Technology and the web can be confusing, and we’ve all come across some terms that don’t make much sense. Like viruses. Or IP addresses. Or spyware. We’ve made a list of some common technical words and explained them here as simply and accurately as we can.
Any software application which displays advertising banners while the program is running. Adware often includes code that tracks a user’s personal information and passes it on to third parties, without the user’s authorization or knowledge. And if you gather enough of it, adware slows down your computer significantly. Over time, performance can be so degraded that you may have trouble working productively. See also Spyware and Malware.
Software designed to detect, and potentially eliminate, viruses before they have had a chance to wreak havoc within the system, as well as repairing or quarantining files which have already been infected by virus activity. See also Virus and Electronic Infections.
Software that performs automated functions for a user, such as word processing, spreadsheets, graphics, presentations, and databases—as opposed to operating system (OS) software.
A file that has been added to an email—often an image or document. It could be something useful to you or something harmful to your computer. See also Virus.
Confirming the correctness of the claimed identity of an individual user, machine, software component, or any other entity.
The approval, permission, or empowerment for someone or something to do something.
Hidden software or hardware mechanism used to circumvent security controls.
File copies which are saved—for example, on high capacity tape, separate disk sub-systems, or on the Internet—as protection against loss, damage or non-availability of the primary data. Off-site backup storage is ideal, sufficiently far away to reduce the risk of environmental damage such as flood that might destroy both the primary and the backup, if it were kept nearby.
See Malware, Adware, and Spyware.
The capacity of a communication channel to pass data such as text, images, video, or sound through the channel in a given amount of time. Usually expressed in bits per second.
A form of filtering that blocks only websites specified as harmful. Parents and employers sometimes use such software to prevent children and employees from visiting certain websites. You can add and remove sites from the “not permitted” list. This method of filtering allows for more full use of the Internet, but is less efficient at preventing access to any harmful material that is not on the list. See also Whitelisting Software.
A computer network attack that seeks to maximize the severity of damage and speed of contagion by combining methods—for example, using characteristics of both viruses and worms. See also Electronic Infection.
Short for “Web log,” a blog is usually defined as an online diary or journal. It is usually updated frequently and offered in a dated log format with the most recent entry at the top of the page. It often contains links to other websites along with commentary about those sites or specific subjects, such as politics, news, pop culture, or computers.
A network of private computers, each of which is called a “bot”(short for “robot”) infected with malicious software (malware) and controlled as a group without the owners’ knowledge for nefarious and, often, criminal purposes; computers are typically infected when users open up an infected attachment or visit an infected website. Infected computers are also referred to as “zombies”
General term used to refer to high-speed network connections such as cable modem and Digital Subscriber Line (DSL). These types of “always on” Internet connections are actually more susceptible to some security threats than computers which access the Web via dial-up service.
A client software program that can retrieve and display information from servers on the World Wide Web. Often known as a “Web browser” or “Internet browser,” Examples include Microsoft’s Internet Explorer, Google’s Chrome, Apple’s Safari, and Mozilla’s Firefox.
Brute Force Attack
An exhaustive password-cracking procedure that tries all possibilities, one-by-one. See also Dictionary Attack and Hybrid Attack.
Clear Desk Policy
A policy of many organizations which directs all personnel to clear their desks at the end of each working day, and file everything appropriately. Desks should be cleared of all documents and papers, including the contents of the “in” and “out” trays —not simply for cleanliness, but also to ensure that sensitive papers and documents are not exposed to unauthorized persons outside of working hours.
Clear Screen Policy
A policy of many organizations which directs all computer users to ensure that the contents of the screen are protected from prying eyes and opportunistic breaches of confidentially. Typically, the easiest means of compliance is to use a screen saver, which engages either on request or after a specified short period of time. See also Shoulder Surfing.
A technology that uses the Internet and remote servers to maintain data and applications, allowing users to access applications without installation and access to their personal files from any computer with Internet access; centralizes storage, memory, processing, and bandwidth; examples include Yahoo email or Gmail with the software managed by the cloud service providers Yahoo and Google.
A card indicating the holder has been granted a line of credit. Often sought after by criminals looking for an easy way to purchase things without having to pay for them. For this reason and others, a credit card preferable to a debit card for online shopping since it provides a buffer between buyer and seller, affording more protections to the buyer in case there is a problem with the order or the card number is compromised. See also Debit Card.
Sending or posting harmful, cruel, rude or threatening messages, or slanderous information, text, or images using the Internet or other digital communication devices.
A card linked directly to the holder’s bank account, withdrawing money from the account. Not as safe as credit cards for online shopping since if problems arise, the buyer’s money has already been spent and is harder to get back. See also Credit Card.
Denial of Service Attack
The prevention of authorized access to a system resource or the delaying of system operations and functions. Often this occurs because of a large volume of data requests. See also Flooding.
A password-cracking attack that tries all of the phrases or words in a dictionary. See also Brute Force Attack and Hybrid Attack.
The electronic equivalent of an ID card that that establishes your credentials when doing business or other transactions on the Web. It contains your name, a serial number, expiration dates, a copy of the certificate holder’s public key (used for encrypting messages and digital signatures), and the digital signature of the certificate-issuing authority so that a recipient can verify that the certificate is real.
Domain hijacking is an attack by which an attacker takes over a domain by first blocking access to the domain’s DNS server and then putting his own server up in its place.
Domain Name System (DNS)
Since the Internet has so many websites and IP addresses, your browser does not automatically know where every single one is located. It has to look each one up. That’s where the DNS (Domain Name System) comes in. The DNS is essentially the “phone book” for the Web. Rather than translating “John Doe” into a phone number, the DNS instead translates a URL (www.google.com) into an IP address, taking you to the site you’re looking for.
Recovering files, letters, memos, photographs, IDs, passwords, checks, account statements, credit card offers, and more from garbage cans and recycling bins. This information can then be used to commit identity theft.
Often called “viruses” in the news media, these malicious programs and codes harm your computer and compromise your privacy. In addition to the traditional viruses, other common types include worms and Trojan horses. Sometimes, they even work in tandem to do maximum damage. See also Blended Threat.
A data security technique used to protect information from unauthorized inspection or alteration. Information is encoded so that it appears as a meaningless string of letters and symbols during delivery or transmission. Upon receipt, the information is decoded using an encryption key.
End User License Agreement (EULA)
A contract between you and the software’s vendor or developer. Many times, the EULA is presented as a dialog box that appears the first time you open the software and forces you to check “I accept” before you can proceed. Before accepting, though, read through it and make sure you can understand and are comfortable with the terms of the agreement. If the software’s EULA is hard to understand or you can’t find it, beware!
A fake wireless Internet hot spot that looks like a legitimate service. When victims connect to the wireless network, a hacker can launch a spying attack on their transactions on the Internet, or just ask for credit card information in the standard pay-for-access deal. See also Man-in-the-Middle Attacks.
Sometimes called peer-to-peer (P2P) programs, these allow many different users to access the same file at the same time. These programs are often used to illegally upload and download music and other software. The most well-known example is Napster, but there are plenty of other sites like Grokster, Kazaa, iMesh, Ares, and Limewire, for example.
Software or hardware that, after checking information coming into a computer from the Internet or an external network, either blocks the transmission or allows it to pass through, depending on the preset firewall settings, preventing access by hackers and malicious software; often offered through computer operating systems.
An attack that attempts to cause a failure in the security of a computer providing more input, such as a large volume of data requests, than the entity can process properly. See also Denial of Service Attack.
The process of adding geographical location, or label, to photographs, videos, Web sites, SMS messages, QR Codes, or RSS feeds; a geotag usually consists of latitude and longitude coordinates, altitude, distance, place names, and other details about the origin of the media being tagged helping users find a variety of online location-specific information.
Using the Internet to manipulate and gain trust of a minor as a first step towards the future sexual abuse, production, or exposure of that minor. Sometimes involves developing the child’s sexual awareness and may take days, weeks, months, or some cases years to manipulate the minor.
An individual who attempts to break into a computer without authorization.
When used in the first part of a URL (e.g., http://), this term specifies the use of HTTP enhanced by a security mechanism such as Secure Socket Layer (SSL). Always look for the HTTPS on the checkout or order form page when shopping online.
Builds on other password-cracking attacks by adding numerals and symbols to dictionary words. See also Dictionary Attack and Brute Force Attack.
Instant Messaging (IM)
A service that allows people to send and get messages almost instantly. To send messages using instant messaging you need to download an instant messaging program and know the instant messaging address of another person who uses the same IM program. See also Spim.
IP (Internet Protocol) Address
Every web address (say, “www.google.com”) has its own numbered address called an IP address. An IP address looks something like this: 188.8.131.52. An IP address is a series of numbers that specifies where a particular computer or mobile device is on the Internet. It’s a bit like mom’s phone number: just as the phone number tells an operator which house to route a call to so it reaches your mom, an IP address tells your computer how to get in touch with another computer on the Internet. Every website has an IP Address, although finding a website is considerably easier to do when using its domain name instead. See also Domain Name System (DNS).
Internet Service Provider (ISP)
A company that provides internet access to customers.
A specific type of electronic infection that records victims’ keystrokes and sends them to an attacker. This can be done with either hardware or software. See also Trojan Horse.
A generic term for a number of different types of malicious code. See also Adware and Spyware.
Posing as an online bank or merchant, a cyber criminal allows a victim to sign in over a Secure Sockets Layer (SSL) connection. The attacker then logs onto the real server using the client’s information and steals credit card numbers.
Software products that allow parents to monitor or track the websites or email messages that a child visits or reads. See also Blacklisting Software and Whitelisting Software.
Two or more computer systems that are grouped together to share information, software, and hardware.
Operating System (OS)
Programs that manage all the basic functions and programs on a computer, such as allocating system resources, providing access and security controls, maintaining file systems, and managing communications between end users and hardware devices. Examples include Microsoft’s Windows, Apple’s Macintosh, and Red Hat’s Linux.
A secret sequence of characters that is used as a means of authentication to confirm your identity in a computer program or online.
Password cracking is the process of attempting to guess passwords, given the password file information. See also Brute Force Attacks, Dictionary Attacks, and Hybrid Attacks.
Passive wiretapping, usually on a local area network, to gain knowledge of passwords.
A patch is a small security update released by a software manufacturer to fix bugs in existing programs. Your computer’s software programs and/or operating system may be configured to check automatically for patches, or you may need to periodically visit the manufacturers’ websites to see if there have been any updates.
Peer-to-Peer (P2P) Programs
See File-Sharing Programs.
Soliciting private information from customers or members of a business, bank, or other organization in an attempt to fool them into divulging confidential personal and financial information. People are lured into sharing user names, passwords, account information or credit card numbers, usually by an official-looking message in an email or a pop-up advertisement that urges them to act immediately, usually by clicking on a link provided. See also Vishing.
Redirecting visitors from a real website to a bogus one. Users type in what they think is a valid Web address and are unknowingly redirected to an illegitimate site that steals their personal information. On the spoofed site, criminals may mimic real transactions and harvest private information unknowingly shared by users. With this, the attacker can then access the real website and conduct transactions using the credentials of a valid user.
A hardware device that connects two or more networks and routes incoming data packets to the appropriate network. Many Internet Service Providers (ISPs) provide these devices to their customers, and they often contain firewall protections.
A file containing active content; for example, commands or instructions to be executed by the computer.
Looking over a person’s shoulder to get confidential information. It is an effective way to get information in crowded places because it’s relatively easy to stand next to someone and watch as they fill out a form, enter a PIN number at an ATM machine, or type a password. Can also be done long-distance with the aid of binoculars or other vision-enhancing devices. To combat it, experts recommend that you shield paperwork or your keypad from view by using your body or cupping your hand. Also, be sure you password-protect your computer screen when you must leave it unattended, and clear your desk at the end of the day. See also Clear Desk Policy and Clear Screen Policy.
A high-tech method by which thieves capture your personal or account information from your credit card, driver’s license, or even passport using an electronic device called a “skimmer.” Such devices can be purchased online for under $50. Your card is swiped through the skimmer and the information contained in the magnetic strip on the card is then read into and stored on the device or an attached computer. Skimming is predominantly a tactic used to perpetuate credit card fraud—but is also a tactic that is gaining in popularity amongst identity thieves.
A euphemism for non-technical or low-technology means—such as lies, impersonation, tricks, bribes, blackmail, and threats—used to attack information systems. Sometimes telemarketers or unethical employees employ such tactics.
Social Networking Websites
Sites specifically focused on the building and verifying of social networks for whatever purpose. Many social networking services are also blog hosting services. There are over 300 known social networking websites, the largest of which are MySpace, with over 100 million users, followed by Facebook, Friendster, Xanga, and Blogspot. Such sites enable users to post pictures and share personal data such as their contact information, hobbies, activities, and interests in their online profile. The sites facilitate connecting with other users with similar interests, activities, and locations. Sites vary in who may view a user’s profile—some have settings which may be changed so that profiles can be viewed only by “friends.” See also Blogs.
Unwanted, unsolicited email from someone you don’t know. It is usually trying to sell you something or get you to reveal personal information about yourself.
Unwanted, unsolicited instant messages from someone you don’t know. It is usually trying to sell you something or get you to reveal personal information about yourself.
Masquerading so that a trusted IP address is used instead of the true IP address. A technique used by hackers as a means of gaining access to a computer system.
Software that uses your Internet connection to send personally identifiable information about you to a collecting device on the Internet. It is often packaged with software that you download voluntarily, so that even if you remove the downloaded program later, the spyware may remain. See also Adware and Malware.
SSL (Secure Socket Layer)
Technology that sets up a secure and private communication path between computers. If a website supports SSL encryption, data sent to and from that website should be protected from eavesdroppers on the Internet. Used by websites whose names begin with https instead of http.
A computer program that appears to be beneficial or innocuous, but also has a hidden and potentially malicious function that evades security mechanisms. A “keystroke logger,” which records victims’ keystrokes and sends them to an attacker, or remote-controlled “zombie computers” are examples of the damage that can be done by Trojan horses. See also Electronic Infection.
Abbreviation for “Uniform (or Universal) Resource Locator.” A way of specifying the location of publicly available information on the Internet. Also known as a Web address.
Taking advantage of human error, some scammers use phishing emails to guide recipients to fraudulent sites with names very similar to established sites. They use a slight misspelling or other subtle difference in the URL, like “monneybank.com” versus “moneybank.com” or “account.paypal.com” and “accounts.paypal.com” to redirect users to share their personal information unknowingly.
A hidden, self-replicating section of computer software, usually malicious logic, that propagates by infecting—i.e., inserting a copy of itself into and becoming part of — another program. A virus cannot run by itself; it requires that its host program be run to make the virus active. Often sent through email attachments. Also see Electronic Infection and Blended Threat.
Soliciting private information from customers or members of a business, bank, or other organization in an attempt to fool them into divulging confidential personal and financial information. People are lured into sharing user names, passwords, account information or credit card numbers, usually by an official-looking message in an email or a pop-up advertisement that urges them to act immediately—but in a vishing scam, they are urged to call the phone number provided, rather than clicking on a link. See also Phishing.
A flaw that allows someone to operate a computer system with authorization in excess of that which the system owner specifically granted to him or her.
A form of filtering that only allows connections to a pre-approved list of sites that are considered useful and appropriate for children. Parents sometimes use such software to prevent children from visiting all but certain websites. You can add and remove sites from the “permitted” list. This method is extremely safe, but allows for only extremely limited use of the Internet.
A technology that allows an electronic device (personal computer, video game console, smartphone, tablet, digital audio player) to exchange data wirelessly (using radio waves) over a computer network.
A wireless access point to the Internet or other computer network over a wireless local area network through the use of a router connected to a link to an Internet service provider; frequently found in coffee shops and other public establishments, a hotspot usually offers Internet access within a range of about 65 feet (20 meters) indoors and a greater range outdoors; many smartphones provide built in ability to establish a WiFi hotspot.
Originally an acronym for “Write once, read many times,” a type of electronic infection that can run independently, can propagate a complete working version of itself onto other hosts on a network, and may consume computer resources destructively. Once this malicious software is on a computer, it scans the network for another machine with a specific security vulnerability. When it finds one, it exploits the weakness to copy itself to the new machine, and then the worm starts replicating from there, as well. See also Electronic Infection and Blended Threat.
A remote-access Trojan horse installs hidden code that allows your computer to be controlled remotely. Digital thieves then use robot networks of thousands of zombie computers to carry out attacks on other people and cover up their tracks. Authorities have a harder time tracing criminals when they go through zombie computers.