Term
|
Definition
In Windows 2000/XP/Vista, an account that grants to the administrator(s) rights and permissions to all hardware and software resources, such as the right to add, delete, and change accounts and to change hardware configurations. |
|
|
Term
|
Definition
Software installed on a computer that produces pop-up ads using your browser; the ads are often based on your browsing habits. |
|
|
Term
|
Definition
Utility programs that prevent infection or scan a system to detect and remove viruses. McAfee Associates' VirusScan and Norton AntiVirus are two popular AV packages. |
|
|
Term
|
Definition
The process of proving an individual is who they say they are before they are allowed access to a computer, file, folder, or network. The process might use a password, PIN, smart card, or biometric data. |
|
|
Term
|
Definition
Controlling what an individual can or cannot do with resources on a computer network. Using Windows, authorization is granted by the rights assigned to user accounts and permissions assigned to computer resources. |
|
|
Term
|
Definition
A hidden way to allow malware to reach the system in secret even after the malware has been removed. |
|
|
Term
|
Definition
A Windows user account that can back up and restore any files on the system regardless of its having access to these files. |
|
|
Term
|
Definition
A utility in Windows Vista Ultimate and Enterprise editions that is used to lock down a hard drive by encrypting the entire Vista volume and any other volume on the drive. |
|
|
Term
|
Definition
An infectious program that can replace the boot program with a modified, infected version, often causing boot and data retrieval problems. |
|
|
Term
|
Definition
A malicious program that infects your Web browser and can change your home page or browser settings. It can also redirect your browser to unwanted sites, produce pop-up ads, and set unwanted bookmarks. Also called a home page hijacker. |
|
|
Term
CHAP (Challenge Handshake Authentication Protocol) |
|
Definition
A protocol used to encrypt account names and passwords that are sent to a network controller for validation. |
|
|
Term
|
Definition
Categories of data used to determine who owns the data and who needs what type of access to it. |
|
|
Term
|
Definition
A code used to authenticate the source of a file or document or to identify and authenticate a person or organization sending data over a network. The code is assigned by a certificate authority such as VeriSign and includes a public key for encryption. Also called digital ID or digital signature. |
|
|
Term
|
Definition
A password stored on a hard drive. You must enter the password at startup before you can access data on the drive. The password is set using BIOS setup screens. |
|
|
Term
Encrypted File System (EFS) |
|
Definition
A way to use a key to encode a file or folder on an NTFS volume to protect sensitive data. Because it is an integrated system service, EFS is transparent to users and applications. |
|
|
Term
|
Definition
The process of putting readable data into an encoded form that can only be decoded (or decrypted) through use of a key. |
|
|
Term
|
Definition
A virus that inserts virus code into an executable program file and can spread whenever that program is executed. |
|
|
Term
|
Definition
A program that AV software recognizes to be potentially harmful or potentially unwanted. |
|
|
Term
|
Definition
A user account that has limited permissions on a system and cannot make changes to it. Guest user accounts are intended for onetime or infrequent users of a workstation. |
|
|
Term
|
Definition
A report your organization might require to report unusual or atypical events. |
|
|
Term
|
Definition
Any unwanted program that is transmitted to a computer without the user's knowledge and that is designed to do varying degrees of damage to data and software. There are a number of different types of infestations, including viruses, Trojan horses, worms, and logic bombs. See malicious software. |
|
|
Term
|
Definition
A protocol used to encrypt account names and passwords that are sent to a network controller for validation. Kerberos is the default protocol used by Windows 2000/XP/Vista. |
|
|
Term
|
Definition
A device, such as a type of smart card, that can fit conveniently on a key chain. |
|
|
Term
|
Definition
A type of spyware that tracks your keystrokes, including passwords, chat room sessions, e-mail messages, documents, online purchases, and anything else you type on your PC. Text is logged to a text file and transmitted over the Internet without your knowledge. |
|
|
Term
|
Definition
Windows XP user accounts known as Users in Windows 2000, which have read-write access only on their own folders, read-only access to most system folders, and no access to other users' data. In Windows Vista, a standard account is a limited account |
|
|
Term
|
Definition
A type of malicious software that is dormant code added to software and triggered at a predetermined time or by a predetermined event. |
|
|
Term
|
Definition
A small sequence of commands, contained within a document, that can be automatically executed when the document is loaded, or executed later by using a predetermined keystroke. |
|
|
Term
|
Definition
A virus that can hide in the macros of a document file. |
|
|
Term
|
Definition
Any unwanted program that is transmitted to a computer without the user's knowledge and that is designed to do varying degrees of damage to data and software. Types of infestations include viruses, Trojan horses, worms, adware, spyware, keyloggers, browser hijackers, dialers, and downloaders. Also called malware or an infestation. |
|
|
Term
|
Definition
See malicious software. Any unwanted program that is transmitted to a computer without the user's knowledge and that is designed to do varying degrees of damage to data and software. Types of infestations include viruses, Trojan horses, worms, adware, spyware, keyloggers, browser hijackers, dialers, and downloaders. Also called malware or an infestation. |
|
|
Term
|
Definition
A combination of a boot sector virus and a file virus. It can hide in either type of program. |
|
|
Term
|
Definition
Mounting a drive to a computer, such as drive E, that is actually hard drive space on another host computer on the network. |
|
|
Term
|
Definition
A type of password that can contain a phrase where spaces are allowed. A passphrase is stronger than a one-word password. |
|
|
Term
|
Definition
A device that holds a copy of the Windows password. Vista allows the device to be a flash media, but XP expects the device to be a floppy disk. |
|
|
Term
|
Definition
Refer to the user accounts or user groups allowed to access data. Varying degrees of access can be assigned to a folder or file including full control, write, delete, or read-only. |
|
|
Term
|
Definition
A type of identity theft where a person is baited into giving personal data to a Web site that appears to be the Web site of a reputable company with which the person has an account. (2) Sending an e-mail message with the intent of getting the user to reveal private information that can be used for identify theft. |
|
|
Term
PKI (Public-key Infrastructure |
|
Definition
The standards used to encrypt, transport, and validate digital certificates over the Internet. |
|
|
Term
|
Definition
A Windows XP account type that can read from and write to parts of the system other than the user's own folders, install applications, and perform limited administrative tasks. |
|
|
Term
|
Definition
An encryption technology that uses a public key and private key. The public key must be shared with others so they can use it to encrypt data that you can later decrypt by using your private key. |
|
|
Term
|
Definition
A type of malicious software that loads itself before the OS boot is complete and can hijack internal Windows components so that it masks information Windows provides to user-mode utilities such as Windows Explorer or Task Manager. |
|
|
Term
|
Definition
E-mail sent by a scam artist intended to lure you into a scheme. |
|
|
Term
|
Definition
A type of virus that hides in a script which might execute when you click a link on a Web page or in an HTML e-mail message, or when you attempt to open an e-mail attachment. |
|
|
Term
|
Definition
Any small device that contains authentication information that can be keyed into a logon window or read by a reader to authenticate a user on a network. |
|
|
Term
|
Definition
A device that can read a smart card used to authenticate a person onto a network. |
|
|
Term
|
Definition
The practice of tricking people into giving out private information or allowing unsafe programs into the network or computer. |
|
|
Term
|
Definition
Junk e-mail you don't ask for, don't want, and that gets in your way. |
|
|
Term
|
Definition
Malicious software that installs itself on your computer to spy on you. It collects personal information about you that it transmits over the Internet to Web-hosting sites that intend to use your personal data for harm. |
|
|
Term
|
Definition
The Vista user account type that can use software and hardware and make some system changes, but cannot make changes that affect the security of the system or other users. |
|
|
Term
|
Definition
A password that is not easy to guess. |
|
|
Term
TPM (Trusted Platform Module) chip |
|
Definition
A chip on a motherboard that holds an encryption key required at startup to access encrypted data on the hard drive. Vista BitLocker Encryption can use the TPM chip |
|
|
Term
|
Definition
A type of infestation that hides or disguises itself as a useful program, yet is designed to cause damage when executed. |
|
|
Term
|
Definition
A program that often has an incubation period, is infectious, and is intended to cause damage. A virus program might destroy data and programs or damage a disk drive's boot sector. |
|
|
Term
|
Definition
E-mail that does damage by tempting you to forward it to everyone in your e-mail address book with the intent of clogging up e-mail systems or by persuading you to delete a critical Windows system file by convincing you the file is malicious. |
|
|
Term
|
Definition
An infestation designed to copy itself repeatedly to memory, on drive space or on a network, until little memory, disk space, or network bandwidth remains. |
|
|
Term
|
Definition
A utility provided by a hard drive manufacturer that fills every sector on the drive with zeroes. |
|
|