Вы находитесь на странице: 1из 3

1

IT Terms Related to Cyber-Security

COMPUTER SECURITY RISK- current action that could cause a loss of/damage to computer
hardware, software, data, information or processing capability

CYBERCRIME-Is an online/internet-based illegal act

Hackers-Are the brain of the cybercrime

Crackers-The ones who intrude the system

Script Kiddies-Use existing and easy-to-find programs

Corporate Spies-Spies that spy on another company

Unethical Employees-Go against the company they work for

Cyberterrorists-Blackmails involved with politics

Botnet-Group of compromised computer connected to a network ("zombie")

Denial of service attack (DoS)-Disrupts computer access to internet services

Backdoor-Program/set of instructions in a program that allows users to bypass security controls

Spoofing-Technique intruders use to make their network or Internet transmission appear


legitimate

Firewall-.

Intrusion detection software - analyzes all network traffic


- assesses system vulnerabilities
- identifies any unauthorized intrusions
- notifies network admins of suspicious behavior

Honeypot-Vulnerable computer that is set up to entice an intruder to break into it

Unauthorized access-Using a computer/network without permission

Unauthorized use-Using a computer or it's data for unapproved/possibly illegal activities

Biometric device-Authenticates a persons identity by translating a personal characteristic into a


digital code that's compared with a digital code in the computer

Digital forensics-Discovery, collection & analysis of evidence found on computers and


networks

Jason D. Arellanos Files Empowerment Technologies


2

Hardware theft-Act of stealing computer equipment

Hardware vandalism-Defacing/destroying computer equipment

Information theft-When someone steals personal or confidential information

Encryption-Converting readable data into unreadable characters to prevent unauthorized access

Digital signature-Encrypted code that a person, web site or organization attaches to an


electronic message to verify identity of the sender

System failure-Prolonged malfunction of a computer

Surge protectors & uninterruptible power supplies-2 ways to protect computers from system
failures caused by electrical power problems

Backup-Duplicate of a file, program, or disk that can be used if the original is lost, damaged, or
destroyed

Offsite backup-Stored in a location SEPARATE from the computer site

Egronomics-Applied science to incorporate comfort, efficiency and safety into the design of
items in the workplace

Computer addiction-Occurs when the computer consumes someone's entire social life

Computer ethics-Moral guidelines that govern the use of computers and information systems

Intellectual property rights-Rights to which creators are entitled for their work

IT code of conduct-A written guideline that helps determine whether a specific computer action
is ethical or unethical

Green computing-Reducing the electricity and environmental waste while using a computer

Information privacy-Refers to the rights of individuals and companies to deny or restrict the
collection of information about them

Cookie-Small text file that a web server stores on your computer

Spam-An unsolicited e-mail message/newsgroup posting

E-mail Filtering-Blocks e-mail messages from designated sources

Anti-spam programs-Attempt to remove spam before it reaches your inbox

Jason D. Arellanos Files Empowerment Technologies


3

Phishing-Scam in which perpetrator send and official looking e-mail message that attempts to
obtain your personal and financial information

Pharming-A scam where a perpetrator attempts to obtain your personal and financial
information via spoofing

Social engineering-Gaining unauthorized access or obtaining confidential information by taking


advantages of trust and naviety

Employee monitoring-Use of computers to observe, record, and review an employee's use of a


computer

Content filtering-Process of restricting access to certain material on the web

Web filtering software-Restricts access to specified websites

WiFi-Wireless Fidelity

SSID-Network name (server set identification)

Software theft-Occurs when someone steals software media, illegally registers and/or activates a
program, illegally copies a program, and intentionally erases programs

Jason D. Arellanos Files Empowerment Technologies

Вам также может понравиться