Term
|
Definition
encompasses the protection of information from accidental or intentional misuse by persons inside or outside an organization |
|
|
Term
|
Definition
a method for confirming users' identities |
|
|
Term
|
Definition
the process of giving someone permission to do or have something |
|
|
Term
|
Definition
forging of someone's identity for the purpose of fraud |
|
|
Term
|
Definition
a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent email |
|
|
Term
|
Definition
the identification of a user based on a physical characteristics; such as a fingerprint, iris, face, voice, or handwriting |
|
|
Term
|
Definition
scrambles information into an alternative form that requires a key or password to decrypt the information |
|
|
Term
|
Definition
hardware and/or software that guards a private network by analyzing the information leaving and entering the network |
|
|
Term
|
Definition
work at the request of the system owners to find system vulnerabilities and plug the holes |
|
|
Term
|
Definition
break into other people's computer systems and may just look around or may steal and destroy information |
|
|
Term
|
Definition
find hacking code on the internet and click-and-point their way into systems to cause damage or spread viruses |
|
|
Term
|
Definition
a hacker with criminal intent |
|
|
Term
|
Definition
software written with malicious intent to cause annoyance or damage |
|
|
Term
|
Definition
a type of virus that spreads itself, not only from file to file, but also from computer to computer |
|
|
Term
|
Definition
hides inside other software, usually as an attachment or a downloadable file |
|
|
Term
|
Definition
viruses that open a way into the network for future attacks |
|
|
Term
|
Definition
using one's social skills to trick people into revealing access credentials or other information valuable to the attacker |
|
|
Term
|
Definition
attack computer systems by transmitting a virus hoax, with a real virus attached |
|
|
Term
|
Definition
includes a variety of threats such as viruses, worms, and trojan horses |
|
|
Term
|
Definition
the forging of the return address on an email so that the email message appears to come from someone other than the actual sender |
|
|
Term
|
Definition
software that comes hidden in free downloadable software and tracks online movements, mines the information stored on a computer, or uses a computer's CPU and storage for some task the user knows nothing about |
|
|
Term
|
Definition
a program or device that can monitor data traveling over a network |
|
|