C


CA

See Certificate Authority

Certificate Authority (CA)

An organization or group that independently verifies the identity of a requestor and issues credentials that reflect that identity. The credentials are in the form of a certificate that the requestor can use for a number of purposes, such as identification of an email source or signing a component. To provide any value, both parties in an information exchange must trust the CA. In some cases, this means using a public CA such as VeriSign. However, in other cases, it means that third parties must trust the private company issuing the certificate. For example, some Windows server versions provide the means to issue private certificates.

CLR

See Common Language Runtime

Common Language Runtime (CLR)

The engine used to interpret managed applications within the .NET Framework. All Visual Studio .NET languages that produce managed applications can use the same runtime engine. The major advantages of this approach include extensibility (you can add other languages) and reduced code size (you don’t need a separate runtime for each language).

Common Object Request Broker Architecture (CORBA)

This protocol describes data and application code in the form of an object. This is the Object Management Group’s (OMG) alternative to Microsoft’s Component Object Model (COM). Although CORBA is incompatible with COM, it uses many of the same techniques as COM to create, manage, and define objects. CORBA was originally designed by IBM for inclusion with OS/2.

CORBA

See Common Object Request Broker Architecture

Cracker

A hacker (computer expert) who uses their skills for misdeeds on computer systems where they have little or no authorized access.

A cracker normally possesses specialty software that allows easier access to the target network. In most cases, crackers require extensive amounts of time to break the security for a system before they can enter it. Some sources call a cracker a black hat hacker.

Cryptographic Service Provider (CSP)

A specialty company that certifies the identity of companies, developers, or individuals on the Internet. This identification check allows the company to issue an electronic certificate, which can then be used to conduct transactions securely. Several levels of certification are normally provided within a specific group. For example, there are three levels of individual certification. The lowest merely verifies the individual’s identity through an Internet mail address; the highest requires the individual to provide written proof along with a notarized statement. When you access a certified site or try to download a certified document such as a component, the browser will display the electronic certificate onscreen, allowing you to make a security determination based on fact.

Cryptography

The process of changing text or other data into an unreadable form (cipher text) to protect the information during a transfer, storage, or other transition, and then changing the unreadable form back into the original format. The first part of the process is known as data encryption, while the second part of the process is decryption. Asymmetric cryptography relies on a public and private key pair for encrypting and decrypting the data. Symmetric cryptograph relies on a single private key for both data encryption and decryption.

CSP

See Cryptographic Service Provider




.Net Development Security Solutions
.NET Development Security Solutions
ISBN: 0782142664
EAN: 2147483647
Year: 2003
Pages: 168

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net