8129.0 - Business Use of Information Technology, 2002-03  
ARCHIVED ISSUE Released at 11:30 AM (CANBERRA TIME) 17/03/2004   
   Page tools: Print Print Page Print all pages in this productPrint All

Authentication software or hardware

A system which verifies the identity of a user (e.g. by password or user id), user device, or other entity, to allow access to those eligible.

Back end systems

Accounting, stock control and ordering computer systems used to manage non-Internet based aspects of a business.

Denial of service

Any action which deliberately restricts access to an information system such that it becomes unavailable for its intended purpose.

Digital Subscriber Line (DSL)

More properly referred to as xDSL as this covers several digital technologies (e.g. Asymmetric DSL or ADSL and Symmetric DSL or SDSL) for fast two-way data connections over the public switched telephone network.

Firewall

A system or combination of systems that enforces a boundary between two or more networks, limiting and monitoring access.

Integrated Services Digital Network (ISDN)

A digital access technique for both voice and data. Digital alternative to an analog public switched telephone service and carries data or voltages consisting of discrete steps or levels, as opposed to continuously variable analog data. ISDN enables digital transmission over the public switched telephone network.

Internet

A world-wide public computer network. Organisations and individuals can connect their computers to this network and exchange information across a country and/or across the world. The Internet provides access to a number of communication services including the World Wide Web and carries email, news, entertainment and data files.

Intrusion detection system

Any system which attempts to detect intrusion into a computer or network by observation of actions, security logs or audit data.

Network sniffer software

A program used to monitor network traffic.

Online payments

Payments made via the Internet or a web site for goods and services. These payments generally require customers to provide their credit/debit card details online. Includes real time online payments.

Order

A commitment to purchase goods or services.

Secure access/transactions

A web site has a capability for secure access or transactions when it allows customers to submit orders for goods, requests for services and credit/debit card details over a secure link that cannot be accessed by unauthorised persons. Secure Sockets Layer (SSL) is a common protocol used in this type of web site as it enables encryption of data such as credit card details and customer information sent over the Internet.

Trojan

A computer program containing an apparent or actual useful function that contains additional (hidden) functions that allow unauthorised collection, falsification or destruction of data.

Virus

A self-replicating, malicious program that attaches itself to an application or other executable system component.

Web presence

Web presence includes a web site, home page or presence on another entity's web site. A web site or home page is an electronic document that is accessed via a unique address on the World Wide Web. The document provides information in a textual, graphical or multimedia format.

Worm

An independent and malicious program that self-replicates across network boundaries, often clogging networks and information systems as it spreads.