Term
|
Definition
| encompasses the protection of information from accidental or intentional misuse by persons inside or outside an organization |
|
|
Term
|
Definition
| a method for confirming users' identities |
|
|
Term
|
Definition
| the process of giving someone permission to do or have something |
|
|
Term
|
Definition
| forging of someone's identity for the purpose of fraud |
|
|
Term
|
Definition
| a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent email |
|
|
Term
|
Definition
| the identification of a user based on a physical characteristics; such as a fingerprint, iris, face, voice, or handwriting |
|
|
Term
|
Definition
| scrambles information into an alternative form that requires a key or password to decrypt the information |
|
|
Term
|
Definition
| hardware and/or software that guards a private network by analyzing the information leaving and entering the network |
|
|
Term
|
Definition
| work at the request of the system owners to find system vulnerabilities and plug the holes |
|
|
Term
|
Definition
| break into other people's computer systems and may just look around or may steal and destroy information |
|
|
Term
|
Definition
| find hacking code on the internet and click-and-point their way into systems to cause damage or spread viruses |
|
|
Term
|
Definition
| a hacker with criminal intent |
|
|
Term
|
Definition
| software written with malicious intent to cause annoyance or damage |
|
|
Term
|
Definition
| a type of virus that spreads itself, not only from file to file, but also from computer to computer |
|
|
Term
|
Definition
| hides inside other software, usually as an attachment or a downloadable file |
|
|
Term
|
Definition
| viruses that open a way into the network for future attacks |
|
|
Term
|
Definition
| using one's social skills to trick people into revealing access credentials or other information valuable to the attacker |
|
|
Term
|
Definition
| attack computer systems by transmitting a virus hoax, with a real virus attached |
|
|
Term
|
Definition
| includes a variety of threats such as viruses, worms, and trojan horses |
|
|
Term
|
Definition
| the forging of the return address on an email so that the email message appears to come from someone other than the actual sender |
|
|
Term
|
Definition
| software that comes hidden in free downloadable software and tracks online movements, mines the information stored on a computer, or uses a computer's CPU and storage for some task the user knows nothing about |
|
|
Term
|
Definition
| a program or device that can monitor data traveling over a network |
|
|