SlideShare ist ein Scribd-Unternehmen logo
1 von 4
A
Active Content

Small program that gets installed on a computer while browsing the Internet. The basic function of active
content is to provide an interactive Internet experience through videos and toolbars. Sometimes, active content
is used to gain unauthorized access to a computer, and then damage the data stored on it or install malicious
software on it.




B
Back Up

To make a duplicate copy of a program, a disk, or data. The duplicate copy is called a backup.




C
Cache Memory

Temporary memory on your computer that is sometimes used to store local copies of files opened when you
browse the Internet.

Computer Privacy

Keeping a user’s data, including personal files and e-mail messages, such that the data is not accessible by
anyone without appropriate permission.

Computer Security

The protection of a computer system and its data from accidental or intentional loss and tampering.

Cookie

A small file on a computer that is created when a user visits a Web site. A Web site uses cookies to identify
users who visit the site, and also track the preferences of the users.

Copyright

A method of protecting the rights of an originator of a creative work, such as text, piece of music, painting, or
computer program, through law.




D
Decryption

The process of reconverting the encrypted data into a readable and usable form.
E
Encryption

The process of converting data into an unreadable and unusable form. Encryption is done to prevent
unauthorized access of data, especially during data transmission over the Internet.




F
Firewall

A filter that blocks unreliable information from the Internet before it reaches your computer or a private network.
It provides additional protection against threats such as hackers and viruses. A firewall also helps to ensure
computer privacy by restricting external access by any unauthorized user.




H
Hacker

A person who uses computer expertise to gain unauthorized access to a computer, and then misuses or
tampers the programs and data stored on the computer.




I
Intellectual Property

Any information available on the Internet is an intellectual property, which is legally owned by the person who
created it. The owner of an intellectual property has the exclusive rights to control the use of this information.

Internet Service Provider (ISP)

A company that provides Internet connectivity to individuals, businesses, and organizations.




L
Libel

Written defamation that has been published. Libel is a punishable offense.




O
Online Predator

An individual who develops contact with Internet users, through chat rooms, online forums, or e-mail, to exploit
them financially or involve them in dangerous relationships.




P
Password

A unique string of characters that a user types in as an identification code. It is a security measure used to
restrict access to computer systems and sensitive files.

Phishing

The act of extracting personal information, such as passwords and credit card details, from computer users and
then use the information for malicious purposes.

Plagiarism

The act of copying someone’s work and using it as if it is your own work, without mentioning the source.

Power surge

A sudden increase in line voltage, which may lead to the damage of electronic devices, such as computers.




S
Secure Sockets Layer (SSL)

An Internet security protocol that ensures secure data communication by encrypting the information
transmitted. The SSL protocol certifies that a Web site is genuine and ensures that the data provided to the site
is not misused.

Slander

Verbal defamation. Slander is a punishable offense.

Software Piracy

Unauthorized copying of copyrighted software without obtaining the license or permission of its copyright owner
is software piracy.

Spam

An irrelevant and unsolicited e-mail message sent by an unknown sender. A spam is sent to distribute a
message to many recipients at one time.

Spyware
A computer program that is installed on your computer without your knowledge. Spyware can secretly send out
information about your Web browsing habits or other personal details to another computer through the network.




T
Trojan Horse

A destructive computer program disguised as a game, utility, or software. When run, a Trojan horse does
something harmful to the computer system while appearing to do something useful.




U
Username

The name by which a user is identified to a computer system or network. To access a computer protected by
username and password, a user needs to enter the correct combination of username and password.




V
Virus

A computer program that is designed to cause malfunctioning of a computer or damage the data stored on the
computer.




W
Worm

A computer program that propagates itself across computers, usually by creating copies of itself in each
computer's memory. A worm might duplicate itself in one computer so often that it causes the computer to
crash.

Weitere Àhnliche Inhalte

Was ist angesagt?

cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic tools
Sonu Sunaliya
 
COMPUTER SECURITY
COMPUTER SECURITYCOMPUTER SECURITY
COMPUTER SECURITY
Kak Yong
 

Was ist angesagt? (20)

Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Infosec
InfosecInfosec
Infosec
 
cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic tools
 
System Security in Ethical Hacking
System Security in Ethical HackingSystem Security in Ethical Hacking
System Security in Ethical Hacking
 
Ethical_Hacking_ppt
Ethical_Hacking_pptEthical_Hacking_ppt
Ethical_Hacking_ppt
 
Computer security
Computer securityComputer security
Computer security
 
Chapter11
Chapter11Chapter11
Chapter11
 
COMPUTER SECURITY
COMPUTER SECURITYCOMPUTER SECURITY
COMPUTER SECURITY
 
Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Security Threats
Security ThreatsSecurity Threats
Security Threats
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
What is Hacking? AND Types of Hackers
What is Hacking? AND Types of HackersWhat is Hacking? AND Types of Hackers
What is Hacking? AND Types of Hackers
 
Hacking presentation
Hacking presentationHacking presentation
Hacking presentation
 
Hacking
HackingHacking
Hacking
 
Introduction Ethical hacking by eslam hussein
Introduction Ethical hacking by eslam husseinIntroduction Ethical hacking by eslam hussein
Introduction Ethical hacking by eslam hussein
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
 
Slideshare is
Slideshare isSlideshare is
Slideshare is
 
Web security
Web securityWeb security
Web security
 

Andere mochten auch (6)

Sektör Haberleri 07-13 Ocak Haftası
Sektör Haberleri 07-13 Ocak HaftasıSektör Haberleri 07-13 Ocak Haftası
Sektör Haberleri 07-13 Ocak Haftası
 
4 a module virus and spyware
4 a module virus and spyware4 a module virus and spyware
4 a module virus and spyware
 
Brightspace and Math Formulae: Making Friends - 2014 Brightspace Ignite Wisco...
Brightspace and Math Formulae: Making Friends - 2014 Brightspace Ignite Wisco...Brightspace and Math Formulae: Making Friends - 2014 Brightspace Ignite Wisco...
Brightspace and Math Formulae: Making Friends - 2014 Brightspace Ignite Wisco...
 
Microsoft Office for iPad Product Guide - Atidan
Microsoft Office for iPad Product Guide - AtidanMicrosoft Office for iPad Product Guide - Atidan
Microsoft Office for iPad Product Guide - Atidan
 
John Aguirre, President
John Aguirre, PresidentJohn Aguirre, President
John Aguirre, President
 
Terms & definitions
Terms & definitionsTerms & definitions
Terms & definitions
 

Ähnlich wie Security terms & definitions

Internet security
Internet securityInternet security
Internet security
at1211
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacy
Ardit Meti
 
Computer crime
Computer crimeComputer crime
Computer crime
Vishesh Dalal
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011
lbcollins18
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd period
charvill
 
How to Keep Yourself secure while browsing internet pre null meet kolkata
How to Keep Yourself secure while browsing internet pre null meet kolkataHow to Keep Yourself secure while browsing internet pre null meet kolkata
How to Keep Yourself secure while browsing internet pre null meet kolkata
amiyadutta
 

Ähnlich wie Security terms & definitions (20)

Internet security
Internet securityInternet security
Internet security
 
Chapter 10.0
Chapter 10.0Chapter 10.0
Chapter 10.0
 
Computer security and
Computer security andComputer security and
Computer security and
 
Computer security
Computer securityComputer security
Computer security
 
Cyber Crime Types & Tips
Cyber Crime Types & TipsCyber Crime Types & Tips
Cyber Crime Types & Tips
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacy
 
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxBCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011
 
Computer security
Computer securityComputer security
Computer security
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
 
mobile security.pptx
mobile security.pptxmobile security.pptx
mobile security.pptx
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd period
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.ppt
 
How to Keep Yourself secure while browsing internet pre null meet kolkata
How to Keep Yourself secure while browsing internet pre null meet kolkataHow to Keep Yourself secure while browsing internet pre null meet kolkata
How to Keep Yourself secure while browsing internet pre null meet kolkata
 
Presentation1
Presentation1Presentation1
Presentation1
 

Mehr von Rozell Sneede

Excel & database terms & definitions
Excel & database terms & definitionsExcel & database terms & definitions
Excel & database terms & definitions
Rozell Sneede
 
Digital literacy terms & definitions
Digital literacy terms & definitionsDigital literacy terms & definitions
Digital literacy terms & definitions
Rozell Sneede
 
Basic terms & definitions
Basic terms & definitionsBasic terms & definitions
Basic terms & definitions
Rozell Sneede
 
Removing virus tri fold - white
Removing virus tri fold - whiteRemoving virus tri fold - white
Removing virus tri fold - white
Rozell Sneede
 
Cyc flyer chn with ob logo
Cyc flyer   chn with ob logoCyc flyer   chn with ob logo
Cyc flyer chn with ob logo
Rozell Sneede
 
Cyc module learning express library
Cyc module learning express libraryCyc module learning express library
Cyc module learning express library
Rozell Sneede
 
Cyc module inf ohio
Cyc module inf ohioCyc module inf ohio
Cyc module inf ohio
Rozell Sneede
 
Wordpress module 1 a
Wordpress module 1 aWordpress module 1 a
Wordpress module 1 a
Rozell Sneede
 
9 word press 2c
9   word press 2c9   word press 2c
9 word press 2c
Rozell Sneede
 
8 word press 2b
8   word press 2b8   word press 2b
8 word press 2b
Rozell Sneede
 
7 word press 2a
7   word press 2a7   word press 2a
7 word press 2a
Rozell Sneede
 
6 word press module 1f
6   word press module 1f6   word press module 1f
6 word press module 1f
Rozell Sneede
 
5 word press module 1e
5   word press module 1e5   word press module 1e
5 word press module 1e
Rozell Sneede
 
4 word press module 1d
4   word press module 1d4   word press module 1d
4 word press module 1d
Rozell Sneede
 
3 word press module 1c
3   word press module 1c3   word press module 1c
3 word press module 1c
Rozell Sneede
 
2 word press module 1b
2   word press module 1b2   word press module 1b
2 word press module 1b
Rozell Sneede
 
1 wordpress module 1 a
1   wordpress module 1 a1   wordpress module 1 a
1 wordpress module 1 a
Rozell Sneede
 
1 wordpress module 1 a
1   wordpress module 1 a1   wordpress module 1 a
1 wordpress module 1 a
Rozell Sneede
 
On line banking cur
On line banking curOn line banking cur
On line banking cur
Rozell Sneede
 

Mehr von Rozell Sneede (20)

Excel & database terms & definitions
Excel & database terms & definitionsExcel & database terms & definitions
Excel & database terms & definitions
 
Digital literacy terms & definitions
Digital literacy terms & definitionsDigital literacy terms & definitions
Digital literacy terms & definitions
 
Basic terms & definitions
Basic terms & definitionsBasic terms & definitions
Basic terms & definitions
 
5 steps
5 steps5 steps
5 steps
 
Removing virus tri fold - white
Removing virus tri fold - whiteRemoving virus tri fold - white
Removing virus tri fold - white
 
Cyc flyer chn with ob logo
Cyc flyer   chn with ob logoCyc flyer   chn with ob logo
Cyc flyer chn with ob logo
 
Cyc module learning express library
Cyc module learning express libraryCyc module learning express library
Cyc module learning express library
 
Cyc module inf ohio
Cyc module inf ohioCyc module inf ohio
Cyc module inf ohio
 
Wordpress module 1 a
Wordpress module 1 aWordpress module 1 a
Wordpress module 1 a
 
9 word press 2c
9   word press 2c9   word press 2c
9 word press 2c
 
8 word press 2b
8   word press 2b8   word press 2b
8 word press 2b
 
7 word press 2a
7   word press 2a7   word press 2a
7 word press 2a
 
6 word press module 1f
6   word press module 1f6   word press module 1f
6 word press module 1f
 
5 word press module 1e
5   word press module 1e5   word press module 1e
5 word press module 1e
 
4 word press module 1d
4   word press module 1d4   word press module 1d
4 word press module 1d
 
3 word press module 1c
3   word press module 1c3   word press module 1c
3 word press module 1c
 
2 word press module 1b
2   word press module 1b2   word press module 1b
2 word press module 1b
 
1 wordpress module 1 a
1   wordpress module 1 a1   wordpress module 1 a
1 wordpress module 1 a
 
1 wordpress module 1 a
1   wordpress module 1 a1   wordpress module 1 a
1 wordpress module 1 a
 
On line banking cur
On line banking curOn line banking cur
On line banking cur
 

KĂŒrzlich hochgeladen

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
Enterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

KĂŒrzlich hochgeladen (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

Security terms & definitions

  • 1. A Active Content Small program that gets installed on a computer while browsing the Internet. The basic function of active content is to provide an interactive Internet experience through videos and toolbars. Sometimes, active content is used to gain unauthorized access to a computer, and then damage the data stored on it or install malicious software on it. B Back Up To make a duplicate copy of a program, a disk, or data. The duplicate copy is called a backup. C Cache Memory Temporary memory on your computer that is sometimes used to store local copies of files opened when you browse the Internet. Computer Privacy Keeping a user’s data, including personal files and e-mail messages, such that the data is not accessible by anyone without appropriate permission. Computer Security The protection of a computer system and its data from accidental or intentional loss and tampering. Cookie A small file on a computer that is created when a user visits a Web site. A Web site uses cookies to identify users who visit the site, and also track the preferences of the users. Copyright A method of protecting the rights of an originator of a creative work, such as text, piece of music, painting, or computer program, through law. D Decryption The process of reconverting the encrypted data into a readable and usable form.
  • 2. E Encryption The process of converting data into an unreadable and unusable form. Encryption is done to prevent unauthorized access of data, especially during data transmission over the Internet. F Firewall A filter that blocks unreliable information from the Internet before it reaches your computer or a private network. It provides additional protection against threats such as hackers and viruses. A firewall also helps to ensure computer privacy by restricting external access by any unauthorized user. H Hacker A person who uses computer expertise to gain unauthorized access to a computer, and then misuses or tampers the programs and data stored on the computer. I Intellectual Property Any information available on the Internet is an intellectual property, which is legally owned by the person who created it. The owner of an intellectual property has the exclusive rights to control the use of this information. Internet Service Provider (ISP) A company that provides Internet connectivity to individuals, businesses, and organizations. L Libel Written defamation that has been published. Libel is a punishable offense. O
  • 3. Online Predator An individual who develops contact with Internet users, through chat rooms, online forums, or e-mail, to exploit them financially or involve them in dangerous relationships. P Password A unique string of characters that a user types in as an identification code. It is a security measure used to restrict access to computer systems and sensitive files. Phishing The act of extracting personal information, such as passwords and credit card details, from computer users and then use the information for malicious purposes. Plagiarism The act of copying someone’s work and using it as if it is your own work, without mentioning the source. Power surge A sudden increase in line voltage, which may lead to the damage of electronic devices, such as computers. S Secure Sockets Layer (SSL) An Internet security protocol that ensures secure data communication by encrypting the information transmitted. The SSL protocol certifies that a Web site is genuine and ensures that the data provided to the site is not misused. Slander Verbal defamation. Slander is a punishable offense. Software Piracy Unauthorized copying of copyrighted software without obtaining the license or permission of its copyright owner is software piracy. Spam An irrelevant and unsolicited e-mail message sent by an unknown sender. A spam is sent to distribute a message to many recipients at one time. Spyware
  • 4. A computer program that is installed on your computer without your knowledge. Spyware can secretly send out information about your Web browsing habits or other personal details to another computer through the network. T Trojan Horse A destructive computer program disguised as a game, utility, or software. When run, a Trojan horse does something harmful to the computer system while appearing to do something useful. U Username The name by which a user is identified to a computer system or network. To access a computer protected by username and password, a user needs to enter the correct combination of username and password. V Virus A computer program that is designed to cause malfunctioning of a computer or damage the data stored on the computer. W Worm A computer program that propagates itself across computers, usually by creating copies of itself in each computer's memory. A worm might duplicate itself in one computer so often that it causes the computer to crash.