An emerging field that combines more traditional voice networks with modern computer networks
CTI (Computer-Telephony Integration)
A collection point for wires that interconnect the workstations.
More advanced devices that are replacing hubs and are capable of filtering out unnecessary traffic.
The connecting devices between local area networks and wide area networks.
A Web-based attack that involves sending the victim a e-mail that is designed to look like a legitimate request coming from a well-known company and therby lure the victim into revealing private information.
A Web-based attack in which a user seeking to visit a particula company's Web site is unknowingly redirected to a bogus Web site that looks exactly like that company's official Web site. Hackers do this in order to collect personal information.
A destructive piece of code that hides inside a harmless-looking piece of code, such as an e-mail message or an application macro.
A small program that alters the way a computer operates without the knowledge of the computer's users, corrupting data and program files, or altering operating system components, so that the computer operation is impaired or even halted
A common type of virus that is programmed into an attached macro file.Macros viruses hide within an applications macro and is activated when the macro is executed.
One of the original forms of viruses, a boot sector virus is usually stored on some form of removable media.When the media is connected to the machine and is used to boot the machine, the virus moves from the media into the host system.
Boot Sector Virus
These viruses mutate with every infection, thus making them difficult to locate.
A virus that infects a piece of executable code such as an .exe or .com
File infector virus
A special type of virus that copies itself from one system to another over a network, without the assistance of a human being.
A system or combination of systems that supports an access control policy between two networks
Encryption software that has become the de-facto standard for creating secure e-mail messages and encryption of other types of data files.
Pretty Good Privacy (PGP
A new encryption technique selected by the U.S. government. _____ is based on the Rijndael algorithm and uses 128,192, or 256 bit keys.
Advanced Encryption Standard (AES
Electronically monitoring data flow and system requests into and out of their system.
A cohesive unite of raw data.
A commercially available packet-switched network taht was designed for transmitting data over fixed lines (as opposed to dial-up lines).
A wide area network routing protocol in which each node takes the incoming packet and retransmits it onto every outgoing link.
The telephone line that leaves your house or business; it consists of either four or eight wires
A methodology for a structured approach for the development of a business system; it includes the following phases: planning, analysis, design, implementation and maintenance.