Glossary
Term Description
Vernam cipher
A device that implements a 26-character modulo 26 substitution cipher. It functions as a one-time pad.
Vertical market software
Application software that is unique to a particular industry.
View
A client interface used to interact with a database. The view limits what clients can . See and what functions they can perform.
Vigenere cipher
A polyalphabetic substitution cipher.
Violation Analysis
A form of auditing that uses clipping levels.
Virtual circuit
A network service that provides connectionoriented service, regardless of the underlying network structure.
Virtual Machine
A software simulation of a computer within which a process executes. Each virtual machine has its own memory address space, and communication between virtual machines is securely controlled.
Virtualization
A technology used to host one or more operating systems within the memory of a single host computer. This mechanism allows virtually any OS to operate on any hardware. It also allows multiple operating systems to work simultaneously on the same hardware.
Virus Decryption Routine
In an encrypted virus, a short segment of code that contains the cryptographic information necessary to load and decrypt the main virus code stored elsewhere on the disk.
Virus signature files
A file of virus patterns that are compared with existing files to determine if they are infected with a virus. The vendor of the antivirus software updates the signatures frequently and makes the available to customers via the Web.