Definition of computer terms beginning with the letter A
ActiveX
Microsoft's technology to install programs over the Internet that add additional features to your browser (the program you are surfing the Internet with). This technique is sometimes hijacked by spyware writers.
Ad hoc
"Ad Hoc" mode is a mode of operation that allows computers connected directly to a Wi-Fi network card to be connected directly, without the use of third-party hardware such as an Access Point (AP).
.
Address Spoofing
Malicious act of deliberately using the address of another system instead of his own.
Adware
Form of spyware. An adware is a software that displays on your computer all kinds of advertisements, usually in the form of a pop-up, that is to say a small window opening unexpectedly and containing an advertisement. This advertisement should not be confused with advertising that you see often when you visit a website.
AIS
Automated information system. This term refers to all equipment (hardware, software, or "firmware") that enables the automatic acquisition, storage, manipulation, control, display, transmission, or reception of data.
Alert
Message describing a circumstance relating to network security. Alerts often come from active monitoring systems on the network.
Algorithm
A procedure, formula, or list of instructions that can be used to complete a task or solve a problem. In mathematics and computer science, an algorithm usually represents a procedure used to solve a recurring problem.
Cryptographic algorithm
A method used to transform plain text into an unreadable and unintelligible form. A cryptogram is text that has been encoded in this unreadable format. This method often involves the use of a mathematical formula to encrypt the plaintext in cryptogram and a key to decrypt the cryptogram.
Ankle-Biter
An individual who wants to become a Cracker or Hacker whose knowledge of computer systems is insufficient. In general, most of the time they are young teens using easy-to-use programs from the Internet.
Anti-Rootkit
Security software for detecting and disabling or removing rootkits.
Anti-Spyware
Computer program that protects your computer against spyware.
Anti-virus
Computer program that protects your computer against viruses.
AntiSpam
Antispam system where someone who sends an e-mail for the first time to the user of this system must first demonstrate that he is not a spammer, via a simple operation. Only then can he send a message to the user of the challenge response system.
ARP
The Address Resolution Protocol is a protocol that translates a network layer protocol address (typically an IP address) into an Ethernet address (typically a MAC address), or even any hardware. link layer.
ASIM
System for automatically evaluating a security incident, monitoring network traffic and collecting information about network elements where unauthorized activity is detected.
ASM
Automatic management of security. Term for all security services that provide an effective level of protection for the physical environment, the software environment, and any kind of data.
Assessment
Vulnerability analysis of an automated information system that consists of monitoring and inspecting the system. Its purpose is to help the administrator to secure it as much as possible.
ATM
Asynchronous transfer mode. A method of dynamically distributing bandwidth using fixed-size packets called cells. The term "fast packet switching" is also used to refer to ATM technology. (Asynchronous Transfer Mode)
Authentication Header
Header identification. When exchanging data between two computers, this is the field that follows the IP header in an IP datagram and verifies the source and its integrity.
Authentication
The purpose of authentication is to verify the identity that an entity claims.