Skip to main content

terms used in digital security



Here are some frequently used terms of digital security.

Access Control: A term used to ensure that resources are only granted to users who are entitled to them.

Advanced Encryption Standard (AES): An encryption standard designed to specify an unclassified, publicly disclosed, symmetric encryption algorithm.

Authentication: Used by systems to confirm the identity of a user.

Backdoor: A tool used by hackers or system security experts to access a computer system or network, bypassing the system’s usual security mechanisms.

Bandwidth: The limited amount of communications data that any channel is capable of sending or receiving in a specific time.

Biometrics: A security measure that uses physical characteristics to authenticate4 a user’s access to a system.

Boot Sector Virus: A virus that can affect a computer system as it boots, before the operating system as even loaded.

Botnet: A large number of Internet connected, infected computers that are used to flood a network or send spam message to the rest of the Internet.

Brute Force: A hacking technique that uses all possible password combinations one at a time in order to gain access to a user account or system.

Cipher: A cryptographic algorithm used in the encryption and decryption process.

Cookie: A file used to store information about a website that can be should the user ever visit the site again.

Cyber Attack: An attack on a system using malware to compromise its security. Usually in order to gain access to steal information or demand a ransom.

Cyber Bullying: When an individual, or group of individuals, threaten or post negative and derogatory messages or doctored images of someone online.

Data Encryption Standard (DES): A popular method of data encryption using a private (secret) key. There are 72 quadrillion or more possible keys that can be used.

Decryption: The process of transforming an encrypted message into its original text form.

Denial of Service (DoS): Prevention of authorized access to a system or network.

Distributed Denial of Service (DDoS): A type of DoS attack using multiple attacking systems to amplify the amount of network traffic, thereby flooding and swamping the target systems or networks.

Domain Name System (DNS): The domain name system is the way that Internet domain names are located and translated into Internet Protocol addresses. A domain name is a meaningful and easy to remember ‘handle’ for an Internet address.

Encryption: The process of securing data by transforming it into something unreadable using cryptographic means.

Ethernet: Communication architecture for wired local area networks.

Fingerprinting: Used by hackers and security experts to send packets to a system in order to see how it responds, usually to determine the operating system and security measures.

Firewall: A hardware or software layer designed to prevent unauthorized access to or from a computer or network to another computer or network.

Flooding: A malware attack that causes an eventual failure of a system by bombarding it with continuous stream of data.

Gateway: A network point that acts as the door into another network.

Hacker: Someone who violates or circumvents a computer security measure. Can be used for malicious purposes or legitimately to test a system’s vulnerabilities.

HTTP: HyperText Transfer Protocol, the protocol used by the World Wide Web (Internet) that defines how messages are sent, received and read by browsers and other connected software layers.

HTTPS: HyperText Transfer Protocol Secure, an encrypted and far more secure version of HTTP.

Internet Protocol (IP) Address: A standard used by servers and machines to connect to each other and form an individual identity for each connected device.

Internet Service Provider (ISP): A company that provides Internet access to businesses and residential addresses.

Key Logger: A type of malware that can record key presses as a text file and send that file to a remote source. Once obtained, the hacker can then see what keys you’ve pressed.

Local Area Network (LAN): Communications network linking multiple devices in a defined, limited location, such as a home or office.

Logic Bomb: A type of malware that’s dormant until a predefined time when it explodes and runs or injects malicious code into a system.

Malicious Code: Software that’s designed to circumvent security measures and gain unauthorized access to a system.

Malware: A generic term to describe different types of malicious code.

Network: A group of linked computers or devices that can share resources and communicate with each other.

Password: A secret security measure used to access a protected resource and authenticate access.

Phishing: A method used by cyber criminals to obtain information from a user by baiting then with fake emails or messages.

PIN: Personal Identification Number, used as a form of authentication access to a system, resource or user account.

Ransomware: A type of malware that locks, or encrypts, all files on a system until a ransom is paid and the unlock code is entered.

Rootkit: A set of tools used by a hacker to mask their intrusion and obtain administrator access to a system.

Sandbox: A system architecture designed to test code in a secure and safe environment without it affecting the host system.

Spyware: A type of malware that spies on a user’s activities or system and reports back to a remote system.

Trojan Horse: A type of malware designed as a useful program but in reality hides some malicious code.

Two-Factor Authentication: Authorization of access to a system or resource through a username/password combination as well as another form of authorization, such as a PIN code.

Virus: A type of malware designed for multiple purposes to spread and infect as many computer systems as possible. Usually destructive but can be used to grind a system to a halt by using up all of its available resources.

Virtual Private Network (VPN): A secure tunnel between two system using advanced encryption methods to protect the communications between systems.

Wi-Fi: A wireless network standard between connected systems.

Worm: A type of malware that can replicate itself and spread through other systems consuming resources and contents destructively.

Understanding these few terms will indeed help you stay secure. This guide was originally published by Black Dog Media, which has many enlightening guides covering several devices and operating systems.

Comments

Popular posts from this blog

abort, retry, ignore poem

The infamous Abort, Retry, Ignore message box of Windows, with no option given to close it. Found this classic and fun poem about the "Abort, Retry, Ignore" message. I have been able to trace back the source to Annoyances.org. Here it is: Once upon a midnight dreary, fingers cramped and vision bleary, System manuals piled high and wasted paper on the floor, Longing for the warmth of bed sheets, still I sat there doing spreadsheets. Having reached the bottom line I took a floppy from the drawer, I then invoked the SAVE command and waited for the disk to store, Only this and nothing more. Deep into the monitor peering, long I sat there wond'ring, fearing,
 Doubting, while the disk kept churning, turning yet to churn some more.
 But the silence was unbroken, and the stillness gave no token.
 "Save!" I said, "You cursed mother! Save my data from before!"
 One thing did the phosphors answer, only this and nothing more,
 Just, "Abort...

this symbol is called a lemniscate, and other facts

The technical term for your foot "falling asleep" is "taresthesia". "Pins and needles" is really called "paresthesia". Great Britain has invaded about 90% of the world's countries. There's a brand of hand sanitizer called "Maybe You Touched Your Genitals". There was a hoax that the world was ending in 1806 because someone wrote "Christ is coming" on eggs, that were later stuffed into a hen. Gary Numan is actually 13 days older than Gary Oldman. There is a word in the English language with only one vowel, which occurs six times: Indivisibility. Los Angeles's full name is 'El Pueblo de Nuestra la Reina de los Angeles de Porciuncula'. Polyamorous people have invented a word to indicate the opposite feeling of jealousy - compersion. The Macrocilix maia moth confuses predators with wing patterns that mimic two flies eating bird poop. It even releases a pungent odor to drive home the dec...

pan-himalayan railroad

Chinese press is flooding with the news of China’s newest engineering feat – the completion of a railroad linking Lhasa (Tibet) with Eastern China. The country is celebrating this key achievement while the western press is once again applauding in awe and giving out mixed speculations. For example, this photo story contains some lines: “There are fears the railway will speed up the immigration of ethnic Chinese into Tibet, threatening its distinct cultural and religious identity.” “Tibetan groups and foreign critics say the railway’s real aim is political, as a symbol of China’s administrative and military control over a contested border region.” “...............................................” “..............................” All I can say about such statements is that leading people from China will undoubtedly laugh down these types of comments made by western media companies. This task in itself is a great combination of hard work, intellect and brotherhood, which in itself is a s...