Better your Computer Vocabulary – Computer Security Terms

Common Computer Viruses
January 5, 2016
Hacking Prevention – USB stealer and Zip Bomb
January 7, 2016
Show all

Better your Computer Vocabulary – Computer Security Terms


What is Computer Vocabulary?

These are words used to explain certain functions, values, hardware types, software types and protocols that are related to computers.

Why should I Better my Computer Vocabulary?

Lots of the time you search for help with problems that you are having with your computer or you want to learn more about the computer but you can’t seem to figure what you are reading because you don’t understand the terminology used in the article or post. If you spend a bit of your time to learn computer vocabulary so that next time you’ll have a better time understanding what is being said.

Computer Security Terms

  • Administrator: This is a superuser account on a computer or network and it has complete control.
  • Adware: This is a program installed without a user’s consent or knowledge during the install of another program.
  • Asymmetric Encryption: This is an encryption technique that uses a different key to encrypt and decrypt the information.
  • Backdoor: This is a term used to describe a hidden method of bypassing security to gain access to a restricted part of a computer system.
  • Boot Sector Virus: A Computer virus that infects the first or first few sectors of a computer hard drive allowing the virus to activate as the drive or boots.
  • Brute-force attack: A password  attack that does not attempt to decrypt any information, but continue to try a list of different passwords, words, or letters.
  • Certificate: websites use certificates to define their security and identity, so that computers visiting the sites know the sites are legitimate and feature proper security.
  • Clickjacking: This is a technique used to deceive users into clicking a link which they did not intend to click.
  • Cookie poisoning: This is a process in which an unauthorized person changes the content within a user’s cookie file to gain access to sensitive information
  • Cryptography: This is the process of manipulating data and making is unreadable for anyone not meant to see the data.
  • Decryption: This is the process of taking encoded or encrypted text or other data and converting it back into text that you or the computer can read and understand.
  • Deep Web: This is a large section of content on the World Wide Web that isn’t cataloged by standard search engines, also know as the Hidden Web.
  • Dictionary Attack: This is a password attack that attempts to determine a password by trying words from a predefined list, or dictionary, of likely passwords.
  • DoS: This refers to any operating system that runs from a disk drive.
  • DoS attack: This is a method of attacking a networked computer by sending it an abnormally high number of requests, causing its network to slow down or fail.
  • Encrypt: This is the process of making data unreadable by other humans or computers for the purpose of preventing others from gaining access to its contents.
  • Firewall:This is a software utility or hardware device that limits outside network access to a computer or local network by blocking or restricting network ports.
  • HTTPS: Short for HyperText Transfer Protocol, HTTP is a set of standards that allow users of the World Wide Web to exchange information found on web pages.
  • Incognito Mode: This is a setting that prevents Internet history from being stored.
  • IP Cloaking: This is the process of a web server delivering a specific web page based on the visitors IP address.
  • Keylogger: This is a software program or hardware device that is used to monitor and log each of the keys a user types into a computer keyboard.
  • LSP: Short for Link State Packet, LSP is a packet of information generated by a network router in a link state routing protocol that lists the router’s neighbors.
  • Malware: This is malicious software designed to change your settings, delete software, cause errors, watch browsing habits, or open computer to attacks.
  • Network: This is a collection of computers, servers, mainframes, network devices, peripherals, or other devices connected to one another allowing for data to be shared and used.’
  • Patch: This is a piece of software code that can be applied after the software program has been installed to correct an issue with that program.
  • Pharming: A web page that has been created to deceive visitors into believing that is another company’s web page.
  • Phishing: is a term used to describe a malicious individual or group of individuals who scam users by sending e-mails.
  • RAT: Short for Remotely Activated Trojan, RAT is a trojan that stays dormant on a computer until it is remotely activated by another user.
  • Smishing: This is a fraudulent action similar to phishing, using SMS (text) messages rather than e-mail messages to send bait messages to people.
  • Spam: This is slang commonly used to describe junk e-mail on the Internet.
  • Spoofing: This refers to hacking or deception that imitates another person, software program, hardware device, or computer, with the intentions of bypassing security measures.
  • Trojan horse: This  is a program that appears to be something safe, but in is performing tasks such as giving access to your computer or sending personal information to other computers.
  • WOT: Short for Web of Trust, WOT is an Internet browser service that helps identify websites that may be a potential harm to your computer.
  • Zombie Network: This is a group of infected computers that are under the control of one or more individuals.

Comments are closed.