SlideShare una empresa de Scribd logo
1 de 4
A
Active Content

Small program that gets installed on a computer while browsing the Internet. The basic function of active
content is to provide an interactive Internet experience through videos and toolbars. Sometimes, active content
is used to gain unauthorized access to a computer, and then damage the data stored on it or install malicious
software on it.




B
Back Up

To make a duplicate copy of a program, a disk, or data. The duplicate copy is called a backup.




C
Cache Memory

Temporary memory on your computer that is sometimes used to store local copies of files opened when you
browse the Internet.

Computer Privacy

Keeping a user’s data, including personal files and e-mail messages, such that the data is not accessible by
anyone without appropriate permission.

Computer Security

The protection of a computer system and its data from accidental or intentional loss and tampering.

Cookie

A small file on a computer that is created when a user visits a Web site. A Web site uses cookies to identify
users who visit the site, and also track the preferences of the users.

Copyright

A method of protecting the rights of an originator of a creative work, such as text, piece of music, painting, or
computer program, through law.




D
Decryption

The process of reconverting the encrypted data into a readable and usable form.
E
Encryption

The process of converting data into an unreadable and unusable form. Encryption is done to prevent
unauthorized access of data, especially during data transmission over the Internet.




F
Firewall

A filter that blocks unreliable information from the Internet before it reaches your computer or a private network.
It provides additional protection against threats such as hackers and viruses. A firewall also helps to ensure
computer privacy by restricting external access by any unauthorized user.




H
Hacker

A person who uses computer expertise to gain unauthorized access to a computer, and then misuses or
tampers the programs and data stored on the computer.




I
Intellectual Property

Any information available on the Internet is an intellectual property, which is legally owned by the person who
created it. The owner of an intellectual property has the exclusive rights to control the use of this information.

Internet Service Provider (ISP)

A company that provides Internet connectivity to individuals, businesses, and organizations.




L
Libel

Written defamation that has been published. Libel is a punishable offense.




O
Online Predator

An individual who develops contact with Internet users, through chat rooms, online forums, or e-mail, to exploit
them financially or involve them in dangerous relationships.




P
Password

A unique string of characters that a user types in as an identification code. It is a security measure used to
restrict access to computer systems and sensitive files.

Phishing

The act of extracting personal information, such as passwords and credit card details, from computer users and
then use the information for malicious purposes.

Plagiarism

The act of copying someone’s work and using it as if it is your own work, without mentioning the source.

Power surge

A sudden increase in line voltage, which may lead to the damage of electronic devices, such as computers.




S
Secure Sockets Layer (SSL)

An Internet security protocol that ensures secure data communication by encrypting the information
transmitted. The SSL protocol certifies that a Web site is genuine and ensures that the data provided to the site
is not misused.

Slander

Verbal defamation. Slander is a punishable offense.

Software Piracy

Unauthorized copying of copyrighted software without obtaining the license or permission of its copyright owner
is software piracy.

Spam

An irrelevant and unsolicited e-mail message sent by an unknown sender. A spam is sent to distribute a
message to many recipients at one time.

Spyware
A computer program that is installed on your computer without your knowledge. Spyware can secretly send out
information about your Web browsing habits or other personal details to another computer through the network.




T
Trojan Horse

A destructive computer program disguised as a game, utility, or software. When run, a Trojan horse does
something harmful to the computer system while appearing to do something useful.




U
Username

The name by which a user is identified to a computer system or network. To access a computer protected by
username and password, a user needs to enter the correct combination of username and password.




V
Virus

A computer program that is designed to cause malfunctioning of a computer or damage the data stored on the
computer.




W
Worm

A computer program that propagates itself across computers, usually by creating copies of itself in each
computer's memory. A worm might duplicate itself in one computer so often that it causes the computer to
crash.

Más contenido relacionado

La actualidad más candente

cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic toolsSonu Sunaliya
 
System Security in Ethical Hacking
System Security in Ethical HackingSystem Security in Ethical Hacking
System Security in Ethical HackingVanipriya Sakthivel
 
Ethical_Hacking_ppt
Ethical_Hacking_pptEthical_Hacking_ppt
Ethical_Hacking_pptNarayanan
 
Chapter11
Chapter11Chapter11
Chapter11Izaham
 
COMPUTER SECURITY
COMPUTER SECURITYCOMPUTER SECURITY
COMPUTER SECURITYKak Yong
 
Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Umesh Mahawar
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
What is Hacking? AND Types of Hackers
What is Hacking? AND Types of HackersWhat is Hacking? AND Types of Hackers
What is Hacking? AND Types of Hackersinfosavvy
 
Introduction Ethical hacking by eslam hussein
Introduction Ethical hacking by eslam husseinIntroduction Ethical hacking by eslam hussein
Introduction Ethical hacking by eslam husseinEslam Hussein
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2NetLockSmith
 

La actualidad más candente (20)

Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Infosec
InfosecInfosec
Infosec
 
cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic tools
 
System Security in Ethical Hacking
System Security in Ethical HackingSystem Security in Ethical Hacking
System Security in Ethical Hacking
 
Ethical_Hacking_ppt
Ethical_Hacking_pptEthical_Hacking_ppt
Ethical_Hacking_ppt
 
Computer security
Computer securityComputer security
Computer security
 
Chapter11
Chapter11Chapter11
Chapter11
 
COMPUTER SECURITY
COMPUTER SECURITYCOMPUTER SECURITY
COMPUTER SECURITY
 
Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Security Threats
Security ThreatsSecurity Threats
Security Threats
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
What is Hacking? AND Types of Hackers
What is Hacking? AND Types of HackersWhat is Hacking? AND Types of Hackers
What is Hacking? AND Types of Hackers
 
Hacking presentation
Hacking presentationHacking presentation
Hacking presentation
 
Hacking
HackingHacking
Hacking
 
Introduction Ethical hacking by eslam hussein
Introduction Ethical hacking by eslam husseinIntroduction Ethical hacking by eslam hussein
Introduction Ethical hacking by eslam hussein
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
 
Slideshare is
Slideshare isSlideshare is
Slideshare is
 
Web security
Web securityWeb security
Web security
 

Destacado

Sektör Haberleri 07-13 Ocak Haftası
Sektör Haberleri 07-13 Ocak HaftasıSektör Haberleri 07-13 Ocak Haftası
Sektör Haberleri 07-13 Ocak HaftasıVizeum Turkiye
 
4 a module virus and spyware
4 a module virus and spyware4 a module virus and spyware
4 a module virus and spywareRozell Sneede
 
Brightspace and Math Formulae: Making Friends - 2014 Brightspace Ignite Wisco...
Brightspace and Math Formulae: Making Friends - 2014 Brightspace Ignite Wisco...Brightspace and Math Formulae: Making Friends - 2014 Brightspace Ignite Wisco...
Brightspace and Math Formulae: Making Friends - 2014 Brightspace Ignite Wisco...D2L Barry
 
Microsoft Office for iPad Product Guide - Atidan
Microsoft Office for iPad Product Guide - AtidanMicrosoft Office for iPad Product Guide - Atidan
Microsoft Office for iPad Product Guide - AtidanDavid J Rosenthal
 
John Aguirre, President
John Aguirre, PresidentJohn Aguirre, President
John Aguirre, PresidentAudrey Anne
 

Destacado (6)

Sektör Haberleri 07-13 Ocak Haftası
Sektör Haberleri 07-13 Ocak HaftasıSektör Haberleri 07-13 Ocak Haftası
Sektör Haberleri 07-13 Ocak Haftası
 
4 a module virus and spyware
4 a module virus and spyware4 a module virus and spyware
4 a module virus and spyware
 
Brightspace and Math Formulae: Making Friends - 2014 Brightspace Ignite Wisco...
Brightspace and Math Formulae: Making Friends - 2014 Brightspace Ignite Wisco...Brightspace and Math Formulae: Making Friends - 2014 Brightspace Ignite Wisco...
Brightspace and Math Formulae: Making Friends - 2014 Brightspace Ignite Wisco...
 
Microsoft Office for iPad Product Guide - Atidan
Microsoft Office for iPad Product Guide - AtidanMicrosoft Office for iPad Product Guide - Atidan
Microsoft Office for iPad Product Guide - Atidan
 
John Aguirre, President
John Aguirre, PresidentJohn Aguirre, President
John Aguirre, President
 
Terms & definitions
Terms & definitionsTerms & definitions
Terms & definitions
 

Similar a Security terms & definitions

Internet security
Internet securityInternet security
Internet securityat1211
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacyArdit Meti
 
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxBCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxKirti Verma
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011lbcollins18
 
Computer security
Computer securityComputer security
Computer securityfiza1975
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks ShellyAdeel Khurram
 
mobile security.pptx
mobile security.pptxmobile security.pptx
mobile security.pptxTapan Khilar
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodcharvill
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”tunzida045
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”tunzida045
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.pptAsif Raza
 
How to Keep Yourself secure while browsing internet pre null meet kolkata
How to Keep Yourself secure while browsing internet pre null meet kolkataHow to Keep Yourself secure while browsing internet pre null meet kolkata
How to Keep Yourself secure while browsing internet pre null meet kolkataamiyadutta
 

Similar a Security terms & definitions (20)

Internet security
Internet securityInternet security
Internet security
 
Chapter 10.0
Chapter 10.0Chapter 10.0
Chapter 10.0
 
Computer security and
Computer security andComputer security and
Computer security and
 
Computer security
Computer securityComputer security
Computer security
 
Cyber Crime Types & Tips
Cyber Crime Types & TipsCyber Crime Types & Tips
Cyber Crime Types & Tips
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacy
 
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxBCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011
 
Computer security
Computer securityComputer security
Computer security
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
 
mobile security.pptx
mobile security.pptxmobile security.pptx
mobile security.pptx
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd period
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.ppt
 
How to Keep Yourself secure while browsing internet pre null meet kolkata
How to Keep Yourself secure while browsing internet pre null meet kolkataHow to Keep Yourself secure while browsing internet pre null meet kolkata
How to Keep Yourself secure while browsing internet pre null meet kolkata
 
Presentation1
Presentation1Presentation1
Presentation1
 

Más de Rozell Sneede

Excel & database terms & definitions
Excel & database terms & definitionsExcel & database terms & definitions
Excel & database terms & definitionsRozell Sneede
 
Digital literacy terms & definitions
Digital literacy terms & definitionsDigital literacy terms & definitions
Digital literacy terms & definitionsRozell Sneede
 
Basic terms & definitions
Basic terms & definitionsBasic terms & definitions
Basic terms & definitionsRozell Sneede
 
Removing virus tri fold - white
Removing virus tri fold - whiteRemoving virus tri fold - white
Removing virus tri fold - whiteRozell Sneede
 
Cyc flyer chn with ob logo
Cyc flyer   chn with ob logoCyc flyer   chn with ob logo
Cyc flyer chn with ob logoRozell Sneede
 
Cyc module learning express library
Cyc module learning express libraryCyc module learning express library
Cyc module learning express libraryRozell Sneede
 
Wordpress module 1 a
Wordpress module 1 aWordpress module 1 a
Wordpress module 1 aRozell Sneede
 
6 word press module 1f
6   word press module 1f6   word press module 1f
6 word press module 1fRozell Sneede
 
5 word press module 1e
5   word press module 1e5   word press module 1e
5 word press module 1eRozell Sneede
 
4 word press module 1d
4   word press module 1d4   word press module 1d
4 word press module 1dRozell Sneede
 
3 word press module 1c
3   word press module 1c3   word press module 1c
3 word press module 1cRozell Sneede
 
2 word press module 1b
2   word press module 1b2   word press module 1b
2 word press module 1bRozell Sneede
 
1 wordpress module 1 a
1   wordpress module 1 a1   wordpress module 1 a
1 wordpress module 1 aRozell Sneede
 
1 wordpress module 1 a
1   wordpress module 1 a1   wordpress module 1 a
1 wordpress module 1 aRozell Sneede
 

Más de Rozell Sneede (20)

Excel & database terms & definitions
Excel & database terms & definitionsExcel & database terms & definitions
Excel & database terms & definitions
 
Digital literacy terms & definitions
Digital literacy terms & definitionsDigital literacy terms & definitions
Digital literacy terms & definitions
 
Basic terms & definitions
Basic terms & definitionsBasic terms & definitions
Basic terms & definitions
 
5 steps
5 steps5 steps
5 steps
 
Removing virus tri fold - white
Removing virus tri fold - whiteRemoving virus tri fold - white
Removing virus tri fold - white
 
Cyc flyer chn with ob logo
Cyc flyer   chn with ob logoCyc flyer   chn with ob logo
Cyc flyer chn with ob logo
 
Cyc module learning express library
Cyc module learning express libraryCyc module learning express library
Cyc module learning express library
 
Cyc module inf ohio
Cyc module inf ohioCyc module inf ohio
Cyc module inf ohio
 
Wordpress module 1 a
Wordpress module 1 aWordpress module 1 a
Wordpress module 1 a
 
9 word press 2c
9   word press 2c9   word press 2c
9 word press 2c
 
8 word press 2b
8   word press 2b8   word press 2b
8 word press 2b
 
7 word press 2a
7   word press 2a7   word press 2a
7 word press 2a
 
6 word press module 1f
6   word press module 1f6   word press module 1f
6 word press module 1f
 
5 word press module 1e
5   word press module 1e5   word press module 1e
5 word press module 1e
 
4 word press module 1d
4   word press module 1d4   word press module 1d
4 word press module 1d
 
3 word press module 1c
3   word press module 1c3   word press module 1c
3 word press module 1c
 
2 word press module 1b
2   word press module 1b2   word press module 1b
2 word press module 1b
 
1 wordpress module 1 a
1   wordpress module 1 a1   wordpress module 1 a
1 wordpress module 1 a
 
1 wordpress module 1 a
1   wordpress module 1 a1   wordpress module 1 a
1 wordpress module 1 a
 
On line banking cur
On line banking curOn line banking cur
On line banking cur
 

Último

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 

Último (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 

Security terms & definitions

  • 1. A Active Content Small program that gets installed on a computer while browsing the Internet. The basic function of active content is to provide an interactive Internet experience through videos and toolbars. Sometimes, active content is used to gain unauthorized access to a computer, and then damage the data stored on it or install malicious software on it. B Back Up To make a duplicate copy of a program, a disk, or data. The duplicate copy is called a backup. C Cache Memory Temporary memory on your computer that is sometimes used to store local copies of files opened when you browse the Internet. Computer Privacy Keeping a user’s data, including personal files and e-mail messages, such that the data is not accessible by anyone without appropriate permission. Computer Security The protection of a computer system and its data from accidental or intentional loss and tampering. Cookie A small file on a computer that is created when a user visits a Web site. A Web site uses cookies to identify users who visit the site, and also track the preferences of the users. Copyright A method of protecting the rights of an originator of a creative work, such as text, piece of music, painting, or computer program, through law. D Decryption The process of reconverting the encrypted data into a readable and usable form.
  • 2. E Encryption The process of converting data into an unreadable and unusable form. Encryption is done to prevent unauthorized access of data, especially during data transmission over the Internet. F Firewall A filter that blocks unreliable information from the Internet before it reaches your computer or a private network. It provides additional protection against threats such as hackers and viruses. A firewall also helps to ensure computer privacy by restricting external access by any unauthorized user. H Hacker A person who uses computer expertise to gain unauthorized access to a computer, and then misuses or tampers the programs and data stored on the computer. I Intellectual Property Any information available on the Internet is an intellectual property, which is legally owned by the person who created it. The owner of an intellectual property has the exclusive rights to control the use of this information. Internet Service Provider (ISP) A company that provides Internet connectivity to individuals, businesses, and organizations. L Libel Written defamation that has been published. Libel is a punishable offense. O
  • 3. Online Predator An individual who develops contact with Internet users, through chat rooms, online forums, or e-mail, to exploit them financially or involve them in dangerous relationships. P Password A unique string of characters that a user types in as an identification code. It is a security measure used to restrict access to computer systems and sensitive files. Phishing The act of extracting personal information, such as passwords and credit card details, from computer users and then use the information for malicious purposes. Plagiarism The act of copying someone’s work and using it as if it is your own work, without mentioning the source. Power surge A sudden increase in line voltage, which may lead to the damage of electronic devices, such as computers. S Secure Sockets Layer (SSL) An Internet security protocol that ensures secure data communication by encrypting the information transmitted. The SSL protocol certifies that a Web site is genuine and ensures that the data provided to the site is not misused. Slander Verbal defamation. Slander is a punishable offense. Software Piracy Unauthorized copying of copyrighted software without obtaining the license or permission of its copyright owner is software piracy. Spam An irrelevant and unsolicited e-mail message sent by an unknown sender. A spam is sent to distribute a message to many recipients at one time. Spyware
  • 4. A computer program that is installed on your computer without your knowledge. Spyware can secretly send out information about your Web browsing habits or other personal details to another computer through the network. T Trojan Horse A destructive computer program disguised as a game, utility, or software. When run, a Trojan horse does something harmful to the computer system while appearing to do something useful. U Username The name by which a user is identified to a computer system or network. To access a computer protected by username and password, a user needs to enter the correct combination of username and password. V Virus A computer program that is designed to cause malfunctioning of a computer or damage the data stored on the computer. W Worm A computer program that propagates itself across computers, usually by creating copies of itself in each computer's memory. A worm might duplicate itself in one computer so often that it causes the computer to crash.