Term
|
Definition
The Encrypted File System (EFS) allows files and folders to be encrypted within Windows. To run EFS, the hard drive must be formatted with NTFS, and the OS must be a Professional, Business, Ultimate or Enterprise version of XP, Vista or Windows 7. When using EFS, a folder that is encrypted automatically encrypts any file inside it or copied to it, although encryption can be specified to be only for that folder or all of its subfolders. Encrypted files stay encrypted if moved to another folder on the same or
another NTFS drive, even if the destination isn’t encrypted. |
|
|
Term
|
Definition
Available starting with Vista, this program allows a user to encrypt an entire volume, and any other volume, on the drive. Intended to work in conjunction with file and folder encryption, BitLocker – which is based on the Advanced Encryption Standard (AES) and uses a 128-bit encryption key – is one of several drive encryption schemes available, though it’s the only one native to Windows. |
|
|
Term
|
Definition
These send data securely over public networks by establishing a secure channel of communication between a user and a server called a tunnel, which allows the data packets to be encrypted. They use a number of encryption protocols to encode data after authentication has been achieved, including Point-to-Point Tunneling Protocol (PPTP), Layer Two Tunneling Protocol (L2TP), Secure Sockets Layer (SSL) or IP Security (IPSec). |
|
|
Term
|
Definition
These programs check data packets sent over a network to make a determination, based on various data in the packet and rules programmed into the firewall, on whether to block the packets or send them on to the intended destination. Most firewalls were hardware for years, but software firewalls have gained in popularity with the rise of the Internet and personal computing. Firewalls can protect against inbound threats only – known as a one-way firewall – or against both unauthorized inbound and outbound traffic, known as a two-way firewall. |
|
|
Term
|
Definition
These are methods by which access can be granted to users. These include passwords, usernames, biometrics, and smart cards. |
|
|
Term
|
Definition
These are methods of hacking that involve deceit. It includes phishing, trojan horses, pretexting, and baiting. |
|
|
Term
|
Definition
This was the first wireless encryption protocol, and was superceded by the next. The first version of the supercedent uses TKIP encryption and the second version uses AES encryption. |
|
|
Term
|
Definition
These are programs than infect a computer, making unwanted changes to the OS, while being able to self-replicate. |
|
|
Term
|
Definition
These are programs that are hidden as file converters or utilities, and install harmful programs. |
|
|
Term
|
Definition
These are self-replicating programs that use networks to transfer themselves to other computers. |
|
|
Term
|
Definition
These are bulk messages usually sent though email that can contain large amounts of malicious programs. |
|
|
Term
|
Definition
This is software that monitors the usage of a computer and transmits the data back to its creator. |
|
|
Term
|
Definition
These are ads (popups and such) that link to web searches and activities. |
|
|
Term
|
Definition
This is a general term for any annoying and malicious program. |
|
|
Term
|
Definition
These devices, such as fingerprint and eye scanners, are used to identify specific people by their body. |
|
|
Term
|
Definition
These are methods by which the basic files of a computer can be protected |
|
|
Term
|
Definition
These are password prompts that occur during bootup to secure the computer before the OS is loaded. These can be activated and edited in BIOS. |
|
|
Term
|
Definition
This is a measure preformed by the BIOS (this can be set by the user) that detects if the computer case is open, and if so, interrupts the boot. |
|
|
Term
|
Definition
This is a motherboard chip used to store encrypted keys for various encryption methods, including BitLocker. It provides security because, even if an unauthorized user simply removed the hard drive from a system, the drive would not allow access without the TPM’s encrypted keys. |
|
|