Overview

password

Return to overview »

Results | All related links for this item | 1-20 of 59 results for:


Show only full text

Refine by type

Refine by product

 

access control

Overview page. Subjects: Computing.

A trusted process that limits access to the resources and objects of a computer system in accordance with a security model. The process can be implemented by reference to a stored table...

See overview in Oxford Index

accessware

Overview page. Subjects: Computing.

A generic term used to describe the software that regulates access to a network to authorized users. It includes components of a software system that check passwords and mediate access to...

See overview in Oxford Index

account

Overview page. Subjects: Computing.

The environment in which a user interacts with a computer system. Each account has a unique name, which the user specifies when logging in. System data associated with an account controls...

See overview in Oxford Index

anonymous FTP

Overview page. Subjects: Computing.

A mechanism that allows a user to take copies of files from a network file server, without having a named account on the server. The user “anonymous” is allowed to log into the server, and...

See overview in Oxford Index

authentication

Overview page. Subjects: Computing.

The process of convincing a network that a person is who he or she claims to be. This follows the process of identification. Devices that are used for authentication include passwords,...

See overview in Oxford Index

authentication

Overview page. Subjects: Law.

N.

A distinct procedural step at the conclusion of a treaty at which the definitive text of the treaty is established as correct and authentic and not subject to further...

See overview in Oxford Index

biometric identification system

Overview page. Subjects: Computing.

A system which uses some physical human characteristic to determine the identity of the user of a computer system. Typical characteristics that have been used include: typing...

See overview in Oxford Index

challenge response

Overview page. Subjects: Computing.

A security technique by which the user of a network is asked a question to which the computer knows the answer, such as the maiden name of the user's mother. If the user gives the wrong...

See overview in Oxford Index

closed network

Overview page. Subjects: Computing.

A network to which access is only allowed to users who have been authenticated. Typically this type of network uses technologies such as firewalls, proxy servers, passwords, and firewall...

See overview in Oxford Index

connection hijacking

Overview page. Subjects: Computing.

The process whereby an intruder intercepts a connection between a user and a computer and takes over the role of one of the parties in the dialogue that takes place. For example, an...

See overview in Oxford Index

default password

Overview page. Subjects: Computing.

The password that is delivered with a software product. Normally the password is easy to guess and hence is a target for crackers.

See overview in Oxford Index

demo account

Overview page. Subjects: Computing.

An account on a network which has been created for some demonstration purpose: for example, to show some software at a trade fair. Often these accounts have easy-to-remember passwords such...

See overview in Oxford Index

dictionary attack

Overview page. Subjects: Computing.

An attempt to enter a network illegally using a large number of passwords generated from a computerized dictionary. A cracker using this form of attack would repeatedly try to discover the...

See overview in Oxford Index

drawer attack

Overview page. Subjects: Computing.

An attack on a computer network which relies on data that can be physically discovered rather than electronically discovered: for example, the use of a password stored in a document held in...

See overview in Oxford Index

emanation

Overview page. Subjects: Computing.

Radiation which is produced by devices that are attached to a network. Typically they are produced by monitors or other visual display units. Such radiation can be monitored by crackers and...

See overview in Oxford Index

escrow

Overview page. Subjects: Computing.

A process whereby a copy of a password or encryption key is held by a third party to allow the key to be recovered if the original is lost.

See overview in Oxford Index

financial malware

Overview page. Subjects: Computing.

*Malware that is used for criminal purposes associated with financial transactions. For example a keylogger that is used to extract passwords from the keystrokes employed by the user of a...

See overview in Oxford Index

funeral attack

Overview page. Subjects: Computing.

An attack on a computer installation which uses old data. For example, an intruder may use an old password to enter a system: perhaps a password which was initially allocated to a system...

See overview in Oxford Index

hacker

Overview page. Subjects: Computing.

1 A person who attempts to breach the security of a computer system by access from a remote point, especially by guessing or otherwise obtaining a password. The motive may be...

See overview in Oxford Index

identification

Overview page.

(I-den-ti-fi-kay-shŏn)

(in psychological development) the process of adopting other people's characteristics more or less permanently. Identification with a parent is important in...

See overview in Oxford Index