Chapter 7 key terms
applicaton control policies (AppLocker)
a feature in W7 that enables admins to create app restrictions rules. it is essentially an updated version of the concepts implemented in the software restriction policies.
A trusted issuer of digital certificates
a software component that sits between an app and the opperation system. this fix translates the function calls that the app makes to the operating system so that the app recieves the same response it would get from an earlierr OS version.
a collection of compatability fixes
a feature included in Internet Explorer 8 that enables the browser to diplay older web pagers properly
a new feature of Internet explorer 8 that allows you ti surf the interent w/o leaving any records of your activity
a tehnique that takes social engineering to a mass scale. this technique uses convincing looking web sitesthat urge users to supply personal information, such as passwords and account numbers
Program Compatibility Troubleshooter
a wizard-based solution that users or admins can use to automatically configure an executable file to use
a operational state designed to prevent attackers who do penetrate the computer's defenses from accessing vital system compontents
Public Key Infrastructure
ISO authentication framework, provide: Integrity, Confidentially, Access Control, Authentication, and Nonrepudation
An acronym for Really Simple Syndication or Rich Site Summary, is an XML based protocol that allows for the automatic distribution of Internet content from news related sites via RSS aggregators or readers.
Secure Socket layers (SSL)
a protocol (set of rules) used for transmitting sensitive data (such as credit card information) over the internet
These divide the network into areas of similar levels of security (trusted, semi-trusted, and untrusted). You create these by putting all your publicly accessed servers in one zone and restricted-access servers in another, then separating both from an external network like the Internet using firewalls.
now know as a compatability fix
a filter that examines traffic for evidince of phishing activity and displays a warning to the user if it findes any.
gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of others
Software restrition policies
group policy settings that enable admins to specify the programs that are allowed to run on workstations by creating rules of various types
Windows XP mode
Allows an organization that chooses to upgrade to Windows 7 to still have the ability to run older Windows XP applications on the Windows 7 operating system.
Application Compatibility Toolkit
Allows an administrator to help solve problems with applications that will not properly work on Windows 7.