The Triple-A-System is mainly applied by network operators and in the internet. It serves as intelligent access control to web-based networks. The triple A stands for “Authentification” , “Authorisation” and “Accounting”.


The ABC-analysis categorises the products used in a project in three groups – A, B and C. A-rated products are vital for the execution of a project, B-rated products are of medium significance and C-rated products have but a small weight. This analysis can be a...


The word “accelerator” is mainly used by startups. After running through a successful application process, the founders receive intensive trainings confined to few months in order to endow the young company with both the know-how and the resources that are...


In computing, access relates to the use of information and data. With access authorisations, it is determined which persons are authorised to use the stored data, information or applications.

Access Control List (ACL)

Access Control Lists (ACL) are documents for the control of access rights. They define which user (group) is permitted to access certain files or to withdraw such rights.

Active Directory

The Active Directory (AD) is a centralised directory service by Microsoft. It stores and manages all user data such as email-address and name. Next to the computers belonging to the network, AD manages other network devices such as printers, too.


ActiveX is only available for Windows and is used for the management of individual components. Via Active X, third-party objects may be embedded. As ActiveX is of questionable security, a use should be considered carefully.


The add-on widens the range of functions of existing hardware and software respectively adds new functions. Add-ons are divided into three groups: the extented function of a browser, changes of the displayed browser layout or the reproduction of other content through...

Additional Security Analysis

According to the standards laid down in the IT-base-security, an additional security analysis is necessary if certain target objects of the respective information network have an increased protection need, but which cannot be modelled in a suitable way or applied in...


In Windows, an administrator takes care of the management and maintenance of the computer. Prior to exercising the administration rights, he had to be registered in the system.