Term
|
Definition
The Encrypted File System (EFS) allows files and folders to be encrypted within Windows. To run EFS, the hard drive must be formatted with NTFS, and the OS must be a Professional, Business, Ultimate or Enterprise version of XP, Vista or Windows 7. When using EFS, a folder that is encrypted automatically encrypts any file inside it or copied to it, although encryption can be specified to be only for that folder or all of its subfolders. Encrypted files stay encrypted if moved to another folder on the same or
another NTFS drive, even if the destination isn’t encrypted. |
|
|
Term
|
Definition
| Available starting with Vista, this program allows a user to encrypt an entire volume, and any other volume, on the drive. Intended to work in conjunction with file and folder encryption, BitLocker – which is based on the Advanced Encryption Standard (AES) and uses a 128-bit encryption key – is one of several drive encryption schemes available, though it’s the only one native to Windows. |
|
|
Term
|
Definition
| These send data securely over public networks by establishing a secure channel of communication between a user and a server called a tunnel, which allows the data packets to be encrypted. They use a number of encryption protocols to encode data after authentication has been achieved, including Point-to-Point Tunneling Protocol (PPTP), Layer Two Tunneling Protocol (L2TP), Secure Sockets Layer (SSL) or IP Security (IPSec). |
|
|
Term
|
Definition
| These programs check data packets sent over a network to make a determination, based on various data in the packet and rules programmed into the firewall, on whether to block the packets or send them on to the intended destination. Most firewalls were hardware for years, but software firewalls have gained in popularity with the rise of the Internet and personal computing. Firewalls can protect against inbound threats only – known as a one-way firewall – or against both unauthorized inbound and outbound traffic, known as a two-way firewall. |
|
|
Term
|
Definition
| These are methods by which access can be granted to users. These include passwords, usernames, biometrics, and smart cards. |
|
|
Term
|
Definition
| These are methods of hacking that involve deceit. It includes phishing, trojan horses, pretexting, and baiting. |
|
|
Term
|
Definition
| This was the first wireless encryption protocol, and was superceded by the next. The first version of the supercedent uses TKIP encryption and the second version uses AES encryption. |
|
|
Term
|
Definition
| These are programs than infect a computer, making unwanted changes to the OS, while being able to self-replicate. |
|
|
Term
|
Definition
| These are programs that are hidden as file converters or utilities, and install harmful programs. |
|
|
Term
|
Definition
| These are self-replicating programs that use networks to transfer themselves to other computers. |
|
|
Term
|
Definition
| These are bulk messages usually sent though email that can contain large amounts of malicious programs. |
|
|
Term
|
Definition
| This is software that monitors the usage of a computer and transmits the data back to its creator. |
|
|
Term
|
Definition
| These are ads (popups and such) that link to web searches and activities. |
|
|
Term
|
Definition
| This is a general term for any annoying and malicious program. |
|
|
Term
|
Definition
| These devices, such as fingerprint and eye scanners, are used to identify specific people by their body. |
|
|
Term
|
Definition
| These are methods by which the basic files of a computer can be protected |
|
|
Term
|
Definition
| These are password prompts that occur during bootup to secure the computer before the OS is loaded. These can be activated and edited in BIOS. |
|
|
Term
|
Definition
| This is a measure preformed by the BIOS (this can be set by the user) that detects if the computer case is open, and if so, interrupts the boot. |
|
|
Term
|
Definition
| This is a motherboard chip used to store encrypted keys for various encryption methods, including BitLocker. It provides security because, even if an unauthorized user simply removed the hard drive from a system, the drive would not allow access without the TPM’s encrypted keys. |
|
|