Glossary
Term | Description |
---|---|
Vernam cipher |
A device that implements a 26-character modulo 26 substitution cipher. It functions as a one-time pad.
|
Vertical market software |
Application software that is unique to a particular industry.
|
View |
A client interface used to interact with a database. The view limits what clients can . See and what functions they can perform.
|
Vigenere cipher |
A polyalphabetic substitution cipher.
|
Violation Analysis |
A form of auditing that uses clipping levels.
|
Virtual circuit |
A network service that provides connectionoriented service, regardless of the underlying network structure.
|
Virtual Machine |
A software simulation of a computer within which a process executes. Each virtual machine has its own memory address space, and communication between virtual machines is securely controlled.
|
Virtualization |
A technology used to host one or more operating systems within the memory of a single host computer. This mechanism allows virtually any OS to operate on any hardware. It also allows multiple operating systems to work simultaneously on the same hardware.
|
Virus Decryption Routine |
In an encrypted virus, a short segment of code that contains the cryptographic information necessary to load and decrypt the main virus code stored elsewhere on the disk.
|
Virus signature files |
A file of virus patterns that are compared with existing files to determine if they are infected with a virus. The vendor of the antivirus software updates the signatures frequently and makes the available to customers via the Web.
|