I was browsing the internet today and I found this very valuable resource. Just thinking of sharing it.
Internet Security is always an issue, not only to large corporations but also to individual users. It builds the confidence between business partnerships and and keeps your properties protected. also, Internet Security is a big part to one's overall security strategy and business solutions.
But the problem nowadays is that most of us is not knowledgeable of even the most common terms that internet security gives. I found this great site, Internet and Data Security Guide, which defines most of these terminologies that is very clear and concise. The following are just a few from the site:
Anti-spyware - An Anti Spyware software is similar to an Anti Virus, but it works on programs that don't try to take over your system, but instead pop up ads and unwanted messages.
Anti-virus - Software to deal with programs like computer viruses, worms, trojan horses and spyware. These programs are all characterised as being unwanted software that install themselves on your computer through deception.
In order to prevent damage by viruses and worms, users typically install antivirus software, which runs in the background on the computer, detecting any suspicious software and preventing it from running.
Authentication - The process for verifying that someone or something is who or what it claims to be. In private and public computer networks (including the Internet), authentication is generally done with passwords.
CSIA - The Cyber Security Industry Alliance is an international public policy advocacy group dedicated to ensuring the privacy, reliability and integrity of information systems.
Certificate - An encrypted file containing user or server identification information, which is used to verify identity and to help establish a security-enhanced link.
Cookie - A small data file that is stored on a user's local computer for record-keeping purposes and which contains information about the user that is pertinent to a Web site, such as user preferences.
Cracking - Finding a password by trying many combinations and words.
Cryptography - The practice and study of hiding information.
Decryption - The process of converting encrypted data back into its original form.
Email filter - Software that scans incoming email for spam or other unwanted material and filters it accordingly.
Encryption - The process of converting data into cipher text to prevent it from being understood by an unauthorized party.
Firewall - A firewall blocks any unauthorized ports on your computer, thus restricting unfettered access.
Hacker - Illegally breaking into systems or writing viruses and other malware.
Information security - The art and science of protecting computers and data from misuse.
Internet Security - The prevention of unauthorized access and/or damage to computer systems via internet access.
Malware - Malware can be classified as trojans with a limited payload and are often not detected by most antivirus software. They may require the use of other software designed to detect other classes of malware, including spyware
Password - A password is a secret word or phrase that gives a user access to a particular program or system.
Phishing - Phishing is when you receive an email that looks like it's from your bank, Paypal, or another site you use, and asking you to login to confirm your information.
The way this works is the attacker sets up a web site which mimics the target site, say a fake bank site, and then sends this phishing email to thousands of people, until one bites.
Then when the person tries to login, his login information is gathered by the bad guys and used to steal information or money.
The most basic rule is to never click a link in an email, never download from an untrusted source, and always type in the address of your financial sites to access them.
Spam - Unsolicited e-mail. Also known as junk e-mail.
Spyware - Software that runs on a computer without the explicit permission of its user. It often gathers private information from a user's computer and sends this data over the Internet back to the software manufacturer.
Trojan horses - Programs that conceal their true purpose or include a hidden functionality that a user would not want.
Viruses - Programs that can slow down system performance and cause strange system behavior and in many cases do serious harm to computers, either as deliberate, malicious damage or as unintentional side effects.
Worms - Programs characterised by having the ability to replicate themselves and viruses are similar except that they achieve this by adding their code onto third party software.
Once a virus or worm has infected a computer, it would typically infect other programs (in the case of viruses) and other computers.
I know that I listed a lot, but these terms are just the few that one needs to be informed of. So if you have time, go ahead and check it out. ^_^x
DISCLAIMER: The following definition was given by RuleWorks.co.uk and all credits goes to them. I do not guarantee that the content will be available by the time this post is read.
Thursday, November 13, 2008
Subscribe to:
Post Comments (Atom)
Information security uses cryptography to transform usable information into a form that renders it unusable by anyone other than an authorized user; this process is called encryption. Information that has been encrypted can be transformed back into its original usable form by an authorized user, who possesses the cryptographic key, through the process of decryption. Data security is the means of ensuring that data is kept safe from corruption and that access to it is suitably controlled. Thus data security helps to ensure privacy. It also helps in protecting personal data.
ReplyDelete-------------------------
hesslei...........
white hat seo