Left Policies
Center-Left Policies
Policies
Center-Right Policies
Right Policies
100
Policy that sets out what users are and are not allowed to do with IT systems.
acceptable use policy
100
Encryption system in which a single key is used for both encryption and decryption.
secret key encryption
100
System that automatically assigns IP addresses to computers on a network.
Dynamic Host Control Protocol
100
Use of the Internet to perform tasks such as bill payment, money transfers and other banking tasks.
online banking
100
Music industry group that works to reduce illegal copying of music.
Recording Industry Association of America
200
System for transferring files over the Internet, often used for uploading web sites.
File Transfer Protocol
200
Encryption system in which two keys are used: a public key used only to encrypt data, and a private key used only to decrypt it.
public key encryption
200
System for transferring files over the Internet, often used for uploading web sites.
File Transfer Protocol
200
Settings in social networks and other systems to control how a user's data is shared with others.
profile privacy settings
200
Games played by connecting to a central server and interacting with other players in a virtual world.
Massively Multiplayer Online Game
300
Protocol used to send web pages securely over the Internet.
https
300
Locks, alarms, and other techniques used to securely a building or computer room.
physical security
300
Policy governing what data a company or web site will collect about you and how it will be used.
privacy policy
300
Database system for storing and managing information about a school, its students, and staff.
school information system
300
A type of electronic voting machine that allows the user to vote by selecting the candidates name using a touchscreen.
DRE voting machine
400
Organisation that issues digital certificates to individuals and companies.
Certificate Authority
400
Computer that checks usernames and passwords when a user tries to log in.
authentication server
400
Database containing multiple related tables and no redundant data.
relational database
400
A European law which requires electronic equipment manufacturers to accept back their equipment for recycling at its end of life.
WEEE
400
Policies governing the appropriate use of IT, data integrity, security procedures, and other aspects of IT use with an organisation.
organisational IT policies
500
Gaining illegal access to a computer system
unauthorised access
500
Computer that stores application software for clients on a network.
application server
500
Use of a computer model to test the results of different situations and scenarios.
What-if scenario
500
Process of transferring data between systems in a standard format that both can understand.
Electronic Data Interchange
500
Allows a secure private connection over a public network, using an encrypted 'tunnel'. For example, a remote computer can securely connect to a LAN, as though it were physically connected.
Virtual Private Network