Glossary
Term Description
Unshielded twisted pair (UTP)
A generic term for “telephone” wire used to carry data such as 10BaseT and 100BaseT. Various categories (qualities) of cable exist that are certified for different kinds of networking technologies. A twisted-pair wire that does not include additional EMI protection. Most twisted-pair wiring is UTP.
URL (uniform resource locator)
An address for a specific Web page or document within a Web site.
USA Patriot Act of 2001
An act implemented after the September 11, 2001, terrorist attacks. It greatly broadened the powers of law enforcement organizations and intelligence agencies across a number of areas, including the monitoring of electronic communications.
User acceptance testing (UAT)
Determines if the system satisfies the business requirements and enables the knowledge workers to perform their jobs correctly.
User identification
A character string that validates authorized user access.
User Mode
The basic mode used by the CPU when executing user applications.
Validation, Verification, and Testing
Used as an entity to define a procedure of review, analysis, and testing throughout the software life cycle to discover errors; the process of validation, verification, and testing determines that functions operate as specified and ensures the production of quality software.
Vector
Also known as “attack vector” routes or methods used to get into computer systems, usually for nefarious purposes. They take advantage of known weak spots to gain entry. Many attack vectors take advantage of the human element in the system because that is often the weakest link.
Vector image
A digital image that is created through a sequence of commands or mathematical statements that places lines and shapes in a given two or threedimensional space.
Verify a signature
Perform a cryptographic calculation using a message, a signature for the message, and a public key, to determine whether the signature was generated by someone knowing the corresponding private key.