Software that can detect the presence of a virus within a computer file and warn you there is a
‘Spam’ is unsolicited commercial email and these filters try and spot the spam and then block it.
To make a copy of the data held on a system in case the original is lost or damaged
Collection of infected computers remotely controlled by a hacker
When software has a fault, this is called a ‘Bug’
Commercial identity theft
Bogus organisations pretending to be you! It can significantly risk the interest of your client and others you work with. It can damage your reputation to become associated with one.
A data intensive service is provided by another company on your behalf via the internet
Someone who creates software to overcome copy protection schemes.
When a computer fails to continue running its current instructions and stops dead – the screen usually freezes and does not respond to the mouse or keyboard.
To check software to find and fix the bugs or errors in the software code.
The reverse to ‘encryption’. To get back to the original message, the code must be ‘decrypted’, usually by applying some complicated mathematics.
To scramble a message in such a way that only the people who are meant to read it can do so. This is done by crafty mathematics so that it is very hard for someone to crack the code
A security weakness within an application that is used by a hacker to gain access to the system running that particular software
To illegally access someone’s computer systems in order to destroy, disrupt or carry out something illegal
Mathematical method of converting data into an unique number.
Key strokes are recorded as a way of stealing usernames, passwords etc.
A malicious piece of code inserted into a system that remains dormant until certain conditions are met, when the trigger occurs the code runs and starts to corrupt records and data files.
This is the general term for malicious software (which includes Trojans, worms and viruses)
A form of internet fraud where criminals attempt to steal information such as credit card details, passwords and bank accounts. They set up a fake website which looks identical to a legitimate company such as a bank or insurance company and try to trick people into the site and giving their account details and security codes.
Software designed to collect information about what you are doing on the computer. Often they can be installed without your knowledge perhaps when you have downloaded other software. Computer security software normally includes and anti-spyware section to help detect these malicious programmes.
Unsolicited bulk email that fills up email serves and is frequently used to spread malware.
A type of ‘malware’ software. The Trojan seems to do an useful task (so the user will use it), but it is also carrying out another purpose which is unknown to the user.
A virus is a piece of program code that makes copies of itself by attaching itself to another program. They can vary from being just annoying (e.g displaying a message) to destroying data or crashing network services
A computer worm is a program that makes lots of copies of itself, it works by itself and it does not attach itself to other computer programme like a virus. A worm can be made to delete files on a computer or send emails to everyone the owner has in their address book.