Wednesday, October 05, 2011

The Information Security Glossary About Database

*** The Information Security Glossary About Database ***

Database Administrator - DBA

A 'DBA' is a highly technical person who has specialised in the development and maintenance of databases and database applications. The DBA is responsible for ensuring that all housekeeping routines are performed on the database, which may include designing and maintaining the structure and content of the (many) tables which together form the database, and the relationships between these tables. In addition, the DBA will usually be specialised in writing reports and querying the database, usually using Structured Query Language - or SQL.



Datascope
An electronic device that is capable of detecting and reading the bit-patterns of data passing down a communications line and interpreting/translating these patterns into readable alphanumeric characters.

Some devices are capable of detecting/reading the electromagnetic radiation emitted directly by computers without the need to 'tap' a communications line.

Dead Tree Edition
Techie slang for 'Hard Copy' - i.e. anything printed on paper, rather than held on computer media.
An ironic reference to the source of the paper required.

Debug
To trace and fix faults (bugs) in computer software and, occasionally, hardware. The term derives from the same source as Bug.

Deciplegic
Mouse Potato suffering from Trigger Finger.

Decryption
The process by which encrypted data is restored to its original form in order to be understood/usable by another computer or person.

DED
Dark-Emitting Diode (non-functioning Light Emitting Diode), a Friode.

Default
A default is the setting, or value, that a computer program (or system) is given as a standard setting. It is likely to be the setting that 'most people' would choose. For example, the default font on your word processor maybe Times New Roman 10 pitch; unless you change this, it will remain at the default setting.

Defaults are used throughout the computer industry to enable software to work 'out of the box' and not require ordinary people ('Users') to spend hours selecting every conceivable option in advance - quite thoughtful really!

Default Password
The password installed by a manufacturer and required to access a computer system when it is initially delivered, or a password required by software (typically shareware) to prove that the user is registered with the software vendor. Default passwords are not normally encountered on new PCs and have become relatively rare, but, in cases where such a password has been installed, the new owner of the equipment should change it at the earliest opportunity, to avoid it being known to third parties.

There are a range of default passwords known to everyone; and these are the first ones tried by anyone hacking into, or merely attempting opportunistic access. Such passwords as 'password', '123456' and ' ' i.e. blank (nothing) must be changed immediately. If you have one of these or similar passwords; please change it now. RUSecure™ will still be here when you have finished!


Denial of Service
A Denial of Service (DoS)attack, is an Internet attack against a Web site whereby a client is denied the level of service expected. In a mild case, the impact can be unexpectedly poor performance. In the worst case, the server can become so overloaded as to cause a crash of the system.

DoS attacks do not usually have theft or corruption of data as their primary motive and will often be executed by persons who have a grudge against the organisation concerned. The following are the main types of DoS attack :-

* Buffer Overflow Attacks; whereby data is sent to the server at a rate and volume that exceeds the capacity of the system; causing errors.
* SYN Attack. This takes places when connection requests to the server are not properly responded to, causing a delay in connection. Although these failed connection will eventually time out, should they occur in volume, they can deny access to other legitimate requests for access.
* Teardrop Attack. The exploitation of a features of the TCP/IP protocol whereby large packets of data are split into 'bite sized chunks' with each fragment being identified to the next by an 'offset' marker. Later the fragments are supposed to be re-assembled by the receiving system. In the teardrop attack, the attacker enters a confusing offset value in the second (or later) fragment which can crash the recipient's system.
* Smurf Attack or Ping Attack. This is where an illegitimate 'attention request' or Ping is sent to a system, with the return address being that of the target host (to be attacked). The intermediate system responds to the Ping request but responds to the unsuspecting victim system. If the receipt of such responses becomes excessive, the target system will be unable to distinguish between legitimate and illegitimate traffic.
* Viruses. Viruses are not usually targeted but where the host server becomes infected, it can cause a Denial of Service; or worse.
* Physical Attacks. A physical attack may be little more that cutting the power supply, or perhaps the removal of a network cable.


DES / AES
DES - The Data Encryption Standard and the AES - Advanced Encryption Standard are both data encryption standards for the scrambling of data to protect its confidentiality.

It was developed by IBM in co-operation with the American National Security Agency and published in 1974. It has become extremely popular and, because it used to be so difficult to break, with 72,000,000,000,000,000 possible key variations, was banned from export from the USA. However, restrictions by the US Government, on the export of encryption technology was lifted in 2000 to the countries of the EU and a number of other countries.

The AES - Advanced Encryption Standard, is a state of the art algorithm (developed by Rijndael) and chosen by the United States National Institute of Standards and Technology on October 2, 2000. Although selected, it will not become officially "approved" by the US Secretary of Commerce until Q2 2001. Meanwhile, products are already available which use the Rijndael algorithm within AES encryption tools. For example http://www.privatecrypt.com/int/.


Desktop
1. Verbal shorthand for Desktop Personal Computer, normally used to differentiate such a system from a 'Laptop' or portable PC.
2. In Windows 95®, and later releases, the screen visible on the computer monitor is known as the desktop and can be used to store programs and data as if it were a normal directory/folder. It is generally considered better practice to use the desktop as a place to store links to files and programs, rather than the files and programs themselves. This is partly because of the risk of accidental deletion, but - more importantly to companies - to avoid such files being visible to any curious passer-by.

Development Library
An area of the computer systems' fixed storage area which is set aside for the development of software, to minimise/avoid the possibility of conflict between an existing program and a new version.


Development Machine
An additional computer system, not part of the main processing system. Usually smaller than the main system, but similarly configured, the development machine is used for creating new software, amending existing software, and testing such creations and amendments to ensure that there is no possibility of the daily work and security of the main system being compromised by conflict between different versions of the same program. The development machine may also be used as a contingency standby machine, in case of failure of the main system. Companies unable to justify the costs of duplicate machines should use a Development Library within a partitioned area of the main system.


DHTML
Dynamic HyperText Markup Language. Contrary to its name, DHTML is not a new version of HTML - the Hyper Text Markup Language used to generate Web pages. DHTML is the combination of several browser features which, together, permit a Web page to be more 'dynamic'. Dynamic in this sense means the ability for the Web page to change its look and features after the page has been loaded; perhaps dependent upon the selection of various options. The recent versions of the most popular Web browsers all offer DHTML support.


Digital
Employing the binary system of numbers (1 and 0 only) for processing purposes.


Digital Certificate
A digital certificate is the electronic version of an ID card that establishes your credentials and authenticates your connection when performing e-Commerce transactions over the Internet, using the World Wide Web.

To obtain Digital Certificate an organisation must apply to a Certification Authority which is responsible for validating and ensuring the authenticity of requesting organisation. The Certificate will identify the name of the organisation, a serial number, the validity date ("from / to") and the organisation's Public Key where encryption to / from that organisation is required.

In addition, the Digital Certificate will also contain the Digital Signature of the Certification Authority to allow any recipient to confirm the authenticity of the Digital Certificate.

A global standard (X. 509 Public Key Infrastructure for the Internet) defines the requirements for Digital Certificates and the major Certificate Authorities conform to this. Such standards, and the integrity of the Certificate Authorities are vital for the establishment of 'digital trust', without which e-Commerce will never attain its potential.

Digital Signature
A digital signature is an electronic equivalent of an individual's signature. It authenticates the message to which it is attached and validates the authenticity of the sender. In addition, it also provides confirmation that the contents of the message to which it is attached, have not been tampered with, en route from the sender to the receiver.

A further feature is that an e-mail 'signed' with a digital signature cannot easily be repudiated; i.e. the sender is not able to deny the sending and the contents of the message; plus it provides a digital time stamp to confirm the time and date of transmission.

For a digital signature to be recognised, and acknowledged as something of integrity, it needs to be trusted by the recipient. It is for this reason that a Certification Authority will supply a digital signature to persons, the identity of whom, it has been able to verify; perhaps by having an Attorney's stamp on a document which validates the applicant's name, address, date of birth etc.

To provide greater digital trust, the Digital Signature is packaged with the certificate of the Certification Authority, and this too may be inspected for validity and expiration.

Most people expect digital signatures to totally replace the use of the ('old fashioned') pen and ink signature with orders and authorities being accepted via digitally signed e-mails, the contents of which may, or may not, be encrypted for additional security.

N.B. In July 2000, Digital Signatures became legally accepted in the United Kingdom under Section 7 of the Electronic Communications Act. In the USA also, Congress approved the use of Digital Signatures for certain types of e-Business around the same time under the E-Sign Act. Because both Acts are extremely new, it is strongly recommended that legal advice be sought before reliance is placed upon this new legislation.


Digital Versatile Disk - DVD
Currently, these optical storage disks are being pioneered by the entertainment business; notably because the DVD is able to store a full length feature movie on a single CD size disk, with faithful reproduction of visual and audio quality.

DVD, with a capacity (using both sides of the disk) of approx. 17GB, will doubtless replace the present CDs / CD-ROMs with their 'modest' 670MB capacity. At present consumer models are read only, but they will soon offer full record capability with integration into information systems.

Digital Watermark
A unique identifier that becomes part of a digital document and cannot be removed. The watermark is invisible to the human eye but a computer can analyse the document and extract the hidden data. Digital watermarks are being used for Classified/Top Secret documents - usually Military/Governmental - and highly confidential commercial material. The primary use of such marks is to allow different marks to be used when the document is copied to different persons and thereby establish an Audit Trail should there be any leakage of information.


Disable
The process by which hardware or software is deliberately prevented from functioning in some way. For hardware, it may be as simple as switching off a piece of equipment, or disconnecting a cable. It is more commonly associated with software, particularly shareware or promotional software, which has been supplied to a user at little or no cost, to try before paying the full purchase or registration fee. Such software may be described as 'crippled' in that certain functions, such as saving or printing files are not permitted. Some in-house development staff may well disable parts of a new program, so that the user can try out the parts which have been developed, while work continues on the disabled functions.

Disabling is also often used as a security measure, for example the risk of virus infection through the use of infected floppy diskettes can be greatly reduced, by disconnecting a cable within the PC, thereby disabling the floppy drive. Even greater protection is achieved by removing the drive altogether, thereby creating a diskless PC.


Disaster Recovery Plan - DRP
The master plan needed by technical and non-technical staff to cope with a major problem - such as the Boeing Syndrome. Do not confuse and merge the DRP with the Business Continuity Plan. The DRP is the plan which is activated when there is an emergency. It is the plan which ensures that health and safety come first followed by damage limitation. Having contained the impact of the disaster, and having ensured that the situation is now under control e.g. through the Emergency Services, then the Business Continuity Plan will be activated.

One of the most difficult aspects of a DRP is agreeing when it should be activated. In some circumstances it will be clear. For example, a tornado destroys part of the office block; or a serious fire reduces the premises to ashes. However, on many occasions, disasters have multiple warnings or indicators, and it is these which need to be considered and identified as the triggers to invoke your DRP.

N.B. The skills required to prepare and manage a DRP are not necessarily the same as those required for a Business Continuity Plan.


Distributed Processing
Spreading the organisation's computer processing load between two or more computers, often in geographically separate locations. If a organisation has the necessary financial and technical resources, distributed processing, with mirroring between sites, is an excellent contingency plan for sudden disasters.

Even if there is a total loss of one system, the remaining computer(s) can carry the load without disruption to users and without loss or corruption of data.


DMZ
A DMZ - De-Militarised Zone, is a separate part of an organisation's network which is shielded and 'cut off ' from the main corporate network and its systems. The DMZ contains technical equipment to prevent access from external parties (say on the Internet) from gaining access to your main systems.

The term comes from the buffer zone that was set up between North Korea and South Korea following their war in the early 1950s. A DMZ is not a single security component; it signifies a capability. Within the DMZ will be found firewalls, choke and access routers, front-end and back-end servers. Essentially, the DMZ provides multi-layer filtering and screening to completely block off access to the corporate network and data. And, even where a legitimate and authorised external query requests corporate data, no direct connection will be permitted from the external client, only a back-end server will issue the request (which may require additional authentication) from the internal corporate network.

However, the extent to which you permit corporate data to be accessible from and by external sources will depend upon the value of the Business Assets which could be placed at (additional) risk by allowing access to (even) pre-specified data types.

DNS
Domain Name System (or Server). The DNS is the means by which user friendly Web addresses are translated into arcane IP addresses. The DNS ensures that your are routed to the correct site.


Domain Name
The domain name identifies the location of an organisation or entity on the Internet and, through Domain Name Service translates this to an IP Address, which is the real address to which traffic destined for that domain name is routed.

Dongle
A mechanical device used by software developers to prevent unlicenced use of their product. Typically, a Dongle is a small connector plug, supplied with the original software package, which fits into a socket on a PC - usually a parallel port, also known generally as the LPT1 Printer port. Without the Dongle present, the software will not run. Some older Dongles act as a terminator, effectively blocking the port for any other use, but later versions have a pass-through function, allowing a printer to be connected at the same time. Even though the PC can still communicate with the printer, there have been problems with more recent printers which use active two-way communications with the PC to notify printing status, ink levels, etc.

Down
In IT terms, when a system is down, it is not available to users. This is not necessarily due to hardware or software faults, it may well be necessary to disconnect non-IT users, or take the system down for maintenance, installation of new hardware, loading new software etc. Traditionally such activities would take place after the End of Day, but the advent of 24x7 processing means there is no natural break in the cycle, and IT staff will therefore schedule the work for the time of minimum system workload - probably around 03:00 on Sunday morning!


Downtime
The amount of time a system is down in a given period. This will include crashes and system problems as well as scheduled maintenance work. Obviously, downtime impacts upon system availability, and most IT departments will maintain a downtime log to record when, and why, the system was not available to users. This log should be reviewed at intervals to identify any recurring problems, failure patterns etc.

DPI
Dots Per Inch. A measure of resolution for equipment such as printers and scanners. The more the better.

Drill Down
Descending through numerous layers of consolidations, summaries, etc., etc., to reach the really detailed information at the bottom.

Driver
A driver is a small interface program which allows a computer to communicate with a peripheral device, such as a printer or a scanner. The driver will be automatically installed when you connect the device to the PC; hence the need for a CD-ROM or floppy disk when installing such peripherals.

Dual Control
A control procedure whereby the active involvement of two people is required to complete a specified process. Such control may be physical; e.g. two persons required to unlock the Data Safe, or logical; as in the case of a higher level authorisation password required to permit the entry of data created or amended by another person.

Dual Control is one of the foundations of Information Security as it is based upon the premise that, for a breach to be committed, then both parties would need to be in collusion and, because one should always alternate the pairs of people, it would require a much greater level of corruption in order to breach dual control procedures; especially is such procedures require nested dual control access, such that (say) 2 pairs of people are required to enable access.

If this procedure appears someone 'dated' in today's 21st century 'wired' environment, please note that in 2000 a number of vendors started to sell 'Trusted Operations Systems', which enforce the requirement for dual control and the separation of duties, to provide substantially greater Information Security.


Dumb Terminal
A type of terminal that consists of a keyboard and a display screen that can be used to enter and transmit data to, or display data from, a computer to which it is connected. A dumb terminal, in contrast to an intelligent terminal, or PC, has no independent processing or storage capability and thus cannot function as a stand-alone device.

e-
Widely used - now widely overused - abbreviated prefix indicating 'electronic'.

Given the current frenzy for on-line services, companies are sticking the 'e-' prefix onto the front of almost any word to show how progressive and technologically advanced they are :-

e-business, e-commerce, e-trading, e-finance, e-broking, e-shopping, e-retailing, e-money, e-cash, e-purse, e-wallet, - the list is (probably) endless.

Earwigging
Alternative (slang) term for Eavesdropping.

Eavesdropping
Listening to someone else's conversation. In its most basic form, it amounts to one person keeping within earshot of a conversation between two other persons, but in the security and IT worlds it extends to remote listening and recording devices, include the interception of telephone calls, fax transmissions, e-mails, data transmissions, data-scoping, and even radio scanning for mobile communications.

The security implications for companies are primarily that user identification details or passwords can become known to criminally inclined individuals, or that confidential/sensitive information about the organisation, its finances, or activity plans may leak to competitors.

----------------------------

e-Commerce
e-Commerce, e-Business or e-Tailing is an electronic transaction, performed over the Internet - and usually via the World Wide Web - in which the parties to the transaction agree, confirm and initiate both payment and goods transfer; at the click of the mouse.

There are two general types of e-Commerce activity; Business to Consumer (or Business to Customer) - B2C, and Business to Business - B2B.

Business to Consumer is usually, but not always, characterised by the purchase of goods or services, using the "shopping cart" metaphor and the acceptance of credit / debit cards in payment.

Business to Business, on the other hand, is concerned with using the Internet to place and receive orders from other businesses; establishing legally binding contractual commitments and pooling the resources of companies across the globe to tender for a project, with each party being authenticated and legally bound by their digital commitments.

However, to achieve this, and for e-Commerce to reach its true potential requires 'digital trust', and for this to take place requires strong technical tools to authenticate, encrypt and assure the confidentiality of data. Whilst e-Commerce can be initiated using e-mail, this requires the adoption of Digital Signatures which not only authenticates the sender, it also confirms the time and date of transmission and assures that the contents of the transmission were not tampered with.

Transactions initiated using Web servers, usually rely upon Digital Certificates and the use of the Secure Sockets Layer authentication and encrypted communication standard. In addition, to provide security for the secure transmission of documents, and other data, the use of the RSA standard is common, with Public Key Infrastructure (PKI) being used to create, issue and manage the use of public and private keys (or Digital Certificates).

-------------------------------
Editor
A program which allows a user to create, view, and amend, the contents of certain types of files. There are several types of editors, the most common being Text Editors, and Hex (Hexadecimal) Editors.

Editors work at the lowest level, either in ASCII (Text Editor) or directly with disk contents (Hex Editor).

Although text Editors, e.g. Notepad in Windows®, are common, companies should give consideration to staff access to Editors, particularly the more powerful types - such as Hex Editors. A Hex Editor can do considerable damage to the contents of computer files, which may not be recoverable.

NB, Although Word Processors and other programs can be used to edit their own files, they are NOT Editors in this context.
-----------------------------
Electronic Eavesdropping
Electronic eavesdropping is the intentional surveillance of data - voice, data, fax, e-mail, mobile telephones etc, often for nefarious purposes.
-----------------------------------
End User
Usually reduced simply to User. The person who actually uses the hardware or software that has been developed for a specific task
---------------------------------
End User License Agreement - EULA
The End User License Agreement - or EULA - is a legally binding contract between the developer or publisher of a software program (or application) and the purchaser of that software. However, unlike the purchase of goods or services, the EULA is, as its name implies, a license agreement. In other words, the purchaser does not own the software, they merely have a right to use it in accordance with the licence agreement.

During the install of package software, the purchaser is shown the contents of the EULA and is often required to scroll down through the EULA, at the bottom of which, one may Accept or Refuse the terms of the EULA. By enforcing the need to scroll through the EULA, a user would be unlikely to succeed in any action to deny acceptance of the terms of the EULA.

In some cases, the EULA is written on the outside of the packaging with the breaking of the seal to the CD, indicating acceptance of the EULA.

In all cases, the EULA is the contract which users ignore at their peril; and whilst most EULAs contains broadly similar clauses and restrictions, it is important to confirm these before committing your organisation.
-------------------------------

Enforced Path
Normally, a user with the appropriate access control, is able to use any PC or workstation on the local area network to run an application or access certain data. However, where such data or system is classified as sensitive or requires restricted physical access, an enforced path may be applied. This is a straightforward configuration setting, performed by the Systems Administrator, whereby access is restricted to a specific workstation or range of workstations.

Enforcing the path will provide added security because it reduces the risk of unauthorised access; especially where such a workstation is itself within a secure zone, requiring physical access codes / keys etc.
------------------------
Enhancement
In theory, an improvement in hardware or software over the current version. In practice, enhancements are often merely vehicles to introduce some 'new' features into a package before withdrawing support for the current product, thereby pushing users towards upgrading their systems - at a price.
----------------------------------
Error Log
An error log records any abnormal activity on application software, usually in simple / plain text (ASCII). Each (main) application generates its own logs, and it is the responsibility of Systems Operations to retrieve and scrutinise them for any processing errors.
-------------------------------
Escrow
A legal provision whereby, in the event of a developer/supplier failing or otherwise ceasing to trade, the source code for their packaged software is made available to licensed / registered users, thereby enabling its ongoing maintenance.
-------------------------------------
Extranet
An Extranet is a private network which uses the Internet protocols and extends beyond an organisation's premises, typically to allow access by clients, suppliers, or selected third parties.

Extranets require strong security if they are to prevent unauthorised access. This can range from a relatively simple User ID and password to the use of Digital Certificates, User IDs and passwords, with, naturally, end to end encryption of data.

-------------------------------------
Fallback procedures
Fallback procedures are particular business procedures and measures, undertaken when events have triggered the execution of either a Business Continuity Plan or a Contingency Plan.
---------------------------------
Features / Glitches (Bugs)
Within the IT community, the term 'bug' is frowned upon, and is often replaced with the quaint term 'feature' or, a 'glitch'. Irrespective of how it is described, it remains a Bug !
--------------------------------
Fire Fighters
Net users who attempt to put out, or at least damp down, Flames/Flame Wars before they get out of hand. Rarely successful.
----------------------------
Fire-Resistant Storage Cabinet
The legal records and documents of most organisations are likely to be in traditional paper / printer form. A fire resistant cabinet or safe is required tTo secure these documents from fire for a guaranteed period of time.
--------------------------
Firewalls



Firewalls are security devices used to restrict access in communication networks. They prevent computer access between networks (say from the Internet to your corporate network), and only allow access to services which are expressly registered. They also keep logs of all activity, which may be used in investigations.

With the rapid growth in electronic communications - particularly via the Internet - firewalls, and firewall software, are being installed which will allow remote users to access limited parts of the system but restrict further access without satisfying specific identification and authorisation requirements. For example; an organisations' Web site will contain pages which are available to any Internet 'surfer' but other areas will not be accessible without recognition of authorised user status by the system. See Extranet.

Firewall Machine. A dedicated gateway computer with special security precautions on it, used to service outside network, especially Internet, connections and dial-in lines. The idea is to protect a cluster of more loosely administered machines hidden behind it from intrusion. The typical firewall is an inexpensive microprocessor-based Unix machine with no critical data, with modems and public network ports on it, but just one carefully watched connection back to the rest of the cluster. The special precautions may include threat monitoring, call-back, and even a complete iron box which can be keyed to particular incoming IDs or activity patterns.

Firewall Code. The code put in a system (say, a telephone switch) to make sure that the users can't do any damage. Since users always want to be able to do everything but never want to suffer for any mistakes, the construction of a firewall is a question not only of defensive coding but also of interface presentation, so that users don't even get curious about those corners of a system where they can burn themselves.


-----------------------------------
Fit for Purpose



Fit for Purpose is a general expression which can be useful to ensure that Information Security solutions are appropriate for your organisation. Vendors will sometimes attempt to 'fit' their solution to your problem. Fit for Purpose is an expression which, when used within the solution negotiation context, places an onus of responsibility upon the vendor to ensure that its solution is (indeed) fit for the purpose which their client expects.

Example : a well known systems company contracted for the sale of their system. Inclusive in the price was one of week training in the system. During implementation it became apparent that one week for training was totally inadequate. The customer successfully claimed (prior to legal action) that the supplier's solution was inadequate and hence not fit for purpose.

When considering Information Security solutions, it is good practice to remind any potential suppliers in your requirement that the solution must be fit for purpose. See also Request For Proposal.
-------------------------------
Fix



An operational expedient that may be necessary if there is an urgent need to amend or repair data, or solve a software bug problem.
-------------------------------
Fixed Storage



The internal media used by a computer to store files, data, programs etc, and usually referred to as the Fixed Disk(s) or Hard Drive(s). Fixed storage devices obviously can be removed from the system for repair, maintenance, upgrade etc., but generally this cannot be done without a toolkit to open up the system for physical access by an engineer. The term is used mainly to differentiate these items from removable storage media such as tapes, floppy diskettes, CDs, etc.
---------------------
Flag



A message indication, sometimes, but not always, a warning to a user, which appears when a certain event takes place. For example, an inventory monitoring program may well 'flag' certain products when stocks fall below a predetermined level, to alert the user to re-order.

An alternative use is to warn of an event which will take place in the future, but has not yet occurred, for example, a financial institution aware of large cheque-based transaction on a customer's account may 'flag' the account to avoid an unauthorised overdraft.

Flags may be generated manually or automatically, depending on circumstances. In the case of the stock monitoring this would be automatic, while the cheque transaction example would be processed manually.

Automatic flags serve a useful purpose in drawing users' attention to situations which otherwise may be overlooked.
--------------------------------
Flame



'Flame' is abusive communication by E-mail or posting to a newsgroup, which attacks an individual or organisation for some real or imagined grievance. The real problem is broader than that of a few rude e-mails: flame represents the anarchistic side of the Internet. The flame may start with only one abusive message, but it is broadcast so widely that large numbers of unconnected browsers join in - often on both sides of the argument. This can lead to 'Flame Wars', where the traffic load becomes so high that communications network performance degrades, and E-mail boxes become blocked - as is the case with bottlenecking and mail bombing.

Problems for companies may arise if a member of staff has used an organisation's e-mail address to start the flame - another reason to monitor staff activities.

Flame has some redeeming features. Deeply unpleasant (or disturbed) individuals who posted lengthy racist (or sexist, or some other -ist) diatribes have found themselves flamed off the Net....
---------------------------
Flame Bait



A Usenet posting or other message intended to trigger a flame war, or one that invites flames in reply. Acceptable for Usenet posters on a domestic machine, but not recommended in the office!
-------------------------------------
Flash



Two meanings. Firstly, Similar to a Flag but more obvious and usually more urgent, or more serious, a Flash is a visual warning to a user, often associated with security control procedures. For example, if a user who is already logged on at one computer attempts to also log on at a second terminal, the system will Flash the IT supervisor console to warn of possible attempted breach of security.

Secondly; Flash is a technology being used to provide complex animation and sound on Web sites. It is extremely popular!
----------------------------------

No comments: