SlideShare a Scribd company logo
1 of 1
Glossary
Active Content
Small program that gets installed on a computer while browsing the Internet. The basic function of active
content is to provide an interactive Internet experience through videos and toolbars. Sometimes, active
content is used to gain unauthorized access to a computer, and then damage the data stored on it or
install malicious software on it.
Back Up
To make a duplicate copy of a program, a disk, or data. The duplicate copy is called a backup.
Cache Memory
Temporary memory on your computer that is sometimes used to store local copies of files opened when
you browse the Internet.
Computer Privacy
Keeping a user’s data, including personal files and e-mail messages, such that the data is not accessible
by anyone without appropriate permission.
Computer Security
The protection of a computer system and its data from accidental or intentional loss and tampering.
Cookie
A small file on a computer that is created when a user visits a Web site. A Web site uses cookies to
identify users who visit the site, and also track the preferences of the users.
Copyright
A method of protecting the rights of an originator of a creative work, such as text, piece of music, painting,
or computer program, through law.
Decryption
The process of reconverting the encrypted data into a readable and usable form.
Encryption
The process of converting data into an unreadable and unusable form. Encryption is done to prevent
unauthorized access of data, especially during data transmission over the Internet.
Firewall
A filter that blocks unreliable information from the Internet before it reaches your computer or a private
network. It provides additional protection against threats such as hackers and viruses. A firewall also
helps to ensure computer privacy by restricting external access by any unauthorized user.

More Related Content

What's hot (20)

Security threats
Security threatsSecurity threats
Security threats
 
CSC103 Digital Security
CSC103 Digital SecurityCSC103 Digital Security
CSC103 Digital Security
 
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
A to z of Cyber Crime
A to z of Cyber CrimeA to z of Cyber Crime
A to z of Cyber Crime
 
Netiquette
NetiquetteNetiquette
Netiquette
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Security
 
Hacking
HackingHacking
Hacking
 
Computer virus
Computer virusComputer virus
Computer virus
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
E.technology
E.technologyE.technology
E.technology
 
Computer security
Computer securityComputer security
Computer security
 
Lock It Down, Keep It Safe
Lock It Down, Keep It SafeLock It Down, Keep It Safe
Lock It Down, Keep It Safe
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Computer hacking
Computer hackingComputer hacking
Computer hacking
 
Network security
Network securityNetwork security
Network security
 
Web security
Web securityWeb security
Web security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 

Similar to Alpha Tech Module7 8 glossary

Internet security
Internet securityInternet security
Internet securityat1211
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011lbcollins18
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacyHaider Ali Malik
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsMuhammadRobeel3
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.pptAsif Raza
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks ShellyAdeel Khurram
 
How to Keep Yourself secure while browsing internet pre null meet kolkata
How to Keep Yourself secure while browsing internet pre null meet kolkataHow to Keep Yourself secure while browsing internet pre null meet kolkata
How to Keep Yourself secure while browsing internet pre null meet kolkataamiyadutta
 
mobile security.pptx
mobile security.pptxmobile security.pptx
mobile security.pptxTapan Khilar
 
Methods of Cybersecurity Attacks
Methods of Cybersecurity AttacksMethods of Cybersecurity Attacks
Methods of Cybersecurity AttacksZyrellLalaguna
 
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxBCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxKirti Verma
 

Similar to Alpha Tech Module7 8 glossary (20)

Internet security
Internet securityInternet security
Internet security
 
Computer security and
Computer security andComputer security and
Computer security and
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
 
Chapter 10.0
Chapter 10.0Chapter 10.0
Chapter 10.0
 
Computer security
Computer securityComputer security
Computer security
 
Presentation1
Presentation1Presentation1
Presentation1
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Itc chapter # 11
Itc   chapter # 11Itc   chapter # 11
Itc chapter # 11
 
Computer security
Computer securityComputer security
Computer security
 
Cyber security
Cyber securityCyber security
Cyber security
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.ppt
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
 
computer security
computer securitycomputer security
computer security
 
Cyber Crime Types & Tips
Cyber Crime Types & TipsCyber Crime Types & Tips
Cyber Crime Types & Tips
 
How to Keep Yourself secure while browsing internet pre null meet kolkata
How to Keep Yourself secure while browsing internet pre null meet kolkataHow to Keep Yourself secure while browsing internet pre null meet kolkata
How to Keep Yourself secure while browsing internet pre null meet kolkata
 
Email security & threads
Email security & threadsEmail security & threads
Email security & threads
 
mobile security.pptx
mobile security.pptxmobile security.pptx
mobile security.pptx
 
Methods of Cybersecurity Attacks
Methods of Cybersecurity AttacksMethods of Cybersecurity Attacks
Methods of Cybersecurity Attacks
 
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxBCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
 

More from thinkict

Photostory
PhotostoryPhotostory
Photostorythinkict
 
Open Office Impress : Lesson 08
Open Office Impress : Lesson 08Open Office Impress : Lesson 08
Open Office Impress : Lesson 08thinkict
 
Open Office Calc : Level1
 Open Office Calc : Level1 Open Office Calc : Level1
Open Office Calc : Level1thinkict
 
Open Office Calc : Lesson 07
Open Office Calc : Lesson 07Open Office Calc : Lesson 07
Open Office Calc : Lesson 07thinkict
 
Open Office Calc : Level 1
Open Office Calc : Level 1Open Office Calc : Level 1
Open Office Calc : Level 1thinkict
 
Open Office Calc : Lesson 06
Open Office Calc : Lesson 06Open Office Calc : Lesson 06
Open Office Calc : Lesson 06thinkict
 
Open Office Calc : Lesson 05
Open Office Calc : Lesson 05Open Office Calc : Lesson 05
Open Office Calc : Lesson 05thinkict
 
Text Writer
Text WriterText Writer
Text Writerthinkict
 
Open Office Writer : Level2
Open Office Writer : Level2 Open Office Writer : Level2
Open Office Writer : Level2 thinkict
 
Open Office Writer : Level1
Open Office Writer : Level1 Open Office Writer : Level1
Open Office Writer : Level1 thinkict
 
Open Office Writer : Lesson 03
Open Office Writer : Lesson 03Open Office Writer : Lesson 03
Open Office Writer : Lesson 03thinkict
 
Open office Writer : Lesson 02
Open office Writer : Lesson 02Open office Writer : Lesson 02
Open office Writer : Lesson 02thinkict
 
Marking Grid_Web Communications
Marking Grid_Web CommunicationsMarking Grid_Web Communications
Marking Grid_Web Communicationsthinkict
 
Marking Grid_Computer Operations
Marking Grid_Computer OperationsMarking Grid_Computer Operations
Marking Grid_Computer Operationsthinkict
 
Marking Grid_AlphaTech
Marking Grid_AlphaTechMarking Grid_AlphaTech
Marking Grid_AlphaTechthinkict
 
Web Communications Brochure
Web Communications BrochureWeb Communications Brochure
Web Communications Brochurethinkict
 
Internet Operations Brochure
Internet Operations BrochureInternet Operations Brochure
Internet Operations Brochurethinkict
 
Computer Operations Brochure
Computer Operations BrochureComputer Operations Brochure
Computer Operations Brochurethinkict
 
AlphaTech Brochure
AlphaTech BrochureAlphaTech Brochure
AlphaTech Brochurethinkict
 
Internet Operations
Internet OperationsInternet Operations
Internet Operationsthinkict
 

More from thinkict (20)

Photostory
PhotostoryPhotostory
Photostory
 
Open Office Impress : Lesson 08
Open Office Impress : Lesson 08Open Office Impress : Lesson 08
Open Office Impress : Lesson 08
 
Open Office Calc : Level1
 Open Office Calc : Level1 Open Office Calc : Level1
Open Office Calc : Level1
 
Open Office Calc : Lesson 07
Open Office Calc : Lesson 07Open Office Calc : Lesson 07
Open Office Calc : Lesson 07
 
Open Office Calc : Level 1
Open Office Calc : Level 1Open Office Calc : Level 1
Open Office Calc : Level 1
 
Open Office Calc : Lesson 06
Open Office Calc : Lesson 06Open Office Calc : Lesson 06
Open Office Calc : Lesson 06
 
Open Office Calc : Lesson 05
Open Office Calc : Lesson 05Open Office Calc : Lesson 05
Open Office Calc : Lesson 05
 
Text Writer
Text WriterText Writer
Text Writer
 
Open Office Writer : Level2
Open Office Writer : Level2 Open Office Writer : Level2
Open Office Writer : Level2
 
Open Office Writer : Level1
Open Office Writer : Level1 Open Office Writer : Level1
Open Office Writer : Level1
 
Open Office Writer : Lesson 03
Open Office Writer : Lesson 03Open Office Writer : Lesson 03
Open Office Writer : Lesson 03
 
Open office Writer : Lesson 02
Open office Writer : Lesson 02Open office Writer : Lesson 02
Open office Writer : Lesson 02
 
Marking Grid_Web Communications
Marking Grid_Web CommunicationsMarking Grid_Web Communications
Marking Grid_Web Communications
 
Marking Grid_Computer Operations
Marking Grid_Computer OperationsMarking Grid_Computer Operations
Marking Grid_Computer Operations
 
Marking Grid_AlphaTech
Marking Grid_AlphaTechMarking Grid_AlphaTech
Marking Grid_AlphaTech
 
Web Communications Brochure
Web Communications BrochureWeb Communications Brochure
Web Communications Brochure
 
Internet Operations Brochure
Internet Operations BrochureInternet Operations Brochure
Internet Operations Brochure
 
Computer Operations Brochure
Computer Operations BrochureComputer Operations Brochure
Computer Operations Brochure
 
AlphaTech Brochure
AlphaTech BrochureAlphaTech Brochure
AlphaTech Brochure
 
Internet Operations
Internet OperationsInternet Operations
Internet Operations
 

Alpha Tech Module7 8 glossary

  • 1. Glossary Active Content Small program that gets installed on a computer while browsing the Internet. The basic function of active content is to provide an interactive Internet experience through videos and toolbars. Sometimes, active content is used to gain unauthorized access to a computer, and then damage the data stored on it or install malicious software on it. Back Up To make a duplicate copy of a program, a disk, or data. The duplicate copy is called a backup. Cache Memory Temporary memory on your computer that is sometimes used to store local copies of files opened when you browse the Internet. Computer Privacy Keeping a user’s data, including personal files and e-mail messages, such that the data is not accessible by anyone without appropriate permission. Computer Security The protection of a computer system and its data from accidental or intentional loss and tampering. Cookie A small file on a computer that is created when a user visits a Web site. A Web site uses cookies to identify users who visit the site, and also track the preferences of the users. Copyright A method of protecting the rights of an originator of a creative work, such as text, piece of music, painting, or computer program, through law. Decryption The process of reconverting the encrypted data into a readable and usable form. Encryption The process of converting data into an unreadable and unusable form. Encryption is done to prevent unauthorized access of data, especially during data transmission over the Internet. Firewall A filter that blocks unreliable information from the Internet before it reaches your computer or a private network. It provides additional protection against threats such as hackers and viruses. A firewall also helps to ensure computer privacy by restricting external access by any unauthorized user.
  • 2. Hacker A person who uses computer expertise to gain unauthorized access to a computer, and then misuses or tampers the programs and data stored on the computer. Intellectual Property Any information available on the Internet is an intellectual property, which is legally owned by the person who created it. The owner of an intellectual property has the exclusive rights to control the use of this information. Internet Service Provider (ISP) A company that provides Internet connectivity to individuals, businesses, and organizations. Libel Written defamation that has been published. Libel is a punishable offense. Online Predator An individual who develops contact with Internet users, through chat rooms, online forums, or e-mail, to exploit them financially or involve them in dangerous relationships. Password A unique string of characters that a user types in as an identification code. It is a security measure used to restrict access to computer systems and sensitive files. Phishing The act of extracting personal information, such as passwords and credit card details, from computer users and then use the information for malicious purposes. Plagiarism The act of copying someone’s work and using it as if it is your own work, without mentioning the source. Power surge A sudden increase in line voltage, which may lead to the damage of electronic devices, such as computers. Secure Sockets Layer (SSL) An Internet security protocol that ensures secure data communication by encrypting the information transmitted. The SSL protocol certifies that a Web site is genuine and ensures that the data provided to the site is not misused. Slander Verbal defamation. Slander is a punishable offense. Software Piracy Unauthorized copying of copyrighted software without obtaining the license or permission of its copyright owner is software piracy.
  • 3. Spam An irrelevant and unsolicited e-mail message sent by an unknown sender. A spam is sent to distribute a message to many recipients at one time. Spyware A computer program that is installed on your computer without your knowledge. Spyware can secretly send out information about your Web browsing habits or other personal details to another computer through the network. Trojan Horse A destructive computer program disguised as a game, utility, or software. When run, a Trojan horse does something harmful to the computer system while appearing to do something useful. Username The name by which a user is identified to a computer system or network. To access a computer protected by username and password, a user needs to enter the correct combination of username and password. Virus A computer program that is designed to cause malfunctioning of a computer or damage the data stored on the computer. Worm A computer program that propagates itself across computers, usually by creating copies of itself in each computer's memory. A worm might duplicate itself in one computer so often that it causes the computer to crash.