See One-time Pad.
A logical operation that can be used to restrict access to specific information in a database, hide attributes, and restrict queries available to a user. Views are a type of constrained user interface that restricts access to specific functions by not allowing a user to request it.
The process of examining audit logs and other sources in order to discover inappropriate activities.
A type of secondary memory addressing that uses both installed physical memory and available hard drive space to present a larger, apparent memory space to the CPU.
A set of computer instructions, the purpose of which is to embed itself within another computer program, in order to replicate itself.
Telephony protocols that are designed to transport voice communications over TCP/IP networks.
A private network used to communicate privately over public networks. Virtual Private Networks utilize encryption and encapsulation to protect and simplify connectivity.
The absence or weakness of a safeguard in an asset, which makes a threat potentially more harmful or costly, more likely to occur, or likely to occur more frequently.