DictionaryForumContacts

   English thesaurus
B C D EG HJ KM N O P Q R S T UW X Y Z   <<  >>
Terms for subject Information technology (11929 entries)
WCDMA ??? Code Division Multiple Access
WCDMA-FDD ??? Code Division Multiple Access - Frequency Division Duplex
WCDMAFDD ??? Code Division Multiple Access - Frequency Division Duplex
WCDMA-TDD ??? Code Division Multiple Access - Time Division Duplex
WCDMATDD ??? Code Division Multiple Access - Time Division Duplex
GFS ??? File System
ITX ??? Technology eXtended
Highway Addressable Remote Transducer protocol протокол HART Michae­lBurov
at @ Damian
Service Set Identifier A 32-character unique identifier attached to the header of packets sent over a wireless local area network (WLAN) that acts as a password when a mobile device tries to connect to the base station subsystem (BSS)
general computer control A Control, other than an application control, that relates to the environment within which computer-based application systems are developed, maintained and operated, and that is therefore applicable to all applications. The objectives of general controls are to ensure the proper development and implementation of applications and the integrity of program and data files and of computer operations. Like application controls, general controls may be either manual or programmed. Examples of general controls include the development and implementation of an IS strategy and an IS security policy, the organization of IS staff to separate conflicting duties and planning for disaster prevention and recovery.
servlet A Java applet or a small program that runs within a web server environment
segregation/separation of duties (SoD) A basic internal control that prevents or detects errors and irregularities by assigning to separate individuals the responsibility for initiating and recording transactions and for the custody of assets
handprint scanner A biometric device that is used to authenticate a user through palm scans
Triple DES (3DES) A block cipher created from the Data Encryption Standard (DES) cipher by using it three times
assessment A broad review of the different aspects of a company or function that includes elements not covered by a structured assurance initiative
compliance (GRC) A business term used to group the three close-related disciplines responsible for the protection of assets, and operations
badge A card or other device that is presented or displayed to obtain access to an otherwise restricted facility, as a symbol of authority (e.g., the police) or as a simple means of identification
classification A catalogue of attack patterns as "an abstraction mechanism for helping describe how an attack against vulnerable systems or networks is executed" published by the MITRE Corporation
cross-certification A certificate issued by one certificate authority (CA) to a second CA so that users of the first certification authority are able to obtain the public key of the second CA and verify the certificates it has created