Appendix B: Glossary

D  E  F  G  H  I  K  L  M  N  P  R  S  T  U  V  W  


Digital certificateThe electronic equivalent of an ID card that authenticates the originator of a digital signature.
Direct data feedA process used by information aggregators to gather information directly from a website operator rather than copying it from a displayed webpage.


E-BankingThe remote delivery of new and traditional banking products and services through electronic delivery channels.
E-mail serverA computer that manages e-mail traffic.
EncryptionA data security technique used to protect information from unauthorized inspection or alteration. Information is encoded so that data appears as a meaningless string of letters and symbols during delivery or transmission. Upon receipt, the information is decoded using an encryption key.


FirewallA hardware or software link in a network that relays only data packets clearly intended and authorized to reach the other side.
FramingA frame is an area of a webpage that scrolls independently of the rest of the webpage. Framing generally refers to the use of a standard frame containing information (like company name and navigation bars) that remains on the screen while the user moves around the text in another frame.


Gateway serverA computer (server) that connects a private network to the private network of a servicer or other business.


HackerAn individual who attempts to break into a computer without authorization.
HardeningThe process of securing a computer's administrative functions or inactivating those features not needed for the computer's intended business purpose.
Hash TotalsA numerical summation of one or more corresponding fields of a file that would not ordinarily be summed. Typically used to detect when changes in electronic information have occurred.
HostingSee "Website Hosting".
HyperlinkAn item on a webpage that, when selected, transfers the user directly to another location in a hypertext document or to another webpage, perhaps on a different machine. Also simply called a "link."
Hypertext Markup Language (HTML)A set of codes that can be inserted into text files to indicate special typefaces, inserted images, and links to other hypertext documents.


InterfaceComputer programs that translate information from one system or application into a format required for use by another system or application.
InternetThe global system of interconnected computer networks that use the Internet protocol suite (TCP/IP) to link billions of devices worldwide.
Internet service provider (ISP)A company that provides its customers with access to the Internet (e.g., AT&T, Verizon, CenturyLink).
Interoperability standards/protocolsCommonly agreed on standards that enable different computers or programs to share information. Example: HTTP (Hypertext Transfer Protocol) is a standard method of publishing information as hypertext in HTML format on the Internet.


KioskA publicly accessible computer terminal that permits customers to directly communicate with the financial institution via a network.


Legacy systemsA term commonly used to refer to existing computers systems and applications with which new systems or applications must exchange information.
LockoutThe action of temporarily revoking network or application access privileges, normally due to repeated unsuccessful logon attempts.


MnemonicA symbol or expression that can help someone remember something. For example, the phrase "Hello! My name is Bill. I'm 9 years old." might help an individual remember a secure 10-character password of "H!MniBI9yo."


Network administratorThe individual responsible for the installation, management, and control of a network.
Network diagramA description of any kind of locality in terms of its physical layout. In the context of communication networks, a topology describes pictorially the configuration or arrangement of a network, including its nodes and connecting communication lines.


PasswordsA secret sequence of characters that is used as a means of authentication.
PatchingSoftware code that replaces or updates other code. Frequently patches are used to correct security flaws.
Penetration testThe process of using approved, qualified personnel to conduct real-world attacks against a system to identify and correct security weaknesses before they are discovered and exploited by others.
Personal digital assistant (PDA)A pocket-sized, special-purpose personal computer that lacks a conventional keyboard.
PhishingA digital form of social engineering that uses authentic-looking—but bogus—e-mail to request information from users or direct them to fake websites that request information.
Pop-up boxA dialog box that automatically appears when a person accesses a webpage.
Private key infrastructure (PKI)The use of public key cryptography in which each customer has a key pair (e.g., a unique electronic value called a public key and a mathematically-related private key). The private key is used to encrypt (sign) a message that can only be decrypted by the cor-responding public key or to decrypt a message previously encrypted with the public key. The public key is used to decrypt a message previously encrypted (signed) using an individual's private key or to encrypt a message so that it can only be decrypted (read) using the intended recipient's private key.
Proxy serverAn Internet server that controls client computers' access to the Internet. Using a proxy server, a company can stop employees from accessing undesirable websites, improve performance by storing webpages locally, and hide the internal network's identity so monitoring is difficult for external users.
Public keySee "PKI".


RepudiationThe denial by one of the parties to a transaction of participation in all or part of that transaction or of the content of the communication.
RouterA hardware device that connects two or more networks and routes incoming data packets to the appropriate network.


ScriptA file containing active content; for example, commands or instructions to be executed by the computer.
Secure Socket Layer (SSL)A protocol that is used to transmit private documents through the Internet.
ServerA computer or other device that manages a network service. An example is a print server, which is a device that manages network printing.
Smart cardsA card with an embedded computer chip on which information can be stored and processed.
Sreen scrapingA process used by information aggregators to gather information from a customer's website, whereby the aggregator accesses the target site by logging in as the customer, electronically reads and copies selected information from the displayed webpage(s), then redisplays the information on the aggregator's site. The process is analogous to "scraping" the information off the computer screen.
Suspicious activity report (SAR)Reports required to be filed by the Bank Secrecy Act when a financial institution identifies or suspects fraudulent activity.


TokenA small device with an embedded computer chip that can be used to store and transmit electronic information. A soft token is a software-based token.
TopologySee "Network diagram".


Uniform Resource Locator (URL)Abbreviation for "Uniform (or Universal) Resource Locator." A way of specifying the location of publicly available information on the Internet, in the form: protocol://machine:port number/filename. Often the port number and/or filename are unnecessary.


Virtual MallAn Internet website offering products and services from multiple vendors or suppliers.
Virtual private network (VPN)A computer network that uses public telecommunication infrastructure, such as the Internet, to provide remote offices or individual users with secure access to their organization's network.
VirusMalicious code that replicates itself within a computer.


WeblinkingThe use of hyperlinks to direct users to webpages of other entities.
WebsiteA webpage or set of webpages designed, presented, and linked together to form a logical information resource and/or transaction initiation function.
Website hostingThe service of providing ongoing support and monitoring of an Internet-addressable computer that stores webpages and processes transactions initiated over the Internet.
Wireless application protocol (WAP)A data transmission standard to deliver wireless markup language (WML) content.
Wireless gateway serverA computer (server) that transmits messages between a computer network and a cellular telephone or other wireless access device.
Wireless phoneSee "Cellular Telephone".
WormA self-replicating malware computer program. It uses a computer network to send copies of itself to other nodes (computers on the network) and it may do so without any user intervention. This is primarily because of security vulnerabilities on the target computers.


Previous Section
Appendix A: Examination Procedures
Next Section
Appendix C: Laws, Regulations, and Guidance