Zebra0.com

computer-conceptsGlossary for Computer Concepts: security

Glossary for Computer Concepts: security

Learn Computer Concepts in FREE step-by-step lessons.

access points: Access points are essentially routers with the capability of wirelessly connecting to Wi-Fi equipped devices. The access point sends and receives signals to and from computers on the wireless local area network or WLAN(pronounced W-lan).
   Access points
antivirus software: Antivirus software, also known as virus protection software, uses several techniques to find malware on a computer system; remove it if possible; and keep additional malware from infecting the system.
   Antivirus software
Biometrics authentication method: Biometrics is the science and technology of authentication by scanning and measuring a person’s unique physical features (“something about you”). Fingerprints, facial characteristics, retinal patterns, and voice patterns are commonly used in biometrics.
   Biometrics authentication method
botnet: A botnet, or botnet army, refers to a collection of computers autonomously or automatically working together toward some goal; these are often zombie computers that are synchronized to perform illegal activities on the Internet.
   botnet, or botnet army
cyberwarfare: Cyberwarfare extends traditional forms of warfare to the Internet and the web, including espionage, psychological warfare, and attacks.
   Cyberwarfare
data backup: Data backup is a process in which copies of important computer files are stored in a safe place to guard against data loss.
   Data backup
digital certificate: A digital certificate, also called an SSL certificate, is a type of electronic business card that is attached to Internet transaction data to verify the sender of the data.
   digital certificate
Encryption: Encryption is a security technique that uses high-level mathematical functions and computer algorithms to encode data so that it is unintelligible to all but the sender and recipient.
   Encryption
file permissions: Permissions, or file system permissions, refers to the specific access privileges afforded to each network user and each system resource in terms of which files, folders, and drives each user can read, write, and execute.
   Permissions, or file system permissions
firewall: A firewall is network hardware or software that examines data packets flowing in and sometimes out of a network or computer in order to filter out packets that are potentially dangerous.
   firewall
hacker: A hacker is an individual who subverts computer security without authorization.
   hacker
identity theft: Identity theft is the criminal act of stealing information about a person to assume that person’s identity in order to commit fraud or other crimes.
   Identity theft
interior threats: Interior threats are network security threats that originate from within a network, typically from registered users.
   Interior threats
internet fraud: Internet fraud is the crime of deliberately deceiving a person over the Internet in order to damage them or to obtain property or services unlawfully.
   Internet fraud
internet security: Internet security refers to the unique threats and defenses associated with computers connected to the Internet.
   Internet security
Machine-level security: Machine-level security refers to actions taken to protect information on a computer that may or may not be connected to a computer network or the Internet.
   Machine-level security
malware: includes any software designed to damage, corrupt, or illegally manipulate computer resources. Common forms include viruses, worms, and spyware.
   Malware is short for "malicious software"
network security: Network security is concerned with addressing vulnerabilities and threats in computer networks that may or may not be connected to the Internet.
   Network security
network usage policy: A network usage policy is a document, agreement, or contract that defines acceptable and unacceptable uses of computer and network resources for a business or organization.
   Network usage policy
permissions, file: Permissions, or file system permissions, refers to the specific access privileges afforded to each network user and each system resource in terms of which files, folders, and drives each user can read, write, and execute.
   Permissions, or file system permissions
phishing scam: A phishing scam combines fraudulent email with faked websites in order to trick a person into providing private information that can be used for identity theft.
   phishing scam
PIN: Machine-level security refers to actions taken to protect information on a computer that may or may not be connected to a computer network or the Internet.
   PIN: personal identification number
software update: A software update, sometimes called a security patch, fixes software bugs and flaws and is typically distributed to software users through online software updates.
   software update
wireless security: Wireless security refers to the unique threats and defenses associated with wireless computer networks.
   Wireless security
Full Glossary