The automated process of proactively identifying security vulnerabilities of computing systems in a network in order to determine if and where a system can be exploited and/or threatened. While public servers are important for communication and data transfer over the Internet, they open the door to potential security breaches by threat agents, such as malicious hackers.
Vulnerability scanning employs software that seeks out security flaws based on a database of known flaws, testing systems for the occurrence of these flaws and generating a report of the findings that an individual or an enterprise can use to tighten the network’s security.
Vulnerability scanning typically refers to the scanning of systems that are connected to the Internet but can also refer to system audits on internal networks that are not connected to the Internet in order to assess the threat of rogue software or malicious employees in an enterprise.
Acronym for World Wide Web.
Short for World Wide Web Consortium, an international consortium of companies involved with the Internet and the Web. The W3C was founded in 1994 by Tim Berners-Lee, the original architect of the World Wide Web. The organization’s purpose is to develop open standards so that the Web evolves in a single direction rather than being […]
Pronounced way. Short for the Web Accessibility Initiative, an initiative of the World Wide Web Consortium launched in 1997 to ensure that as the Internet grows in usage Web sites are designed to accommodate people with disabilities. Web design can present barriers to people with disabilities, especially people with sensory or neurological disabilities. The WAI […]
Short for Wide Area Information Server, and pronounced ways, a program for finding documents on the Internet. WAIS is rather primitive in its search capabilities.
Acronym for Web Application Meets Brick And Mortar. The acronym WAMBAM is used to describe the online endeavors of traditional brick-and-mortar stores.