Glossary for Computer Concepts: security
Learn Computer Concepts in FREE step-by-step lessons.
Access points: Access points (Lesson:
Data Security)
   
Access points are essentially routers with the capability of wirelessly connecting to Wi-Fi equipped devices. The access point sends and receives signals to and from computers on the wireless local area network or WLAN(pronounced W-lan).antivirus software: Antivirus software (Lesson:
Data Security)
   
Antivirus software, also known as virus protection software, uses several techniques to find malware on
a computer system; remove it if possible; and keep additional malware from infecting the system.Biometrics: Biometrics authentication method (Lesson:
Data Security)
   
Biometrics is the science and technology of authentication by scanning and measuring a person’s unique
physical features (“something about you”). Fingerprints, facial characteristics, retinal patterns, and voice
patterns are commonly used in biometrics.botnet: botnet, or botnet army (Lesson:
Data Security)
   
A botnet, or botnet army, refers to a collection of computers autonomously or automatically working
together toward some goal; these are often zombie computers that are synchronized to perform illegal
activities on the Internet.cyberwarfare: Cyberwarfare (Lesson:
Data Security)
   
Cyberwarfare extends traditional forms of warfare to the Internet and the web, including espionage,
psychological warfare, and attacks.Data backup: Data backup (Lesson:
Data Security)
   
Data backup is a process in which copies of important computer files are stored in a safe place to guard
against data loss.digital certificate: digital certificate (Lesson:
Data Security)
   
A digital certificate, also called an SSL certificate, is a type of electronic business card that is attached
to Internet transaction data to verify the sender of the data.Encryption: Encryption is a security technique (Lesson:
Data Security)
   
Encryption is a security technique that uses high-level mathematical functions and computer algorithms
to encode data so that it is unintelligible to all but the sender and recipient.file system permissions: Permissions, or file system permissions (Lesson:
Data Security)
   
Permissions, or file system permissions, refers to the specific access privileges afforded to each
network user and each system resource in terms of which files, folders, and drives each user can read,
write, and execute.firewall: firewall (Lesson:
Data Security)
   
A firewall is network hardware or software that examines data packets flowing in and sometimes out of a
network or computer in order to filter out packets that are potentially dangerous.hacker: hacker (Lesson:
Data Security)
   
A hacker is an individual who subverts computer security without authorization.identity theft: Identity theft (Lesson:
Data Security)
   
Identity theft is the criminal act of stealing information about a person to assume that person’s identity in
order to commit fraud or other crimes.Interior threats: Interior threats (Lesson:
Data Security)
   
Interior threats are network security threats that originate from within a network, typically from registered
users.internet fraud: Internet fraud (Lesson:
Data Security)
   
Internet fraud is the crime of deliberately deceiving a person over the Internet in order to damage them
or to obtain property or services unlawfully.Internet security: Internet security (Lesson:
Data Security)
   
Internet security refers to the unique threats and defenses associated with computers connected to the
Internet.Machine-level security: Machine-level security (Lesson:
Data Security)
   
Machine-level security refers to actions taken to protect information on a computer that may or may not
be connected to a computer network or the Internet.malware: Malware is short for "malicious software" (Lesson:
Data Security)
   
includes any software designed to damage, corrupt, or
illegally manipulate computer resources. Common forms include viruses, worms, and spyware.Network security: Network security (Lesson:
Data Security)
   
Network security is concerned with addressing vulnerabilities and threats in computer networks that may
or may not be connected to the Internet.Network usage policy: Network usage policy (Lesson:
Data Security)
   
A network usage policy is a document, agreement, or contract that defines acceptable and
unacceptable uses of computer and network resources for a business or organization.Permissions: Permissions, or file system permissions (Lesson:
Data Security)
   
Permissions, or file system permissions, refers to the specific access privileges afforded to each
network user and each system resource in terms of which files, folders, and drives each user can read,
write, and execute.phishing: phishing scam (Lesson:
Data Security)
   
A phishing scam combines fraudulent email with faked websites in order to trick a person into providing
private information that can be used for identity theft.PIN: PIN: personal identification number (Lesson:
Data Security)
   
Machine-level security refers to actions taken to protect information on a computer that may or may not
be connected to a computer network or the Internet.security patch: software update (Lesson:
Data Security)
   
A software update, sometimes called a security patch, fixes software bugs and flaws and is typically
distributed to software users through online software updates.security questions: Self Study Questions(Lesson:
Data Security)
   
What have you learned?software update: software update (Lesson:
Data Security)
   
A software update, sometimes called a security patch, fixes software bugs and flaws and is typically
distributed to software users through online software updates.SSL certificate: digital certificate (Lesson:
Data Security)
   
A digital certificate, also called an SSL certificate, is a type of electronic business card that is attached
to Internet transaction data to verify the sender of the data.threats, interior: Interior threats (Lesson:
Data Security)
   
Interior threats are network security threats that originate from within a network, typically from registered
users.wireless security: Wireless security (Lesson:
Data Security)
   
Wireless security refers to the unique threats and defenses associated with wireless computer networks.Full Glossary