• September 21, 2005 21 Sep'05

    bogie (bogey)

    The term bogie, also spelled bogey, refers to a false blip on a radar display.  Continue Reading

  • September 21, 2005 21 Sep'05

    crypto

    Depending on its usage, crypto can be a short form for cryptography or for encryption.  Continue Reading

  • September 21, 2005 21 Sep'05

    conditional access (CA)

    Conditional access (CA) is a technology used to control access to digital television (DTV) services to authorized users by encrypting the transmitted programming.  Continue Reading

  • September 21, 2005 21 Sep'05

    stream cipher

    A stream cipher is a method of encrypting text (to produce ciphertext) in which a cryptographic key and algorithm are applied to each binary digit in a data stream, one bit at a time.  Continue Reading

  • September 21, 2005 21 Sep'05

    secret key algorithm (symmetric algorithm)

    A secret key algorithm (sometimes called a symmetric algorithm) is a cryptographic algorithm that uses the same key to encrypt and decrypt data.  Continue Reading

  • September 21, 2005 21 Sep'05

    Automated Clearing House (ACH)

    Automated Clearing House (ACH) is a secure payment transfer system that connects all U.S. financial institutions.  Continue Reading

  • September 21, 2005 21 Sep'05

    Electronic Signatures in Global and National Commerce Act (e-signature bill)

    The Electronic Signatures in Global and National Commerce Act (often referred to as the e-signature bill) specifies that in the United States, the use of a digital signature is as legally valid as a traditional signature written in ink on paper.  Continue Reading

  • September 21, 2005 21 Sep'05

    set

    A set is a group or collection of objects or numbers, considered as an entity unto itself. SET is also an acronym for Secure Electronic Transaction.  Continue Reading

  • September 21, 2005 21 Sep'05

    quantum cryptography

    Quantum cryptography uses our current knowledge of physics to develop a cryptosystem that is not able to be defeated - that is, one that is completely secure against being compromised without knowledge of the sender or the receiver of the messages.  Continue Reading

  • September 21, 2005 21 Sep'05

    journaling file system

    A journaling file system is a fault-resilient file system in which data integrity is ensured because updates to directories and bitmaps are constantly written to a serial log on disk before the original disk log is updated.  Continue Reading

  • September 21, 2005 21 Sep'05

    key

    In cryptography, a key is a variable value that is applied using an algorithm to a string or block of unencrypted text to produce encrypted text, or to decrypt encrypted text.  Continue Reading

  • September 21, 2005 21 Sep'05

    security identifier (SID)

    In Windows NT and 2000 operating systems, the security identifier (SID) is a unique alphanumeric character string that identifies each operating system and each user in a network of NT/2000 systems.  Continue Reading

  • September 21, 2005 21 Sep'05

    executable

    In computers, to execute a program is to run the program in the computer, and, by implication, to start it to run.  Continue Reading

  • September 21, 2005 21 Sep'05

    cryptology

    Cryptology is the mathematics, such as number theory, and the application of formulas and algorithms, that underpin cryptography and cryptanalysis.  Continue Reading

  • September 21, 2005 21 Sep'05

    access log

    An access log is a list of all the requests for individual files that people have requested from a Web site.  Continue Reading

  • September 21, 2005 21 Sep'05

    session key

    A session key is an encryption and decryption key that is randomly generated to ensure the security of a communications session between a user and another computer or between two computers.  Continue Reading

  • September 21, 2005 21 Sep'05

    Market trends: The future of e-mail security

    The e-mail security market is undergoing a change that is marked by commoditization and centralization. Joel Snyder analyzes these trends and offers a glimpse at the future of e-mail security products.  Continue Reading

  • September 21, 2005 21 Sep'05

    Hacking smart cards and biometric security systems

    In this Ask the Expert Q&A, our identity and access management guru explains how biometrics and smart cards can be fooled.  Continue Reading

  • September 21, 2005 21 Sep'05

    Penetrating a biometric security system

    In this Ask the Expert Q&A, our identity and access management expert takes a closer look at the strengths and weaknesses of a biometric security system.  Continue Reading

  • September 21, 2005 21 Sep'05

    Managing internal network devices

    In this Ask the Expert Q&A, our expert explains how tokens can be used to manage an internal network. Also learn best practices for implementing this management system.  Continue Reading

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close