Anti-virus software
Software that can detect the presence of a virus within a computer file and warn you there is a
problem.
Anti-spam filter
‘Spam’ is unsolicited commercial email and these filters try and spot the spam and then block it.
Backup
To make a copy of the data held on a system in case the original is lost or damaged
Botnet
Collection of infected computers remotely controlled by a hacker
Bug
When software has a fault, this is called a ‘Bug’
Commercial identity theft
Bogus organisations pretending to be you! It can significantly risk the interest of your client and others you work with. It can damage your reputation to become associated with one.
Cloud
A data intensive service is provided by another company on your behalf via the internet
Cracker
Someone who creates software to overcome copy protection schemes.
Crash
When a computer fails to continue running its current instructions and stops dead – the screen usually freezes and does not respond to the mouse or keyboard.
Debug
To check software to find and fix the bugs or errors in the software code.
Decrypt
The reverse to ‘encryption’. To get back to the original message, the code must be ‘decrypted’, usually by applying some complicated mathematics.
Encryption
To scramble a message in such a way that only the people who are meant to read it can do so. This is done by crafty mathematics so that it is very hard for someone to crack the code
Exploit
A security weakness within an application that is used by a hacker to gain access to the system running that particular software
Hacking
To illegally access someone’s computer systems in order to destroy, disrupt or carry out something illegal
Hashing
Mathematical method of converting data into an unique number.
Key-logging
Key strokes are recorded as a way of stealing usernames, passwords etc.
Logic Bomb
A malicious piece of code inserted into a system that remains dormant until certain conditions are met, when the trigger occurs the code runs and starts to corrupt records and data files.
Malware
This is the general term for malicious software (which includes Trojans, worms and viruses)
Phising
A form of internet fraud where criminals attempt to steal information such as credit card details, passwords and bank accounts. They set up a fake website which looks identical to a legitimate company such as a bank or insurance company and try to trick people into the site and giving their account details and security codes.
Spyware
Software designed to collect information about what you are doing on the computer. Often they can be installed without your knowledge perhaps when you have downloaded other software. Computer security software normally includes and anti-spyware section to help detect these malicious programmes.
Spam
Unsolicited bulk email that fills up email serves and is frequently used to spread malware.
Trojan
A type of ‘malware’ software. The Trojan seems to do an useful task (so the user will use it), but it is also carrying out another purpose which is unknown to the user.
Virus
A virus is a piece of program code that makes copies of itself by attaching itself to another program. They can vary from being just annoying (e.g displaying a message) to destroying data or crashing network services
Worms
A computer worm is a program that makes lots of copies of itself, it works by itself and it does not attach itself to other computer programme like a virus. A worm can be made to delete files on a computer or send emails to everyone the owner has in their address book.