In Industry Insights

Anti-virus software

Software that can detect the presence of a virus within a computer file and warn you there is a
problem.

Anti-spam filter  

‘Spam’ is unsolicited commercial email and these filters try and spot the spam and then block                                   it.

Backup

To make a copy of the data held on a system in case the original is lost or damaged

Botnet

Collection of infected computers remotely controlled by a hacker

Bug

When software has a fault, this is called a ‘Bug’

Commercial identity theft

Bogus organisations pretending to be you!  It can significantly risk the interest of your client and others you work with. It can damage your reputation to become associated with one.

Cloud

A data intensive service is provided by another company on your behalf via the internet

Cracker

Someone who creates software to overcome copy protection schemes.

Crash

When a computer fails to continue running its current instructions and stops dead – the screen usually freezes and does not respond to the mouse or keyboard.

Debug

To check software to find and fix the bugs or errors in the software code.

Decrypt

The reverse to ‘encryption’.  To get back to the original message, the code must be ‘decrypted’, usually by applying some complicated mathematics.

Encryption

To scramble a message in such a way that only the people who are meant to read it can do so.  This is done by crafty mathematics so that it is very hard for someone to crack the code

Exploit  

A security weakness within an application that is used by a hacker to gain access to the system running that particular software

Hacking

To illegally access someone’s computer systems in order to destroy, disrupt or carry out something illegal

Hashing  

Mathematical method of converting data into an unique number.

Key-logging 

Key strokes are recorded as a way of stealing usernames, passwords etc.

Logic Bomb

A malicious piece of code inserted into a system that remains dormant until certain conditions are met, when the trigger occurs the code runs and starts to corrupt records and data files.

Malware

This is the general term for malicious software (which includes Trojans, worms and viruses)

Phising

A form of internet fraud where criminals attempt to steal information such as credit card details, passwords and bank accounts.  They set up a fake website which looks identical to a legitimate company such as a bank or insurance company and try to trick people into the site and giving their account details and security codes.

Spyware

Software designed to collect information about what you are doing on the computer.  Often they can be installed without your knowledge perhaps when you have downloaded other software.  Computer security software normally includes and anti-spyware section to help detect these malicious programmes.

Spam

Unsolicited bulk email that fills up email serves and is frequently used to spread malware.

Trojan 

A type of ‘malware’ software.  The Trojan seems to do an useful task (so the user will use it), but it is also carrying out another purpose which is unknown to the user.

Virus

A virus is a piece of program code that makes copies of itself by attaching itself to another program.  They can vary from being just annoying (e.g displaying a message) to destroying data or crashing network services

Worms

A computer worm is a program that makes lots of copies of itself, it works by itself and it does not attach itself to other computer programme like a virus.   A worm can be made to delete files on a computer or send emails to everyone the owner has in their address book.

Recent Posts

Start typing and press Enter to search

Get your FREE COLP Insider email delivered fortnightly

We’ll never share your email address and you can opt out at any time, we promise

 

SRA Risk Outlook 2017/18 -Priority Risks