Activities that protect the boundaries of your home or business network and individual computing devices from intruders. Also called information security.
data loss prevention
Activities that minimize the risk of loss or theft of data from within a network.
A person who gains unauthorized access to a computer or network and uses knowledge of computer technology and security settings for benign or malicious purposes.
The use of passwords or other identifiers such as fingerprints to make sure that the people accessing information are who they claim to be.
The process of using a key to convert readable information into unreadable information which prevents unauthorized access or usage.
A code key used in encryption. Creates an encrypted message that is decrypted by a private key.
A code key used in encryption for decrypting data that has been encrypted by a public key.
public key encription
A system of encrypting and decrypting data using a public key and private key combination.
wi-fi protected access
An encryption standard used to protect data sent across a wireless network.
wired equivelent privacy
An encryption standard used to protect data sent across a wireless network. An older and less secure technology than Wi-Fi Protected Access (WPA).
Collectively, damaging computer programs such as viruses and spyware, which can display pop-up window advertisements, track your online activities, or destroy your data.
Mass emails sent to people who haven't requested them, usually for the purpose of advertising or fraud.
A type of computer program placed on your computer without your knowledge. A virus can reproduce itself and spread from computer to computer by attaching to another, seemingly innocent, file.
: A self-replicating computer program that sends out copies of itself to every computer on a network. Worms are usually designed to damage the network, often by clogging up the network's bandwidth and slowing its performance.
Malware that masquerades as a useful program. When you run the program, you let this malware into your system. It opens a "back door" to your system for malicious hackers.
A virus that infects the data files of applications used frequently such as word processors and spreadsheets.
logic bomb virus
A piece of code placed in a software system to set off a series of potentially damaging events if certain conditions are met.
A set of programs or utilities for hackers to control a user's hardware and software and monitor the user's actions.
A group of computers that have been compromised (zombies or bots) so they forward communications to a controlling computer
A computer compromised by malware that becomes part of a botnet and is used to damage or compromise other computers. Also called a bot.
Software that tracks activities of a computer user without the user's knowledge.
Software that is supported by advertising and is capable of downloading and installing spyware.
transport layer security
A protocol that protects data such as credit card numbers as they are being transmitted between a customer and online vendor or payment company.
A small file stored on your computer by a web server to track information about you and your activities.
A system of encrypting and decrypting data in which the sending and receiving computers each have a matching private key.
intrustion prevention system
): A robust form of anti-malware program that gives network administrators a set of tools for controlling access to the system and stopping attacks in progress.
As part of a corporate security strategy, a computer set up to be easily hacked into to help identify weaknesses in the system and lure away potential hackers from the main systems.
A con artist who employs tactics to trick people into giving up valuable information.
Technology that uses devices such as fingerprint readers or retinal scanners to identify a person by a unique physical characteristic.
Attempting to gain valuable information via electronic communications by misleading a user as to your identity.
denial of service attack
An attack against a corporate system that slows performance or brings a website down.
disaster recovery plan
A formal set of policies and procedures related to preparing for recovery or continuation of computer resources and information after a disaster.
A spare server used to take over server functions.
A server activated periodically to get backup files from the main server.
A spare server that receives frequent updates and is available to take over if the server it mirrors fails.
The process of redirecting users to a hot server.
A device that protects a computer from loss of data caused by a spike in power, such as might occur during a thunderstorm
uninteruptable power supply
A battery backup that provides a temporary power supply if power failure occurs.
A field of study or a career that involves extracting information from computer storage that can be used to provide evidence in criminal investigations. This might involve decrypting data or finding residual data on a hard drive that someone has tried to erase.
Field of study or career that involves finding data saved or sent via a mobile device to use as evidence in criminal investigations
The process of decoding an apparently random sequence of characters into meaningful text. It reverses the process of encryption and is the final step in sending and receiving a secure communication.
digital rights management
A set of technologies used by owners of digital content to control access to, and reproduction of, their material. It is used primarily to enforce copyright protection for digital content
: Software used to prevent the downloading of viruses to a computer or network, or to detect and delete viruses on the system
Software used to prevent the downloading of spyware to a computer or network, or to detect and delete spyware on the system.
: Information about viruses used to update antivirus software to recognize the latest threats.
A password that is difficult to break. Strong passwords should contain uppercase and lowercase letters, numbers, and punctuation symbols.
An electronic document used to encrypt data sent over a network or the Internet.
A mathematical way to demonstrate the authenticity of a digital certificate.