Information Technology Reference
In-Depth Information
Computing Device:. A. device. such. as. a. desktop,. laptop,.
handheld,.or.notebook.computer..A.server.can.also.be.
a.computing.device.
Conidentiality:. An. attribute. of. information.. Conidential.
information.is.sensitive.or.secret.information,.or.infor-
mation.whose.unauthorized.disclosure.could.be.harm-
ful.or.prejudicial.
Console:. The. screen. and. keyboard. that. allow. access. and.
control.of.the.server/mainframe.in.a.networked.envi-
ronment..The.console.will.usually.be.within.a.secure.
area. with. access. only. granted. to. a. system's. admin-
istrators,. with. all. actions. being. logged.. Users. of. the.
console.will.usually.have.highly.privileged.access.such.
as.Systems.Operations,.Super.User,.or.root.
Controls:. Procedures.that.can.reduce.or.eliminate.the.risk.of.
a.threat.becoming.an.incident.
Cookie:. A. small. identiier. ile. placed. on. a. user's. computer.
by.a.Web.site,.which.logs.information.about.the.user.
and.the.user's.previous/current.visits.for.the.use.of.the.
site.next.time.the.user.makes.contact..The.Web.site.
owners.claim.that.this.is.beneicial.to.the.user,.allow-
ing.faster.access.and.“personalization”.of.the.site.for.
that.user.
Corrupt Data:. Data.that.were.received,.stored,.or.changed,.
so.that.the.data.cannot.be.read.or.used.by.the.pro-
gram.that.originally.created.the.data..Most.common.
causes.of.corrupt.data.are.disk.failures.(usually.where.
the. magnetic. coating. of. the. disk. is. breaking. down,.
and.the.computer.cannot.read.the.disk.properly).and.
power.failures,.where.the.computer.loses.power.and.
shuts. down. unexpectedly. with. random. writes. to. the.
hard.drive,.and.loss.of.memory.contents.
Cryptography:. Primarily. concerned. with. maintaining. the.
privacy.of.communications,.and.modern.methods.use.
a.number.of.techniques.to.achieve.this..Encryption.is.
the.transformation.of.data.into.another.usually.unrec-
ognizable. form.. The. only. means. to. read. the. data. is.
Search WWH ::




Custom Search