Term
|
Definition
Executable file: used by programs to install and run on computers. |
|
|
Term
|
Definition
A type of advance fee fraud, where you are asked to help transfer money out of another country. It originated in West Africa, and 419 is the section of the Nigerian legal code that covers the crime. |
|
|
Term
|
Definition
The standard for wireless networks. |
|
|
Term
|
Definition
Controlling who has access to what information. |
|
|
Term
|
Definition
They can enhance your browsing experience by allowing animation or help with tasks such as installing security updates at Microsoft Update. If you do not trust the website and publisher, click âDonât runâ when prompted. |
|
|
Term
|
Definition
A user with sufficient access rights to allow them to manage the access rights of other users and carry out other high-level computer management tasks. |
|
|
Term
|
Definition
Any fraud that tricks victims into paying money up front on the false hope of receiving something significant later. |
|
|
Term
|
Definition
A form of spyware that displays unwanted advertisements on a computer. |
|
|
Term
|
Definition
AOLâs instant messaging system. |
|
|
Term
|
Definition
An operating system used by a number of smartphone and tablet manufacturers. The worldâs most prolific operating system for smartphones. |
|
|
Term
|
Definition
Software specifically designed for the detection and prevention of spyware. Often bundled in an internet security package. |
|
|
Term
|
Definition
Software specifically designed for the detection and prevention of known viruses. Often bundled in an internet security package. |
|
|
Term
|
Definition
Automated Teller Machine: a cash machine, often referred to as a âhole the wallâ. |
|
|
Term
|
Definition
Files, such as programs or documents, that are attached to an email. |
|
|
Term
|
Definition
The process for verifying that someone or something is who or what it claims to be. In private and public computer networks (including the internet), authentication is generally done with passwords. |
|
|
Term
|
Definition
A loophole in a computers security systems that allows a hacker to gain access. Often deliberately built in by developers for illicit purposes. |
|
|
Term
|
Definition
Copying data to ensure its availability in the case of computer failure or loss. |
|
|
Term
|
Definition
The speed at which a network can transmit data â typically used to describe speed of internet connections. |
|
|
Term
|
Definition
Using body measurements, such as fingerprints and irises, as a means of authentication. |
|
|
Term
|
Definition
The BIOS software is built into the PC, and is the first software run by a PC when powered up. This software can be password protected, which stops the PC from starting up. |
|
|
Term
|
Definition
The basic binary unit of data, representing 0 or 1. |
|
|
Term
|
Definition
A type of short-range wireless connection between devices like mobile phones, headsets and computers. |
|
|
Term
|
Definition
To start up or reset a computer, mobile phone or tablet. |
|
|
Term
|
Definition
A password that is needed before a computer starts up or any operating system can be loaded. |
|
|
Term
|
Definition
A collection of otherwise unrelated PCs which have been infected by a virus and which are under the central control of criminals or hackers. Abbreviation for Robot Network. |
|
|
Term
|
Definition
A program that lets users read and navigate pages on the Internet, such as Microsoftâs Internet Explorer, Mozillaâs Firefox, Googleâs Chrome or Appleâs Safari. |
|
|
Term
|
Definition
A region of memory in which data is temporarily held before it is transferred between two locations or devices. |
|
|
Term
|
Definition
When more information is added to a buffer than it was designed to hold. An attacker may exploit this vulnerability to take over a system. |
|
|
Term
|
Definition
An error or flaw in a computer program. |
|
|
Term
|
Definition
A unit or measure of computer memory, usually consisting of eight binary digits (bits) processed together; usually enough to store a single letter or digit. |
|
|
Term
|
Definition
An encrypted file containing user or server identification information, which is used to verify a website ownerâs identity and to help establish a security-enhanced link. |
|
|
Term
|
Definition
The process of reversing a transaction and return of payment to a customer â typically when goods have not been received or are faulty. |
|
|
Term
|
Definition
An online discussion group where you can chat (by typing) with other users in real time. |
|
|
Term
|
Definition
An application or system that accesses a service made available by a server â generally refers to a personal computer on a network. |
|
|
Term
|
Definition
|
|
Term
|
Definition
The delivery of storage and computing capacity to end users via the internet. Commonly used for backing up data and hosting applications. |
|
|
Term
|
Definition
A small file which asks permission to be placed on your computers hard drive. Cookies allow web applications to personalise your experience by gathering and remembering information about your preferences. |
|
|
Term
|
Definition
Finding a password, password or PIN by trying many combinations of characters. |
|
|
Term
|
Definition
A software update that fixes a security flaw. |
|
|
Term
Data Protection Act (DPA) |
|
Definition
The Data Protection Act 1998 sets out the legal basis for handling, processing and protecting personal data in the UK. |
|
|
Term
|
Definition
The process of converting encrypted data back into its original form. |
|
|
Term
|
Definition
Deliberate overloading of a service by criminals to make it unavailable to legitimate users. For example, by arranging millions of simultaneous visits to a website â normally from a Bot Net. |
|
|
Term
|
Definition
Software designed to prevent unauthorised access to a computer over the internet. |
|
|
Term
|
Definition
Data that is used to identify and authenticate the sender and integrity of the message data. Can be bundled with a message or transmitted separately. |
|
|
Term
|
Definition
The status of a Bluetooth device that has been set up to broadcast its existence to other Bluetooth devices. |
|
|
Term
|
Definition
A website address, alternatively known as a URL. |
|
|
Term
|
Definition
A server that converts recognisable domain names (eg microsoft.com) into their unique IP address (eg 207.46.245.222). |
|
|
Term
|
Definition
To obtain content from the internet, as an email attachment or from a remote computer, to your own hard drive. |
|
|
Term
|
Definition
A method of social engineering in which criminals raid rubbish bins to gather personal information. |
|
|
Term
|
Definition
An unexpected âfeatureâ built into a computer program by the author. Can be added for fun or malicious intent. |
|
|
Term
|
Definition
Listening in to voice or data traffic without the knowledge or consent of the sender or recipient. |
|
|
Term
|
Definition
When a user (particularly a malicious user) gains more access rights than they normally have. |
|
|
Term
|
Definition
Files, such as documents or photographs, that are attached to an email. |
|
|
Term
|
Definition
Software that scans incoming email for spam or viruses, or outgoing email for viruses â and filters it accordingly. |
|
|
Term
|
Definition
The process of converting data into cipher text (a type of code) to prevent it from being understood by an unauthorised party. |
|
|
Term
|
Definition
A trusted third party service that holds money, software or other assets pending completion of a transaction. |
|
|
Term
|
Definition
Making files available over the internet to other users, typically music or video files. |
|
|
Term
|
Definition
A biometric form of authentication using fingerprints. Used increasingly on PCs as an alternative to passwords. |
|
|
Term
|
Definition
Hardware or software designed to prevent unauthorised access to a computer or network over the internet. |
|
|
Term
|
Definition
Where unauthorised users gain access to your wireless network connection. |
|
|
Term
|
Definition
File Transfer Protocol, a method of transmitting data files over the internet, normally between businesses. |
|
|
Term
|
Definition
A backup where all the chosen files are backed up, regardless of whether they have changed since the last backup. |
|
|
Term
|
Definition
A firewall that operates at the point where a private local area network connects to the public internet. |
|
|
Term
|
Definition
|
|
Term
|
Definition
The process by which someone develops a relationship with someone else with illegal or immoral intent. Often used to describe how paedophiles develop relationships with unsuspecting children. |
|
|
Term
|
Definition
A hacker is a person who violates computer security for malicious reasons or for personal gain. |
|
|
Term
|
Definition
A fixed magnetic disk drive used to store data on computers. |
|
|
Term
|
Definition
An email that makes a false claim with criminal intentions, for example a virus warning. These emails may in fact carry a real virus and are designed to make the virus spread rapidly. |
|
|
Term
|
Definition
A security feature built into a network, designed to lure hackers into meaningless locations to avoid harm to genuine, crucial data. |
|
|
Term
|
Definition
A publicly accessible wireless internet connection. |
|
|
Term
|
Definition
Hypertext Mark up Language: the computer code that is used to form the basis of building web pages. |
|
|
Term
|
Definition
Appleâs secure cloud storage and backup product. |
|
|
Term
|
Definition
The crime of impersonating someone â by using their private information â for financial gain. |
|
|
Term
|
Definition
Internet Engineering Task Force is the body that defines the standards underlying the internet. |
|
|
Term
|
Definition
International Mobile Equipment Identification: a unique serial number built into mobile phones and tablets. To determine a deviceâs IMEI number, dial *#06# on the device. |
|
|
Term
|
Definition
A backup where only files that have been changed or added since the last backup are stored, making it faster than a full backup. |
|
|
Term
|
Definition
The UK Information Commissionerâs Office (ICO) is the independent public body set up to uphold information rights in the public interest, responsible for upholding the Data Protection Act 1998 and the Freedom of Information Act 2000. |
|
|
Term
|
Definition
The discipline of protecting computers and data from misuse. |
|
|
Term
|
Definition
Chat conversations between two or more people via typing on computers or portable devices. Systems include BlackBerry Messenger, Facebook Chat, MSN Messenger, AOL Instant Messenger, Yahoo! |
|
|
Term
|
Definition
Appleâs operating system used on its iPhone and iPad devices. |
|
|
Term
|
Definition
Internet Protocol address: a unique address that is used to identify a computer or mobile device on the internet. |
|
|
Term
|
Definition
IP Security: IPSec provides security for transmission of sensitive information over unprotected networks such as the Internet. IPSec acts at the network layer, protecting and authenticating IP packets between participating IPSec devices. |
|
|
Term
|
Definition
Internet Service Provider: a company that provides access to the internet. |
|
|
Term
|
Definition
One of todayâs most popular and widely used programming languages. Originally developed by Sun Microsystems (now Oracle). |
|
|
Term
|
Definition
A programming language derived from Java that is used to make web pages more interactive. |
|
|
Term
|
Definition
A virus or physical device that logs keystrokes in order to capture private information, passwords or credit card information. |
|
|
Term
|
Definition
|
|
Term
|
Definition
Local Area Network: a local computer for communication between computers. Can be wired or wireless. |
|
|
Term
|
Definition
The process of concealing the source of money obtained illegally, by carrying out financial transactions or operating fake businesses in order to camouflage the illegal source. |
|
|
Term
|
Definition
An open-source, freely-available operating system. |
|
|
Term
|
Definition
A file that lists actions that have occurred. |
|
|
Term
|
Definition
A type of programme used to eliminate the need to repeat the steps of common tasks over and over â such as adding or removing rows and columns or protecting or unprotecting worksheets. |
|
|
Term
|
Definition
virus which uses the macro capabilities of common applications such as spreadsheets and word processors to implement virus-like behaviour. |
|
|
Term
|
Definition
Software used or created by hackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems. Short for âmalicious softwareâ. |
|
|
Term
|
Definition
|
|
Term
|
Definition
A removable memory device, normally connected to a computer via USB. |
|
|
Term
|
Definition
Someone who is recruited by a fraudster to transfer money illegally gained in one country to another country, usually where the fraudster lives. The term comes from an analogy with drug mules. |
|
|
Term
|
Definition
The technology used to store sound files, typically for music or podcasts. |
|
|
Term
|
Definition
A device that plays MP3 music files. |
|
|
Term
|
Definition
A number of computers that are connected to one another, together with the connecting infrastructure. |
|
|
Term
|
Definition
The ability to prove that a specific individual has carried out an activity on a computer or online, so that it cannot later be denied. |
|
|
Term
|
Definition
A backup method in which data is transmitted over the internet for storage, often referred to as âcloudâ backup. |
|
|
Term
|
Definition
A term generally used to describe computer software that has been developed in a collaborative way, often by volunteers on a non-commercial basis. |
|
|
Term
|
Definition
The software that enables your computer or mobile device to operate. |
|
|
Term
|
Definition
When a computer has been taken over by hackers. |
|
|
Term
|
Definition
A symbol in a web browser that indicates that an encrypted (SSL) connection is being used to communicate with a site that has a valid certificate. Normally accompanied by âhttpsâ at the beginning of the address line. |
|
|
Term
|
Definition
When two Bluetooth-enabled devices are linked in order to communicate with each other. |
|
|
Term
|
Definition
A software update, often related to improving security. |
|
|
Term
|
Definition
Portable Document Format: a method of saving a document so that it can be opened and viewed on devices using different operating systems. |
|
|
Term
|
Definition
A network typically used to share music and video files and applications between individuals over the internet. |
|
|
Term
|
Definition
Legally hacking into a computer system or website with the approval of the owner, to reveal vulnerabilities and finding opportunities for improving its security. |
|
|
Term
|
Definition
An exploit in which criminals disrupt the normal functioning of DNS software which translates internet domain names into addresses. The user enters a correct address but is redirected to a fake website. |
|
|
Term
|
Definition
An attempt at identity theft in which criminals lead users to a counterfeit website in the hope that they will disclose private information such as user names or passwords. |
|
|
Term
|
Definition
Personal Identification Number. |
|
|
Term
|
Definition
A simple program that communicates with another computer over a network to see if it is responsive. |
|
|
Term
|
Definition
Illegal duplication or use of material covered by intellectual property laws, such as copyright. |
|
|
Term
|
Definition
A small window which appears over a web page, usually to display an advertisement. |
|
|
Term
|
Definition
A physical or virtual connection in a computer that enables applications to communicate with pre-determined external devices. |
|
|
Term
|
Definition
A telephone number, typically prefixed by 09, which is very expensive when dialled. Often connected with scams. |
|
|
Term
|
Definition
Access rights to computers or data â normally varying between users according to what they are and are not entitled to see. |
|
|
Term
|
Definition
A list of personal details revealed by users of social networking, gaming, dating and other websites. Profiles may normally be configured to be public or private. |
|
|
Term
|
Definition
A server that manages internet traffic to and from a local area network and can provide other functions, such as internet access control. |
|
|
Term
|
Definition
A code designed to be scanned by smartphone camera, which contains a link to a website belonging to the codeâs originator. Like a barcode, not readable by the human eye. |
|
|
Term
|
Definition
A DVD that is capable of storing data when used in a DVD recorder. |
|
|
Term
|
Definition
Storage devices that can be removed from a computer, such as CDs/DVDs, USB sticks and portable hard drives. |
|
|
Term
|
Definition
A set of tools used by hackers to get control of a computer. |
|
|
Term
|
Definition
A device that routes network or internet traffic. Typically found in home/small office environments within a WiFi device (wireless hub). |
|
|
Term
|
Definition
Hackers who carry out their illicit activity for notoriety rather than criminal intent. |
|
|
Term
|
Definition
A piece of software or sequence of commands that takes advantage of a software bug, glitch or vulnerability to cause problems, often with criminal intent. |
|
|
Term
|
Definition
A computer that serves files or services to other computers over a network or the internet. |
|
|
Term
|
Definition
The act of counterfeiting a bank card by using a device to capture the card and account information embedded on the cardâs magnetic strip. |
|
|
Term
|
Definition
A form of user authentication that relies on a credit card-sized card with an embedded chip. |
|
|
Term
|
Definition
A mobile phone built on a mobile computing platform, with more advanced computing ability and connectivity than a standard mobile phone. |
|
|
Term
|
Definition
Use of deceit offline to gain access to secure systems or personal information, for example impersonating a technical support agent. |
|
|
Term
|
Definition
Unsolicited commercial e-mail. Also known as junk e-mail. |
|
|
Term
|
Definition
When an unauthorised person makes a message (typically an email) appear to come from a genuine sender by using either the genuine or a very similar address. |
|
|
Term
|
Definition
Malware that secretly monitors a users activity or scans for private information. |
|
|
Term
|
Definition
The wireless network name which enables users and WiFi-enabled devices to identify one wireless network from another. Acronym for service set identifier. |
|
|
Term
|
Definition
Secure Socket Layer, an encryption system that secures internet communications. |
|
|
Term
|
Definition
To link two devices â typically a computer and smartphone or tablet â to ensure they hold the same data such as contacts, emails and music files. Short for synchronise. |
|
|
Term
|
Definition
An ultra-portable, touchscreen computer which shares much of the functionality and also the operating system of smartphones, but generally with more computing power. |
|
|
Term
|
Definition
Transmission Control Protocol / Internet Protocol. The protocols, or conventions, that computers use to communicate over the internet. |
|
|
Term
|
Definition
|
|
Term
|
Definition
A physical object, such as a smart card, used to authenticate users. |
|
|
Term
|
Definition
The transmission of information over a network or the internet. |
|
|
Term
|
Definition
Software posing as an authentic application, which actually conceals an item of malware. Term comes from Trojan Horse in Greek mythology. |
|
|
Term
Two factor authentication |
|
Definition
A method of obtaining additional evidence of identity to simply using passwords â such as a bank card. |
|
|
Term
|
Definition
Universal Serial Bus: a means of physically connecting computers and peripherals such as external storage, keyboards and MP3 players. |
|
|
Term
|
Definition
An internet-based public bulletin board system that allows users to post messages to different newsgroups. |
|
|
Term
|
Definition
Gives individuals access to files and programs on a computer. Access is often controlled by login. |
|
|
Term
|
Definition
A code name that, with a password, unlocks a user account. |
|
|
Term
|
Definition
Virtual Private Network: a method of creating a secure connection between two points over the internet. Normally used only for business-to-business communications. |
|
|
Term
|
Definition
A file written with the sole intention of doing harm, or for criminal activity. |
|
|
Term
|
Definition
A virusâs fingerprint which contains the characteristics of a virus or type of virus. Internet security software uses a database of signatures to detect viruses. |
|
|
Term
|
Definition
The practice of attempting to obtain personal or financial information via a telephone call in order to commit fraud or identity theft. |
|
|
Term
|
Definition
Voice over IP: a technology for transmitting phone-like voice conversations over the internet. |
|
|
Term
|
Definition
Any product flaw, administrative process or act, or physical exposure that makes a computer susceptible to attack by a malicious user. |
|
|
Term
|
Definition
An email system that uses a web browser to read and send emails, rather than a standalone email program such as Microsoft Outlook or Apple Mail. |
|
|
Term
|
Definition
Wired Equivalent Privacy: a type of data encryption to prevent eavesdropping and access to a wireless network by malicious users. Defined by the 802.11 standard. |
|
|
Term
|
Definition
A local area network which uses radio signals instead of a wire to transmit data. |
|
|
Term
|
Definition
A publicly accessible wireless internet connection. |
|
|
Term
|
Definition
A local area network which uses radio signals instead of a wire to transmit data. |
|
|
Term
|
Definition
A type of virus which can spread itself across networks needing no human intervention to do so. |
|
|
Term
|
Definition
WiFi Protected Access: a type of data encryption to prevent eavesdropping and access to a wireless network by malicious users. Defined by the 802.11 standard. Provides stronger security than WEP. |
|
|
Term
|
Definition
WiFi Protected Access 2: a type of data encryption to prevent eavesdropping and access to a wireless network by malicious users. Defined by the 802.11 standard. Provides stronger security than WPA or WEP. |
|
|