- ActiveX A software framework developed by Microsoft that allows for the creation of interactive web-based applications. It is commonly used in Internet Explorer and other web browsers to provide enhanced functionality and interactivity. Examples of ActiveX controls include video players, PDF viewers, and web-based games. Due to security concerns and the advent of newer technologies, the use of ActiveX has significantly declined and is supported by fewer browsers.
- Address bus A set of wires in a computer's motherboard that carries the address of a memory location to be accessed. It is used to enable communication between the CPU and memory modules. Examples include the 16-bit address bus in early PCs and the 64-bit address bus in modern computers.
- Addressing In the context of computer networks, addressing refers to the assignment of a unique identifier to each device or destination on the network. This identifier, also known as an IP address, allows devices to communicate with each other and route data packets to their intended destination. Examples of addressing include the use of IP addresses in the Internet Protocol (IP) to identify computers on the Internet and the use of MAC addresses in local area networks (LANs) to identify individual network devices.
- Address Resolution Protocol (ARP) a networking protocol that maps a network's logical IP address to its physical MAC address. It is used to enable communication between devices on a network. Examples include ARP requests, and ARP replies in the process of resolving an IP address to a MAC address.
- Address space The range of addresses that can be assigned to devices on a network. Address space refers to the range of IP addresses that can be assigned to devices on a network, including both IPv4 and IPv6 addresses. This is used in networking to ensure that each device on the network has a unique address and can communicate with other devices. It is used to identify and locate devices on a network.
- Address Space Layout Randomization (ASLR) A security technique that randomly arranges the positions of key data areas of a program—including the base of the executable and position of libraries, heap, and stack—in a process's address space. By doing so, it makes it harder for an attacker to predict target addresses, thus mitigating the risk of exploitation techniques such as buffer overflow attacks. ASLR is widely used in modern operating systems to enhance their security posture.
- Adequate Security The level of security considered sufficient to protect an information system, data, or network from unacceptable losses or damage. This typically involves a balance between the potential harm caused by a security incident and the cost and effort of implementing security measures. Adequate security is often defined by regulatory requirements, industry standards, or an organization's risk tolerance and may vary depending on the nature of the assets being protected and the threat landscape.
- Ad Hoc Mode A wireless network mode where devices connect directly to each other without the use of a central access point. It is used in situations where a temporary network is needed, such as a group of friends sharing files at a party. Examples include Wi-Fi Direct, Bluetooth, and peer-to-peer networking.
- Administrative Controls Policies and procedures implemented by an organization to manage and regulate user behavior and system operation. These include security policies, operating procedures, rules of behavior, and personnel controls, among others. Administrative controls are a vital part of an organization's overall security strategy, serving to guide the appropriate use and handling of resources, define roles and responsibilities, and establish processes for monitoring, incident response, and recovery. They complement technical and physical controls to create a multi-layered defense against security threats.
- Admissible evidence Any evidence that is legally permitted to be used in a court of law. It must be relevant, reliable, and obtained in a manner that follows the rules of evidence. Admissible evidence is typically used in criminal and civil trials to prove the guilt or innocence of a defendant. Examples of admissible evidence include eyewitness testimony, physical evidence, and expert witness testimony. In IT, it must be gathered and preserved following proper digital forensic procedures to maintain its integrity and authenticity. Examples include logs, digital documents, emails, and digital forensics reports.
Share our FREE glossary with your friends and study buddies.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions, if you find errors please contact us.