Pages

Monday, December 30, 2013

Data Security Guide:Common Technical and Legal Terms — A Glossary

TermExplanation
AdwareA type of software that often comes with free downloads. Some adware displays ads on your computer, while some monitors your computer use (including websites visited) and displays targeted ads based on your use.
Anti-virus softwareSoftware that protects your computer from viruses that can destroy your data, slow your computer's performance, cause a crash, or even allow spammers to send email through your account.
BookmarkA web browser feature that allows you to save the addresses of interesting or frequently used websites, so that you can readily revisit them.
BroadbandA number of different methods used for high speed Internet access such as DSL, cable modems, fiber optics, and mobile wireless, all of which are permanently connected to the Internet through different means.
Browser hijackerA common spyware program that changes your web browser's home page without the user's knowledge, even if you change it back.
CacheA form of computer memory that allows you to quickly access stored information, such as web addresses you've recently typed into your browser. Pronounced "cash."
CookiesA small text file that a website can place on your computer's hard drive to collect information about your activities on the site or to allow the site to remember information about you and your activities.
Data security incidentA situation in which you believe that electronic data that contains personal information (see definition) may have been improperly accessed or acquired.
DomainA segment of Internet space, denoted by the function or type of information it includes; current domains include ".com" for commercial sites, ".gov" for governmental ones, and ".org" for non-commercial organizations.
Drive-by downloadSoftware that installs on your computer without your knowledge when you visit certain websites. To avoid drive-by downloads, make sure to update your operating system and web browser regularly.
DSLDigital Subscriber Line: A type of high speed Internet using standard phone lines and the local telephone network. DSL is almost always slower than cable modem or fiber optics.
EncryptionThe scrambling of data into a secret code that can be read only by software set to decode the information.
EndpointAny computer desktop, laptop, or server.
Extended Service Set Identifier (ESSID)The name a manufacturer assigns to a router. It may be a standard, default name assigned by the manufacturer to all hardware of that model. Users can improve security by changing to a unique name. Similar to a Service Set Identifier (SSID).
FilterSoftware that screens information on the Internet, classifies its content, and allows the user to block certain kinds of content.
FirewallHardware or software that helps keep hackers from using your computer to send out your personal information without your permission. Firewalls watch for outside attempts to access your system and block communications to and from sources you don't permit.
FTC The Federal Trade Commission. See www.ftc.gov.
GLBAThe Financial Modernization Act of 1999, also known as the Gramm-Leach-Bliley Act. Pub. L. 106-102, codified at 15 U.S.C. §§ 6801-6809 and §§ 6821-6827 as amended. A full copy of the Act is available at http://www.gpo.gov/fdsys/pkg/PLAW-106publ102/pdf/PLAW-106publ102.pdf
HackerSomeone who uses computers and the Internet to access other people's computers without permission.
HardwareThe mechanical parts of a computer system, including the central processing unit (CPU), monitor, keyboard, and mouse, as well as other equipment like printers and speakers.
HIPAAThe Health Insurance Portability and Accountability Act. Pub. L. 104-191, 110 Stat. 1936, codified at 29 U.S.C. §§ 1181, 1320, 1395. A full copy of the Act is available at www.cms.hhs.gov/HIPAAGenInfo/Downloads
/HIPAALaw.pdf
HTTP (Hypertext Transfer Protocol)The standard language that computers connected to the World Wide Web use to communicate with each other.
Internet Protocol (IP)The computer language that allows computer programs to communicate over the Internet.
IP addressA computer's "address," it consists of a series of numbers separated by periods.
Keystroke loggerA device or program that records each keystroke typed on a particular computer.
LAN (Local Area Network)A network of connected computers that are generally located near each other, such as in an office or company.
MalwareA combination of the terms "malicious" and "software," used to describe any software designed to 'infect' a single computer, server, or computer network. Malware includes malicious software, such as viruses, Trojans, key loggers, spyware, etc — programs used to steal sensitive data. Once in your computer, they can steal information, send spam, and commit fraud.
Media Access Control (MAC) addressA unique number that the manufacturer assigns to each computer or other device in a network.
Monitoring softwarePrograms that allow a parent or caregiver to monitor the websites a child visits or email messages he or she reads, without blocking access.
NetworkA group of two or more computers that are able to communicate with one another.
Online banking credentialsThe unique identification used by consumers when they are accessing systems that transmit financial data. These credentials often include, but are not limited to, a username, password, smart card, token, or a biometric.
Online profilingCompiling information about consumers' preferences and interests by tracking their online movements and actions in order to create targeted ads.
Operating systemThe main program that runs on a computer. An operating system allows other software to run and prevents unauthorized users from accessing the system. Major operating systems include UNIX, Windows, MacOS, and Linux.
P2P, peer-to-peerA method of sharing files, usually music, games, or software, with other users through a sharing program that allows uploading and downloading files from other users online. Caution should be used — P2P files are often misrepresented and can contain offensive material, malware, viruses, or other unintended items.
PCIThe term "PCI" stands for Payment Card Industry.
PCI Data Security StandardThis refers to a data security standard promulgated by members of the payment card industry. Additional information about the PCI Data Security Standard can be found at www.pcisecuritystandards.org.
Personal digital assistant (PDA)A handheld device that combines various forms of traditional computer and telecommunications products. Common examples are BlackBerry phones, iPhones, and other smartphones.
Personal information or Personally Identifiable Information (PII)Information that can identify you, like your bank and credit card account numbers; your Social Security number (SSN); or your name, address, phone numbers, email addresses, or date of birth.
PhishingA scam that involves Internet fraudsters who send spam or pop-up messages through email or social media to lure personal information (credit card numbers, bank account information, Social Security numbers, passwords, or other sensitive information) from unsuspecting victims.
RAMShort-hand for "Random Access Memory," it's the hardware inside your computer that retains memory on a short-term basis and stores information while you work.
RouterA device that connects two or more networks. A router finds the best path for forwarding information across the networks.
Secure Socket Layer (SSL)A protocol developed for transmitting private documents via the Internet.
Sock puppetA secret alias used by a member of an Internet community, but not acknowledged by that person.
SoftwareA computer program with instructions that enable the computer hardware to work. System software — such as Windows or MacOS — operate the machine itself, and applications software — such as spreadsheet or word processing programs — provide specific functionality.
SpamUnsolicited commercial email, often sent in bulk quantities.
Spam zombiesHome computers that have been taken over by spammers without the consent or knowledge of the computer owner. The computers are then used to send spam in a way that hides the true origin.
SpammerSomeone who sends unsolicited commercial email, often in bulk quantities.
SpywareA software program that may be installed on your computer without your consent to monitor your use, send pop-up ads, redirect your computer to certain websites, or record keystrokes, which could lead to identity theft.
TrojansPrograms that, when installed on your computer, enable unauthorized people to access it and sometimes to send spam from it.
Universal Serial Bus (USB)A connection standard that allows data to be transferred between a computer and a peripheral device such as a mouse, a keyboard, or an external hard drive. The USB port, has largely replaced the serial port and the parallel port found on older products.
VirusA program that can sneak onto your computer — often through an email attachment — and then make copies of itself, quickly using up all available memory.
Wi-Fi protected access (WPA)A security protocol developed to fix flaws in WEP. Encrypts data sent to and from wireless devices within a network.
Wired equivalent privacy (WEP)A security protocol that encrypts data sent to and from wireless devices within a network. Not as strong as WPA encryption.
Wireless networkA method of accessing high speed Internet without the computer being linked by cables.
WormA program that reproduces itself over a network and can use up your computer's resources and possibly shut your system down