What is Integrity in Regards to Computer Technology? This and Other Terminology Explained

What is Integrity in Regards to Computer Technology? This and Other Terminology Explained
Page content

I - K

I

<strong>Identity Theft</strong>

Although self-explanatory, this term refers to type of attack that has become more prevalent in our society due to the increased use of technology to store confidential or sensitive personal information. Much of this information is stored electronically making it a target for internet predators and hackers.

Integrity

When speaking in terms of computer technology, integrity usually speaks to one of two things: the accuracy or completeness of data OR the perceived reliability of a hardware device.

IP

Internet Protocol is the protocol used to send packets of information from one host to another over the internet. This is where the term IP Address is derived. Consequently, an IP address is a unique identifier that can be statically or dynamically assigned to a host.

IP Flood

An IP flood is a type of denial of service (DoS) attack where a host receives so many information requests (ping requests for example) that the bandwidth of that port is maxed out. This essentially prevents genuine users from gaining access through that port, causing a service interruption (DoS).

IP Spoofing

This term refers to a hacking technique where an IP packet’s true contents are masked or “disguised” by using a valid IP address for the packet header.

J

JavaScript

JavaScript, as its name implies, is a scripting language used along with HTML to enhance the functionality of web pages. The language is based on the Java programming language. In the past JavaScript scripts have been notorious for hijacking your browser by subsequently installing spyware and/or adware onto your computer. This ability of a script to bypass local security policies was one of the major security flaws. Since the inception of this scripting language, security continues to improve.

K

Kerberos

A security authentication protocol developed at MIT (Massachusetts Institute of Technology). Kerberos uses a combination of an authentication service and data encryption to grant a user a “ticket” for access to other system services. This ticket is then referenced each time access to a new service is requested.

Keylogger

A keylogger is a computer program that tracks a user’s keyboard input (keystrokes). The goal of such a program is to covertly collect user names, passwords, and other personal information from a user.

This post is part of the series: Common Security Terms Dictionary

If you’re new the computing world, all of the acronyms, nomenclature, and strange terms can become a little intimidating. It’s my hope that this dictionary series will help you absorb this information and shed some light on the world of “techno-babble.”

  1. Common Security Terms Dictionary: A to B
  2. Common Security Terms Dictionary: C to D
  3. Common Security Terms Dictionary: E to F
  4. Common Security Terms Dictionary: G to H
  5. Common Security Terms Dictionary: I to K
  6. Common Security Terms Dictionary: L to M
  7. Common Security Terms Dictionary: N to O
  8. Common Security Terms Dictionary: P
  9. Common Security Terms Dictionary: Q to R
  10. Common Security Terms Dictionary: S
  11. Common Security Terms Dictionary: T
  12. Common Security Terms Dictionary: U - V
  13. Common Security Terms Dictionary: W - Z