-
adware
sftware installed on comptr produces pop-up ads using your browser; ads based on browsing habits
-
antispyware software
used to remove adware and spyware
-
AV
- antivirus software
- utility programs that prevent infect'n/scan systm to detect & remove viruses
- (Ex: McAffee Associates' VirusScan & Norton Antivirus)
-
ATA Secure Erase
Standards developed by American Nat'l Standard Institute (ANSI) that dictate how to securely erase data from solid state devices (USB flash drive/ SSD drive on order to protect personal privacy)
-
biometric device
input device that inputs bilogical data about a person, can identify a person's: fingerprints, handprints, face, voice, eyes, & handwriting
-
BitLocker Encrypt'n
utility in Win7/Vista Ultimate & Enterprise edit'ns used to lock ⇩ hard drive by encrypting entire Win vol. & any other vol. on drive
-
boot sector virus
infectious virus can replace boot program w/modified, infected version, often causing boot & data retrieval problems
-
degausser
machine that exposes a storage device to a strong magnetic field to completely erase the data on a magnetic hard drive/tape drive
-
digital certificate
- used to authentc8 source of file/document/I.D. & authentc8 person/org sending data over ntwrk
- this code is assigned by certificate authority such as Verisign & includes public key for encrypt'n (aka: digital ID/ digital signature)
-
email hoax
email msg trying to tempt usr into giving out personal info/trying to scam usr
-
Encrypted File System
EFS- way to use a key to encode a file/folder on NTFS vol. to protect sensitive data. Because it's an integr8d systm service, EFS is transparent to usrs & apps
-
grayware
program AV sftware recognizes to be potentially harmful/potentially unwanted
-
key fob
device (ex: smart card) that can fit conveniently on key chain
-
keylogger
spyware tracks: keystrokes, including psswrds, chat room sess'ns, email msgs, documents, online purchases, & anything else you type on your PC. Text is logged to text file & transmitted over the Internet w/o your knowledge
-
LoJack
technology used by Absolute Software used to track the whereabouts of a laptop comptr & if comptr is stolen, lock↓ accss to comptr/erase data on it technology is embedded in BIOS of many laptops
-
malicious software
- any unwanted program transmitted to a comptr w/o usr's knowledge & designed to do varying °s of damage to data & sftware
- Includes: viruses, Trojan horses, worms, adware, spyware, keyloggers, browser hijackers, dialers, and downloaders
- AKA: malware, infestat'n, comptr infestat'n
-
phishing
- 1. type of identity theft where person is baited to give personal data to website that appears to be website of reputable company w/which person has acct
- 2. Sending email msg w/intent of getting usr to reveal private info used for identity theft
-
privacy filter
device that fits over a monitor to prevent other people from viewing the monitor from a wide angle
-
Quarantined comptr
comptr suspected of infection & not allowed to use ntwrk, put on diff ntwrk dedic8d to quarantined comptrs/ allowed to accss only certain ntwrk resources
-
retinal scanning
part of authentic'n prcss, some systms use biometric databy scanning the blood vessels on back of eye & is considered most reliable of all biometric data scanning
-
RFID badge
badge worn by employee & used to gain entrance into locked area of a building. A Radio Frequency Identificat'n tokens transmits authentic'n to the systm when the token gets in range of a query device
-
rootkit
malicious sftware loads itself b4 OS boot is complete & can hijack internal Win components so it masks info Win provides to user-mode utilities such as Win Explorer/Task Manager
-
RSA tokens
type of smart card containing authenticat'n info
-
Security Center
cntr in Vista where you can confirm Win Firewall, Win Update, anti-malware settings, including that of Win Defender, & other security settings
-
shoulder surfing
where other people secretly peek @ your monitor screen as you work to gain valuable info
-
smart card
any small device containing authenticat'n info that can be keyed into logon window/read by a reader to authentic8 usr on ntwrk
-
smart card reader
device can read smart card u to authentic8 usr onto a ntwrk
-
social engineering
practice of tricking people into giving out private info/allowing unsafe programs into ntwrk/comptr
-
spyware
malicous sftware installs itself to spy on you. collects personal info about you & transmits over the Internet to web-hosting sites that intend to use your personal data for harm
-
strong password
psswrd not easy to guess
-
tailgating
when an unauthorized person follows an employee into a secured entrance to a room/building
-
Trojan
type of malware tricks you into opening it by substituting itself for legitimate program
-
virus
program w/incubat'n period, is infectious, & intended to cause damage. might destroy data & programs/ damage a disk drive's boot sector
-
virus definit'n
- set of distinguishing charstcs of a virus & used by antivirus sftware to i.d. new viruses as they get into the wild
- Aka virus signatures
-
virus encyclopedia
database about viruses that's kept on Internet
-
Win Defender
Antispyware utility included in Win7/Vista
-
Win Firewall
personal firewall protects comptr from intrusion & is automatically config when you set your ntwrk locat'n in Network & Sharing Cntr
-
worm
infestation designed to copy itself repeatedly onto memory, drive space, /ntwrk, until little memory, disk space, /ntwrk bandwidth remains
|
|