Internet security terms and definitions

391 views

Published on

Security - Presentation

Published in: Education
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
391
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
8
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Internet security terms and definitions

  1. 1. Internet Security<br />Module One<br />Terms and Definitions<br />
  2. 2. Objectives<br />In this module<br />You will gain an understanding of terms related to safe internet use.<br />You will increase your ability to secure your personal information.<br />You will use hyperlinks to extend understanding.<br />
  3. 3. Security Terms and Definitions<br />Password<br />A string of characters entered by a user to verify his or her identity to a network or to a local computer.<br />See also strong passwordand weak passwordin the following slides.<br />
  4. 4. Security Terms and Definitions<br />Strong password<br />Apasswordprovides an effective defense against unauthorized access to a resource. <br />A strong password is at least six characters long, does not contain all or part of the user's account name, and contains at least three of the four following categories of characters: uppercase letters, lowercase letters, base 10 digits, and symbols found on the keyboard, such as !, @, and #.<br />
  5. 5. Security Terms and Definitions<br />Weak password<br />A password that does not provide an effective defense against unauthorized access to a resource.<br />A weak password might be less than six characters long, contain all or part of a user's account name, or contain less than three of the four following categories of characters: uppercase letters, lowercase letters, base 10 digits, and symbols found on the keyboard, such as !, @, and #.<br />
  6. 6. Security Terms and Definitions<br />User profile<br />Settings that define customization preferences for a particular user, such as desktop settings, persistent network connections, personally identifiable information,web site use, or other behaviors and demographics data.<br />
  7. 7. Security Terms and Definitions<br />Download<br />To transfer a copy of a file from a remote computer to a requesting computer by means of a modem or network.<br />
  8. 8. Security Terms and Definitions<br />Spam<br />Unsolicited commercial e-mail. <br />Also known as junk e-mail.<br />
  9. 9. Security Terms and Definitions<br />Virus<br />A code written with the express intention of replicating itself. A virus attempts to spread from computer to computer by attaching itself to a host program. It may damage hardware, software, or data. Compare worm. See also the definition provided by the Virus Info Alliance (f-secure.com).<br />
  10. 10. Security Terms and Definitions<br />Adware<br />Advertising that is integrated into software.<br />Adware is often combined with a host application that is provided at no charge as long as the user agrees to accept the adware.<br />
  11. 11. Security Terms and Definitions<br />Antivirus software (AV)<br />A computer program designed to detect and respond to malicious software, such as viruses and worms. <br />Responses may include blocking user access to infected files, cleaning infected files or systems, or informing the user that an infected program was detected.<br />
  12. 12. Security Terms and Definitions<br />Trojan Horse<br />A program that appears to be useful or harmless but that contains hidden code designed to exploit or damage the system on which it is run. <br />Trojan horse programs are most commonly delivered to users through e-mail messages that misrepresent the program's purpose and function. Also called Trojan code.<br />
  13. 13. Security Terms and Definitions<br />Malicious code<br />Software that fulfills the deliberately harmful intent of an attacker when run.<br />For example, viruses, worms, and Trojan horses are malicious code.<br />
  14. 14. Security Terms and Definitions<br />Worm<br />Self-propagating malicious code that can automatically distributes itself from one computer to another through network connections.<br />A worm can take harmful action, such as consuming network or local system resources, possibly causing a denial of service attack. Compare virus.<br />
  15. 15. Credits<br />Wikipedia<br />Microsoft Corporation.<br />One Community<br />

×