A Guide to Internet Security Terms

21 02 2008

Every Internet user should at least have a basic understanding of the terms used in regard to online security and so I have collected a few of the popular ones and put them in this article with a brief explanation of each.

Adware means “Advertising Supported Software”. It refers to placing adverts in software or distributing them along side a software download.

Bots are software applications that run automated tasks over the internet. Bots perform tasks that are both simple and structurally repetitive,virus internet worm at a much higher rate than would be possible for a human editor alone.

Cross-site scripting This is a method of placing malicious scripts on websites that are then “executed” inside the web browser of the person viewing the website. These scripts can be dangerous at times.

DDos stands for Distributed Denial of Service. A DDoS attack attempts to consume the target resources so that it can not provide the service. In plain English this means a website can be brought down by aiming 1,000’s of page requests a minute until the website can no longer cope and fails!

A drive-by download is a program that is involuntarily downloaded to your computer, without your permission or even your awareness. A drive-by download can be commenced by simply visiting a Web site or viewing an HTML e-mail message.

Exploit This is name given to any process that seeks to take advantage of a code vulnerability, usually in a web browser such as Internet Explorer or FireFox.

Firewall In its simplest form it is a software security mechanism that prevents unwanted/unauthorized internet traffic from entering your computer. A firewall can also block software on your computer from sending out data as well. Having a software firewall on your computer is ESSENTIAL if you are connected to the Internet.

A keylogger is a small program that monitors each keystroke a client types on a specific computer’s keyboard. Keyloggers can steal valuable information that can allow a thief access to your online banking account etc.

Malware is software that is designed to damage a computer system without the owner’s informed permission. It is a combination of the words malicious and software. The expression is a general term used by computer professionals to mean a variety of forms of hostile, intrusive, or annoying software or program code.

Phishing is the act of deception by giving someone secret information or tricking them into doing somewhat that they normally wouldn’t do or shouldn’t do. For example: distributing e-mails to a number of users falsely claiming to be your bank etc.. in an endeavor to cheat the users into yielding private information like passwords. The latest versions of Internet Explorer 7 and FireFox 2 have built in phishing filters to help spot this kind of activity.

Root Kit is a set of tools that hackers embed in a victim’s computer. They can act as a “back door” entrance onto your computer and provide information for the person who put them there. These tools have been especially designed to allow malicious processes/applications to run on your computer but evade detection.

Spyware is any technology that assists in collection of information about a computer user without their knowledge. Spyware is software that is put in someone’s computer to secretly gather information about the user and relay it to advertisers or other interested parties. Spyware can get in a computer as a virus or as the result of installing a new program. If you have some annoying advertising that appears on your computer all the time you are likely infected with a spyware application.

Trojan is a software application that installs malicious software while under the guise of doing something else. These are nasty things to get infected by and are used to steal data from you as you use your computer!

Virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user. A virus can only spreadvirus internet worm from one computer to another when its host is taken to the uninfected computer, for instance by a user sending it over a network or carrying it on a removable medium such as a CD, USB drive or by the Internet and eMail. Not all viruses are harmful BUT they all cause problems on the infected PC.

Worm is similar to a virus but with a different implementation. It is a self-replicating computer program. It uses a network to send copies of itself to other PC’s and it may do so without any user intervention. Unlike a virus, it does not need to attach itself to an existing program. Worms can bring a PC down to the point where it is impossible to use it because it it too slow. Worms can also harm a company network by consuming most of the available network bandwidth, so that the connected PC’s can not speak with each other.

A zero-day exploit is the one that takes advantage of security vulnerability on the same day that the vulnerability becomes generally known. Ordinarily, after someone detects that a software program contains a potential exposure to exploitation by a hacker that person or company can notify the software company and sometimes the world at large so that action can be taken to repair the exposure or defend against its exploitation.

Zombie is a program that secretly takes over another Internet attached computer and then uses that computer to launch attacks that are difficult to trace. Zombies are typically used in denial of service attacks (DOS), typically against targeted Websites. 10,000 zombie PC’s can be used in a single attack! What usual happens is a criminal gang will approach the “owner” of the zombie PC’s and pay them to perform an “attack.”

However you can generally remain safe if you:

Use an up to date AntiVirus package, AntiSpyware package, make sure your Windows Firewall is on and have Windows Updates set to automatically receive any updates from Microsoft as they become available.

In addition if you have not yet moved to Internet Explorer 7 or FireFox 2, from an older version, do so now!

Advertisements

Actions

Information

4 responses

18 09 2014
Carmon

Excellent website you have here but I was curious about if
you knew of any community forums that cover the same topics discussed in this article?

I’d really love to be a part of group where I
can get comments from other experienced people that share the same interest.
If you have any recommendations, please let me know.
Cheers!

24 05 2015
Violette

Hey there Facebook operates fine but your website is running steadily which went on approximately a few minutes to successfully
load up, I don’t know whether it’s my very own issue or maybe your site problem.
Around the other hand thanks for creating terrific article.

I guess it really has already been useful to a lot of people who came on this page.
This one is undoubtedly terrific what you actually
have implemented and would like to discover more interesting content by you.
I now have your site bookmarked to see blogs you post.

27 07 2015
dota2hack.org

Greetings Google and yahoo works fine yet your website is loading steadily which actually went on close to one minute to load, I am not sure whether it’s my own problem
or maybe your website problem. Well, Thank you for writing an incredibly great blog post.

I guess this has become beneficial to lots of individuals .
I really hope I’ll be able to find more amazing stuff and I also should certainly complement by stating you
have carried out wonderful job. Immediately after taking a look at your blog post, I’ve bookmarked your
web site.

15 08 2015
www.gta5ios.com

Hello there! Your site is loading lagging , this kind of went on like a minute or two
to successfully load, I personally dont know if it’s just me
or maybe your web site but google and yahoo worked fine for me.
Anyways, Thanks for publishing such type of fabulous article.
Most people who actually discovered this site really should have noticed this
informative article literally handy. This one is actually
fantastic what you actually have implemented and wish to check out more
fascinating content from you. To obtain more information through articles which you write-up, I actually have book marked
this url.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s




%d bloggers like this: