click below
click below
Normal Size Small Size show me how
IT SECURITY
IT SECURITY TERMINOLOGY
| Term | Definition |
|---|---|
| Cloud Storage | Information is saved to the web. |
| Computer Network | Group of inter-conneted computers. |
| Data Theft | An employee that copies proprietary data for personal gain or use by another company. |
| Firewall | Blocks unauthorized access while permitting authorized communications. |
| FTP Backup | Backup done by File Transfer Protocol over the internet. |
| Hoaxes | Message warning the recipient of a non-existent computer virus threat. |
| Identity Theft | Fraud that involves someone pretending to be someone else in order to steal money or get other benefits. |
| IT Security | Field of computer science concerned with the control of risks related to computer use. |
| Laptop | Portable computer. |
| Local Backup | Backup where the storage medium is kept close at hand. |
| Memory Stick | Portable storage device. |
| Mirror Backup | Mirror of the source being backed up |
| Network Drive | Storage device on a local access network (LAN) within a business or home. |
| Offsite Backup | Backup storage media is kept at a different geographic location from the source. |
| Online Identity | Social identity that an Internet user establishes in online communities and websites |
| Phishing | Criminally fraudulent process of attempting to acquire sensitive information by masquerading as a trustworthy entity in an electronic communication. |
| Portable Device | Movable device such as a laptop, netbook. PDA or memory stick. |
| Privacy Policy | Legal document that discloses how a party retains, processes, discloses, and purges customer's data. |
| Public Network | Network that is shared by the public at large. |
| Remote Backup | A form of offsite backup with a difference being that you can access, restore or administer the backups while located at your source location or other location. |
| Rogue Diallers | Pieces of software secretly placed on your computer and when you connect to the internet, these diallers quietly disconnect you and dial a premium-rate phone number instead. |
| Spam | Abuse of electronic messaging systems to send unsolicited bulk messages indiscriminately. |
| Spyware | Type of malware that is installed secretly on personal computers to collect information about users, their computer or browsing habits without their informed consent. |
| Trojan Horse | Program containing hidden codes which when it is invoked performs harmful actions such as deleting a user’s files and destroying data. |
| Virus | A written program intended to cause disruption and damage to computer systems. |
| Wireless Network | Type of computer network that is wireless. |
| Worm | Makes multiple copies of itself and send these copies from the computer. |
| Adware | Software package which automatically plays, displays, or downloads advertisements to a computer after the software is installed on it or while the application is being used |
| Encryption | Process of transforming information using an algorithm to make it unreadable to anyone except those possessing special knowledge or a key. |
| Bluetooth Connecivity | Devices communicate with each other using a variety of wires, cables, radio signals and infrared light beams, and an even greater variety of connectors, plugs and protocols. |
| Passowrd | A word or string of characters used for user authentication to prove identity or access approval to gain access to a resource |
| Data Corruption | Errors in computer data that occur during transmission or retrieval, introducing unintended changes to the original data |