Survey Of Operating Systems Chapter 2: Computer Security Basics
Spyware
A category of software that runs undercover on a user's computer and gathers information without the user's permission.
Third-Party Cookie
A cookie that originates with a domain name beyond the one shown.
Permission
A level of access that describes an action you may preform on an object.
Vector
A method that malware uses to infect a computer.
CyberTerrorist
A person who wreaks havoc on victims worldwide using computer technology.
Bitcoin
A popular form of CryptoCurrency.
Password Cracker
A program or technique used for stealing passwords.
User Account Control (UAC)
A program to prevent unauthorized access to a computer.
Secure HTTP (HTTPS)
A secure connection that encrypts communications between you and the site.
Secret key
A special code used to decrypt encrypted data.
Ransomeware
A type of scareware that threatens to do damage or lock a user out of a computer unless the user pays the "ransom".
Back door
A way someone can gain access to a computer, bypassing the authentication security.
War Driving
Seeking out non-secure Wi-Fi networks.
Pop-up
Separate window that displays uninvited from a web-page.
Keylogger
Short term for "Keystroke Logger".
Malware
Short term for "Malicious Software". I.E. Viruses, Worms, Trojans, Spam, etc.
Firewall
Software or a physical device that examines network traffic.
Content filter
Software that blocks certain content.
Cyber Criminal
Someone who breaks laws using computer technology.
Hacker
Someone with a great deal of computing expertise.
Password
String of characters that you enter.
Spear Phishing
Targeted Phishing
Virus
Term used for all malware.
Bluesnarfing
The act of covertly obtaining information broadcast from wireless devices uses the Bluetooth standard.
Social Engineering
The use of persuasion techniques to gain confidence of individuals.
Social Networking
The use of social media
Spam
Unsolicited email. Often called junk mail.
Fraud
Use of deceit and trickery to persuade someone to hand over money or other valuables.
Token
Use of something you know and have to prove your identity.
Authentication
Verification on who you are
Cookies
Very small files a Web Browser saves on the local hard drive at the request of a website.
Social Networking Site
Website that provides space where members can communicate with on another and share details of their business or personal lives.
Exploit
When a malware takes advantage of some vulnerability in a computer.
Browser Hijacking
When a user redirects your browser to their liking.
Identity Theft
When someone collects personal information belonging to another person and uses that information to fraudulently make purchases, open new credit accounts and even obtain the new driver's licences.
Hotspot
Wi-Fi network that connects to the internet through a router.
Spim
an acronym for spam over instant messaging.
Pop-up blocker
an extension on a Web Browser to block pop-up advertisements.
Spam Filter
software designed to combat spam.
Botherder
someone who initiates controls of a BotNet
Encryption
the transformation of data into unreadable format.
User right
Defines a system-wide action that a user may perform such as logging on to a computer.
Parental Controls
Feature used for protecting children from inappropriate content.
Adware
Form of spyware that collects information about the user in order to display targeted advertisements to the user.
Phishing
Fraudulent method of obtaining personal and financial information through Web page pop-ups, email, etc.
BotNet
Group of networked computers that are infected with programs that forward information to other computers.
Black hat hacker
Hackers with malicious intent.
Keystroke Logger
Hardware device or a program that monitors and records every keystroke.
Header
Information that accompanies a message but does not appear in the message.
Authorization
Level of access to a computer or a resource.
Rootkit
Malware that hides itself from detection by anti-malware programs by concealing itself with the OS code or any program running on he computer.
Secure sockets layer (SSL)
Method used for encrypting information for banking and other personal information
DMZ
Network between a private network and a public network
Trojan Horse
Often just called a Trojan. A type of malware and a vector that gains access to computers by hiding in a different program.
Digital Certificate
Or security certificate, which is stored on a computer.
Pop-up Download
Program downloaded to a user's computer through a pop-up page.
Drive-by Download
Program downloaded to a user's computer without consent.
Worm
Program installed and activated on a computer without the knowledge of permission of their user.
Scareware
Programs designed to scare people into action.
Shoulder surfing
Reading information off your screen while in a public location.
CyberTerrorism
Act of wreaking havoc on victims world wide using computer technology.
User account
An account assigned to a single person.
Group Account
An account shared by multiple people.
Security account
An account that can be assigned permission to take action.
Administrator account type
An account type that has full control of the computer and it's accounts.
Standard user account
An account with standard user privileges. Cannot make changes to the system.
FireVault
An encryption tool on OS X
White hat hacker
An expert who is not a cybercriminal and only explores computer system weaknesses for the purpose of making them secure.
Cybercrime
An illegal activity performed by using computer technology.
Forged e-mail address
An impersonated email address.
Zombie
An individual computer in a BotNet
Guest account
An open account with the least privileges.
Zero-day Exploit
An unknown exploit that is very difficult to protect against.
Email Spoofing
Another term for Forged E-mail Address
Social Media
Any service that provides a place where people can interact in online communities, sharing information in various forms.
First-Party cookie
Cookie that originates with the domain name of the URL that you directly connect.
Password manager
Creates a strong password and remember it for you
