Monday,
September 9, 2002
|
|
ITerminology |
|
DRM: Short for
digital rights management, a system for protecting the copyrights of
data circulated via the Internet by enabling secure distribution and/or
disabling illegal distribution of the data. Typically, a DRM system
protects intellectual property by either encrypting the data so that it
can only be accessed by authorised users or marking the content with a
digital watermark or similar method so that the content can not be
freely distributed.
Vulnerability
scanning: The automated process of proactively identifying
vulnerabilities of computing systems in a network in order to determine
if and where a system can be exploited and/or threatened. While public
servers are important for communication and data transfer over the
Internet, they open the door to potential security breaches by threat
agents, such as malicious hackers. Vulnerability scanning employs
software that seeks out security flaws based on a database of known
flaws, testing systems for the occurrence of these flaws and generating
a report of the findings that an individual or an enterprise can use to
tighten the network’s security.
Keyword stuffing:
A SEO technique used by Web designers to overload keywords onto a Web
page so that search engines will read the page as being relevant in a
Web search. Because search engines scan Web pages for the words that are
entered into the search criteria by the user, the
more times a keyword appears on the Web page the more relevancy the
search engine will assign to the page in the search results (this is
only one way that search engines determine relevancy, however.) Search
engines often penalize a site if the engine discovers keyword stuffing,
as this practice is considered poor netiquette, and some search engines
will even ban the offending Web pages from their search results.
|