or someone which is unnamed. On the Internet it refers to
the ability to access a server or information without reference
to the person or entity who is making the request.
FBI project for monitoring email.
computer record which associates a public key to a specific
person or company
which manages security credentials for web-sites and other
Gateway Interface. Rules for running programs on a web HTTP
server providing a "gateway" to its information.
block of data which is stored on the user's computer by a
website for later use. Cookies are not necessarily bad, but
can be used to track behavior or store personal data which
was previously supplied by a user.
Revocation List. A list of certificates which have been revoked
by the certificate authority which issued them.
field of study in which information is protected by converting
it with algorithms. See encryption.
practice of searching databases for hidden patterns of data
which reveal additional information to create detailed profiles
-- which may or may not be sold to third-parties.
convert scrambled (encrypted) information back to a usable
or readable format.
U.S. government's 56-bit encryption standard.
digital code which verifies the person or company sent the
Communications Privacy Act. A federal statute which prohibits
a third-party from intercepting or disclosing communications.
practice of sending an email which has had the identifying
headers forged or altered to conceal the sender for unethical
convert data (such as plaintext) into a format that is no
longer readable without a password
process of concealing information by scrambling the data via
Bureau of Investigation
combination of software and hardware which monitors a computer
or network for unauthorized access.
Transfer Protocol Secured. See SSL.
Protocol (as in TCP/IP) which is a unique number identifying
a machine connected to the Internet.
password. Usually a key is not memorable to people but a password
Gosudarstvennoi Bezopasnosti [Russian] Which means the (Soviet)
State Security Committee
access by indentifying oneself, typically using a username
Digest [algorithm] 5. A specific encryption protocol, often
used for accessing protected webpages.
password which is generally longer in length yet still memorable
to a person.
secret sequence known to a user to confirm their identity
to a system being accessed.
Good Privacy. A popular public-key encryption standard created
by Phil Zimmerman.
Key Infrastructure. A system supporting public key encryption.
unencrypted messages or data.
web document which states how that website or company uses
their users information which was supplied directly or passively.
Shamir, & Adleman. The company RSA Data Security, Inc. developed
a popular public key encryption standard, the patent for it
expired in September 2000.
Electronic Transaction, a protocol developed by Visa and MasterCard
to allow secure credit card transactions of the Internet.
and unrequested junk mail. For example, business opportunities,
or items for sale.
Sockets Layer. Web security protocol to encrypt communication
betwee a users browser and a web server.
independent non-profit entity which builds users' trust in
a company's commitment to privacy through use of a seal.
name which identifies the person acessing the system and is
unique within the system being accessed.
Private Network. A closed system which allows members to treat
a public network as a private one by using encryption protocols.