(1) The collection of transmitted voice or data and the sending of that data to a listening device. (2) Cutting in on a communications line to get information. Two types of wiretapping exist: active and passive. Active wiretapping is the attaching of an unauthorized device, such as a computer terminal, to a communications circuit for the purpose of obtaining access to data through the generation of false messages or control signals or by altering the communications of legitimate users. Passive wiretapping is the monitoring and/or recording of data transmitted over a communication link.
The amount of work necessary for an attacker to break the system or network should exceed the value that the attacker would gain from a successful compromise.
A computerized information system that is responsible for scheduling and synchronizing the various tasks within the workflow, in accordance with specified task dependencies, and for sending each task to the respective processing entity (e.g., Web server or database server). The data resources that a task uses are called work items. WFMS is the basis for work flow policy access control system.
The sub-component that enables one component to access services on other components to complete its own processing in a service-oriented architecture (SOA). The workflow manager determines which external component services must be executed and manages the order of service execution.
(1) A piece of computer hardware operated by a user to perform an application. Provides users with access to the distributed information system or other dedicated systems; input/output via a keyboard and video display terminal; or any method that supplies the user with the required input/output capability. Computer power embodied within the workstation may be used to furnish data processing capability at the user level. (2) A high-powered PC with multifunctions and connected to the host computer.
A system of Internet hosts that support documents formatted in HTML, which contains links to other documents (hyperlinks), and to audio and graphics images. Users can access the Web with special applications called browsers (e.g., Netscape and Internet Explorer).
A self-replicating and self-contained program that propagates (spreads) itself through a network into other computer systems without requiring a host program or any user intervention to replicate.
A fundamental operation that results only in the flow of information from a subject to an object.
Permission to write an object.
A device that allows investigators to examine media while preventing data writes from occurring on the subject media.
Hardware or software methods of preventing data from being written to a disk or other medium.
X
Used for data encryption algorithm (All standards starting with X belong to International Organization for Standards ISO).
Used for message authentication.
Used for cryptographic key management (Financial Institution Key Management).
Used for digital signature algorithm (DSA) and the secure hash algorithm (SHA-1).
Used for rDSA signature algorithm.
Used for agreement of symmetric keys using discrete logarithm cryptography.
Used for the transport of symmetric algorithm keys using reversible public key cryptography.
Used for triple data encryption algorithm (TDEA).
Used for elliptic curve digital signature algorithm.
Used for key agreement and key transport using elliptic curve-based cryptography.
Used for cryptography device security.
Defines EDI standards for many U.S. industries (e.g., healthcare and insurance).
Defines the interface between terminal equipment and public data networks.
A standard for the network and data link levels of a communications network. It is a WAN protocol.
A standard that defines ways of connecting two X.25 networks.
Network user address used in X.25 communications.
Used in e-mail as a message handling protocol for reformatting and sending e-mails.
A standard protocol used in electronic directory services.
A standard protocol used in digital certificates and defines the format of a public key certificate.
Used as a network security standard.