V


Vernam cipher

See One-time Pad.

View

A logical operation that can be used to restrict access to specific information in a database, hide attributes, and restrict queries available to a user. Views are a type of constrained user interface that restricts access to specific functions by not allowing a user to request it.

Violation analysis

The process of examining audit logs and other sources in order to discover inappropriate activities.

Virtual memory

A type of secondary memory addressing that uses both installed physical memory and available hard drive space to present a larger, apparent memory space to the CPU.

Virus

A set of computer instructions, the purpose of which is to embed itself within another computer program, in order to replicate itself.

VoIP (Voice over IP)

Telephony protocols that are designed to transport voice communications over TCP/IP networks.

VPN (Virtual Private Network)

A private network used to communicate privately over public networks. Virtual Private Networks utilize encryption and encapsulation to protect and simplify connectivity.

Vulnerability

The absence or weakness of a safeguard in an asset, which makes a threat potentially more harmful or costly, more likely to occur, or likely to occur more frequently.




CISSP For Dummies
CISSP For Dummies
ISBN: 0470537914
EAN: 2147483647
Year: 2004
Pages: 242

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net