click below
click below
Normal Size Small Size show me how
IT SECURITY
IT SECURITY TERMINOLOGY
Term | Definition |
---|---|
Cloud Storage | Information is saved to the web. |
Computer Network | Group of inter-conneted computers. |
Data Theft | An employee that copies proprietary data for personal gain or use by another company. |
Firewall | Blocks unauthorized access while permitting authorized communications. |
FTP Backup | Backup done by File Transfer Protocol over the internet. |
Hoaxes | Message warning the recipient of a non-existent computer virus threat. |
Identity Theft | Fraud that involves someone pretending to be someone else in order to steal money or get other benefits. |
IT Security | Field of computer science concerned with the control of risks related to computer use. |
Laptop | Portable computer. |
Local Backup | Backup where the storage medium is kept close at hand. |
Memory Stick | Portable storage device. |
Mirror Backup | Mirror of the source being backed up |
Network Drive | Storage device on a local access network (LAN) within a business or home. |
Offsite Backup | Backup storage media is kept at a different geographic location from the source. |
Online Identity | Social identity that an Internet user establishes in online communities and websites |
Phishing | Criminally fraudulent process of attempting to acquire sensitive information by masquerading as a trustworthy entity in an electronic communication. |
Portable Device | Movable device such as a laptop, netbook. PDA or memory stick. |
Privacy Policy | Legal document that discloses how a party retains, processes, discloses, and purges customer's data. |
Public Network | Network that is shared by the public at large. |
Remote Backup | A form of offsite backup with a difference being that you can access, restore or administer the backups while located at your source location or other location. |
Rogue Diallers | Pieces of software secretly placed on your computer and when you connect to the internet, these diallers quietly disconnect you and dial a premium-rate phone number instead. |
Spam | Abuse of electronic messaging systems to send unsolicited bulk messages indiscriminately. |
Spyware | Type of malware that is installed secretly on personal computers to collect information about users, their computer or browsing habits without their informed consent. |
Trojan Horse | Program containing hidden codes which when it is invoked performs harmful actions such as deleting a user’s files and destroying data. |
Virus | A written program intended to cause disruption and damage to computer systems. |
Wireless Network | Type of computer network that is wireless. |
Worm | Makes multiple copies of itself and send these copies from the computer. |
Adware | Software package which automatically plays, displays, or downloads advertisements to a computer after the software is installed on it or while the application is being used |
Encryption | Process of transforming information using an algorithm to make it unreadable to anyone except those possessing special knowledge or a key. |
Bluetooth Connecivity | Devices communicate with each other using a variety of wires, cables, radio signals and infrared light beams, and an even greater variety of connectors, plugs and protocols. |
Passowrd | A word or string of characters used for user authentication to prove identity or access approval to gain access to a resource |
Data Corruption | Errors in computer data that occur during transmission or retrieval, introducing unintended changes to the original data |