Front | Back |
Cipher
|
An algorithm used to encrypt and decrypt text
|
Cryptanalysis
|
The process of decrypting a message without knowing the cipher or key used to encrypt it
|
Cryptography
|
The field of study related to encoded information
|
Digital Certificate
|
A representation of a sender's authenticated public key used to minimize malicious forgeries
|
Database Management System
|
A combination of software and data made up of the physical database, the database engine, and the database schema
|
Electronic Commerce
|
The process of buying and selling products and services using the world wide web
|
Information Security
|
The techniques and policies used to ensure proper access to data
|
Information System
|
Software that helps the user organize and analyze data
|
Key
|
One or more fields of a database record that uniquely identifies it among all other records in the table
|
Phishing
|
Using a web page to masquerade as part of an authoritative system and trick users into revealing security information
|
Query
|
A request to retrieve data from a database
|
Relational Model
|
A database model in which data and the relationships among them are organized into tables
|
Spoofing
|
An attack on a computer system in which a malicious user masquerades as an authorized user
|
Spreadsheet Function
|
A computation provided by the spreadsheet software that can be incorporated into formulas
|
Spreadsheet
|
A program that allows the user to organize and analyze data using a grid of cells
|