COMPUTER SECURITY REVIEW
antivirus reviews & maintenance tips for home office and small business
Home Articles Computer Security Security Glossary

Security Glossary

It is a mad world out here and new security jargon springs out like mushrooms at a fast pace. How can you keep up with it? Here is a short list of the most used terms you might have heard and should be aware of.

A

ntivirus: An antivirus program or software that protects against computer viruses and malicious software.

A

ntiSpyware: Software to protect against spyware and harmful software.

B

ot: Software applications that perform automated tasks. Malicious bots can run on a computer and slow it down, send/receive spam, download viruses and more automatically without the user ever knowing about it.

B

otnet: A collection or network of bots or malicious software working and running together to perform malicious actions.

D

ata Theft: Using malicious software to steal personal information including files, online transaction information such as credit card info, addresses and more.

E

ncryption: Transforming information in plaintext so that is only readable by the receiver with the right key. In computers, information can be encrypted before being sent across the Internet to prevent the information from being intercepted and read.

F

irewall: Firewalls are software installed on computers and networks that inspect incoming network traffic and allow or deny access based on criteria and rules.

F

raud(Online): The use of someone's stolen information or identity for unauthorized purposes such as online purchases and identity theft and impersonation.

M

alware: Software that infiltrates and harms or manipulates a computer or system without the users informed consent.

M

alicious Software: Software that harms the computer or system, steals information, installs viruses or does other harm to the system or user.

P

hishing: The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The e-mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has. The Web site, however, is bogus and set up only to steal the user’s information.

R

ootkit: Malware that takes over administrative access of a system.

S

pam: Bulk email unsolicited by the receiver.

S

pyware: Software that is installed and runs on a computer that takes control or manipulates the users interaction. Spyware can steal personal information, data, communications, logins and passwords.

T

rojan: Software that appear to do normal or desirable functions but actually performs malicious functions.

V

irus: A computer virus is spread from one computer to another and cause spammig, spyware, malware and other harmful software to "infect" a computer and cause harm.Back