compression.
Compression technique in which some file data is sacrificed in order to reduce
file size.
A template page which is used to include standard features (such as page
numbers or a header) on each page of a document in a consistent manner.
Unit used to measure the resolution of digital cameras. Refers to 1 million pixels.
Musical Instrument Digital Interface. System for communication between musical
hardware and software applications.
Effect that transforms one image into another over a series of frames.
A system used to capture human movement into a computer by attaching
sensors to an actor and tracking their location.
Lossy file format for video.
Lossy file format for audio.
Lossy file format for video.
Lossy file format for video.
Graphics which are stored as a series of mathematical shapes and properties
that can be independently manipulated at any time.
File format for documents, used by LibreOffice.
Common file format for the exchange of documents, which appears on screen
exactly as it will appear on the printer.
Individual dots which make up bitmap graphics.
Number of pixels displayed in each inch of screen output.
File format that stores characters using ASCII or Unicode encoding.
Lossless file format for images.
Common file format for the exchange of documents, which appears on screen
exactly as it will appear on the printer.
Number of pixels displayed in each inch of screen output.
Graphics composed of rectangular grids of pixels.
resolution
Rich Text Format
rotating
RTF
sample rate
scaling
selection tools
streaming media
SVG
template
text file
TIF
true colour
TXT
typography
vector graphics
video CODECs
(coder-decoders)
virtual actors
Vorbis
watermarking
WAV
WMA
WYSIWYG
zip file
alternative key
auditing
Boolean
operators
character check
check digit
Comma
Separated
Values
composite key
computer
matching
consistency
check
CSV
Refers to the number of pixels in an image.
File format for documents, which can store text and some basic formatting
information.
Image effect found in most graphics software.
File format for documents, which can store text and some basic formatting
information.
Number of samples taken each second when recording sound.
Changing the size of an image.
Tools in graphics software for selecting only a subset of an image.
Video or audio data that is played while it is downloading.
Standard file format for vector image data.
A page which is used to include standard features (such as page numbers or a
header) on each page of a document in a consistent manner.
File format that stores characters using ASCII or Unicode encoding.
Lossless file format for images.
Image with 24 bit colour depth.
File format that stores characters using ASCII or Unicode encoding.
The proficient use of fonts, font sizes, and font properties such as leading and
kerning to display text in an appropriate manner.
Graphics which are stored as a series of mathematical shapes and properties
that can be independently manipulated at any time.
Software required to view certain compressed video and audio formats.
Animated characters used in films, created entirely using computer graphics
software.
Lossy file format for audio.
The process of adding an author name or logo into an image to identify its owner
and prevent intellectual property theft.
Lossless file format for audio.
Lossy file format for video.
What You See Is What You Get. Refers to programs that present their output
onscreen exactly as it will appear when printed.
Compressed file format for general data.
Field by which a database is often searched.
Recording database transactions made by users (e.g. all edits, reads) for security
purposes.
AND, OR, and NOT operators used in a query.
Ensuring a field contains only the specified character types.
Way of checking mathematically if a item of data has been correctly entered.
File format for transferring data, which stores fields and records in a plain text file,
separated by commas. See also TSV (Tab Separated Values).
Primary key which consists of more than one field.
Combining several databases to build up more information about a person or set of
people.
Validation check in which two fields' values are mutually dependent.
File format for transferring data, which stores fields and records in a plain text file,
separated by commas. See also TSV (Tab Separated Values).
data entry form
data integrity
data matching
data mining
Data Protection
Act
data redundancy
data types
data
warehouses
Database
Management
System
DBMS
field
field size
flat file database
foreign key
forms
index
input mask
key field
knowledge
discovery
length check
lookup
normalization
online
encyclopaedias
opt-in
opt-out
parameter query
personal data
personally
identifiable data
presence check
primary key
privacy policy
queries
range check
RDBMS
record
redundancy
redundant data
relational
database
Screen used to input data into a database.
Ensuring data is correct, consistent, and update to date.
Combining several databases to build up more information about a person or set of
people.
Searching collections of data for hidden patterns.
UK law that governs the collection and use of personal data.
Data in a database which is needlessly duplicated.
Format of data in a field, such as text, number, or date.
Vast databases containing many gigabytes of data.
Software used to create, enter, edit, and retrieve data in a database.
Software used to create, enter, edit, and retrieve data in a database.
Single item of data about a single record in a database.
Validation technique. Number of characters that can be stored in a field.
Database which consists of just one table.
Database field whose sole purpose is to form part of a relationship with another
table.
Screen used to input data into a database.
Field by which a database is often searched.
Validation technique. Ensures only the specified characters can be entered into a
field.
Field which contains a different value for every record in that table.
Searching collections of data for hidden patterns.
Validation technique. Number of characters that can be stored in a field.
Using a list of values to limit what can be entered into a field. For example, for the
'Gender' field, the values are limited to 'male' and 'female'
Process of converting a database from a flat file database to a relational database.
Web site containing a large number of articles for research purposes.
System in which users must explicitly decide to participate.
System in which users must explicitly decide not to participate.
Database query whose criteria are decided by the user at run-time.
Data which could identify a user, or lead to social impacts such as identity theft.
Data which could identify a user, or lead to social impacts such as identity theft.
Validation technique. Requires a field to be completed.
Field which contains a different value for every record in that table.
Policy governing what data a company or web site will collect about you and how it
will be used.
Method of extracting data from a database that matches specific criteria
Validation technique. Ensures a field is between a certain range of values.
Relational DBMS. See Database Management System.
Collection of fields that represent a single entity, such as a person.
Data in a database which is needlessly duplicated.
Data in a database which is needlessly duplicated.
Database containing multiple related tables and no redundant data.
searching
secondary key
secondary use
sensitive data
sorting
SQL
Structured
Query Language
Tab Separated
Values
tab-delimited
text files
table
Trans-border
data flow
TSV
validation
verification
absolute cell
reference
assumptions
car crash model
cell format
cell range
cell reference
centralized
processing
CFD
climate model
Computer model
Computer
simulation
Decision
Support System
distributed
processing
feedback loop
flight simulator
formula
full motion
platform
function
Method of extracting data from a database that matches specific criteria
Field by which a database is often searched.
Using data for a purpose other than the one for which it was collected.
Data such as medical records which, if shared, could cause serious negative
impacts on the data subject.
Ordering records based on a field (e.g. alphabetically).
Language for managing databases by typing commands.
Language for managing databases by typing commands.
File format for transferring data, which stores fields and records in a plain text file,
with fields separated by a tab character. See also CSV.
File format for transferring data, which stores fields and records in a plain text file,
with fields separated by a tab character. See also CSV.
In databases, a collection of records representing a type of item.
Transfer of data between countries.
File format for transferring data, which stores fields and records in a plain text file,
with fields separated by a tab character. See also CSV.
Checks to ensure whether data is in the correct format.
Checking whether data is correct – i.e. is the value entered in a field the actual
value?
In a spreadsheet, a cell reference which does not change when moved.
Often made during the construction of a computer model, as part of the
simplification process.
Used to predict the results of car crashes.
In spreadsheets, the properties of a cell such as its colour, font, and cell type.
In spreadsheets, reference to a range of continuous cells.
In spreadsheets, a combination of row number and column letter to refer to a single
cell (e.g. A2).
Single computer with multiple processors working on a task.
Computational Fluid Dynamics. A technique used to model airflow in computer
models.
Computer model used to predict possible future climate change.
Mathematical representation of the real world using computer software.
Based on computer models, gives users experience of events such as flying a
plane.
Use of models or expert systems to aid (business) decision making processes.
Use of multiple separate computers working together on a common task.
Comparing the results of a computer model to actual (real life) results, and using the
differences to improve the model for the future.
Simulator hardware and software used to train pilots.
In spreadsheets, a combination of cell references and mathematical operations.
Hardware device which can move in many directions to increase the realism of
simulators.
Built in features of spreadsheets for performing common calculations.
Global Climate
Model
goal seek
grid computing
high
performance
computing
parallel
processing
prediction
relative cell
reference
simplification
spreadsheet
supercomputer
variables
visualisation
What-if scenario
Computer model used to predict possible future climate change.
Spreadsheet tool used to determine the required values to meet a certain goal.
Use of multiple separate computers working together on a common task.
High speed computing using multiple processors
High speed computing using multiple processors
Output of a computer model.
In a spreadsheet, a cell reference which updates when moved.
Difference between a computer model's representation of a process, and the real
life process.
Application software for performing numerical calculations and analysis.
Fastest computers available, capable of performing trillions of calculations per
second.
Components of a computer model which can be altered to vary the output.
Graphical or animated output from a computer model or simulation.
Use of a computer model to test the results of different situations and scenarios.
Download