Glossary for Computer Concepts: security
Learn Computer Concepts in FREE step-by-step lessons.
access points: Access points are essentially routers with the capability of wirelessly connecting to Wi-Fi equipped devices. The access point sends and receives signals to and from computers on the wireless local area network or WLAN(pronounced W-lan).
Access pointsantivirus software: Antivirus software, also known as virus protection software, uses several techniques to find malware on a computer system; remove it if possible; and keep additional malware from infecting the system.
Antivirus softwareBiometrics authentication method: Biometrics is the science and technology of authentication by scanning and measuring a person’s unique physical features (“something about you”). Fingerprints, facial characteristics, retinal patterns, and voice patterns are commonly used in biometrics.
Biometrics authentication methodbotnet: A botnet, or botnet army, refers to a collection of computers autonomously or automatically working together toward some goal; these are often zombie computers that are synchronized to perform illegal activities on the Internet.
botnet, or botnet armycyberwarfare: Cyberwarfare extends traditional forms of warfare to the Internet and the web, including espionage, psychological warfare, and attacks.
Cyberwarfaredata backup: Data backup is a process in which copies of important computer files are stored in a safe place to guard against data loss.
Data backupdigital certificate: A digital certificate, also called an SSL certificate, is a type of electronic business card that is attached to Internet transaction data to verify the sender of the data.
digital certificateEncryption: Encryption is a security technique that uses high-level mathematical functions and computer algorithms to encode data so that it is unintelligible to all but the sender and recipient.
Encryptionfile permissions: Permissions, or file system permissions, refers to the specific access privileges afforded to each network user and each system resource in terms of which files, folders, and drives each user can read, write, and execute.
Permissions, or file system permissionsfirewall: A firewall is network hardware or software that examines data packets flowing in and sometimes out of a network or computer in order to filter out packets that are potentially dangerous.
firewallhacker: A hacker is an individual who subverts computer security without authorization.
hackeridentity theft: Identity theft is the criminal act of stealing information about a person to assume that person’s identity in order to commit fraud or other crimes.
Identity theftinterior threats: Interior threats are network security threats that originate from within a network, typically from registered users.
Interior threatsinternet fraud: Internet fraud is the crime of deliberately deceiving a person over the Internet in order to damage them or to obtain property or services unlawfully.
Internet fraudinternet security: Internet security refers to the unique threats and defenses associated with computers connected to the Internet.
Internet securityMachine-level security: Machine-level security refers to actions taken to protect information on a computer that may or may not be connected to a computer network or the Internet.
Machine-level securitymalware: includes any software designed to damage, corrupt, or illegally manipulate computer resources. Common forms include viruses, worms, and spyware.
Malware is short for "malicious software"network security: Network security is concerned with addressing vulnerabilities and threats in computer networks that may or may not be connected to the Internet.
Network securitynetwork usage policy: A network usage policy is a document, agreement, or contract that defines acceptable and unacceptable uses of computer and network resources for a business or organization.
Network usage policypermissions, file: Permissions, or file system permissions, refers to the specific access privileges afforded to each network user and each system resource in terms of which files, folders, and drives each user can read, write, and execute.
Permissions, or file system permissionsphishing scam: A phishing scam combines fraudulent email with faked websites in order to trick a person into providing private information that can be used for identity theft.
phishing scamPIN: Machine-level security refers to actions taken to protect information on a computer that may or may not be connected to a computer network or the Internet.
PIN: personal identification numbersoftware update: A software update, sometimes called a security patch, fixes software bugs and flaws and is typically distributed to software users through online software updates.
software updatewireless security: Wireless security refers to the unique threats and defenses associated with wireless computer networks.
Wireless securityFull Glossary