Glossary of Security Terms

 

 

 A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z


A
Access Control
Access control is a function of security management that ensures only authorized users have access to resources they are entitled to.


Advanced Encryption Standard (AES)
AES is a powerful encryption standard used today in securing confidential information.  AES makes use of 128-bit and 256-bit encryption keys which are extremely difficult to break and are therefore considered to be very secure.


Anti-Virus (AV)
An anti-virus program is software that has been designed to detect, isolate (quarantine) and/or remove computer viruses from an infected system.  AV software uses virus signatures to recognize malicious code.


Authentication
The process of validating that a user, computer, service or process is who or what it claims to be.  The presentation of a username and password is the most common means of authentication used today.


Authorization
Authorization is the process where a user is granted access to a particular resource or set of resources.  Authorization is given via a set of rights or permissions to a particular resource (e.g. file, folder, printer, etc.)


Availability
The final third of the CIA triad, availability ensures that authorized users will have access to a resource as and when they require it.



B

Biometrics
Biometrics involves using a physical characteristic such as a fingerprint, voiceprint, or retinal pattern, in order to uniquely identify an individual.  Biometrics is increasingly becoming a central component of multi-factor authentication.


Bots
Also known as Internet bots and web bots, this usually malicious software is used by an attacker to run automated tasks over the Internet.  While some types of bots are used for friendly purposes, the majority are used to infect large numbers of computers for various criminal purposes that typically include infecting even more computers and launching coordinated Denial of Service  attacks or phishing campaigns. Bot-infected computers are commonly referred to as "zombie computers."


Botnets
Global networks of bot-infected computers.  With a botnet, a malicious individual is able to control tens of thousands of computers.  Most uses of botnets today involve criminal activities.  Botnets largely owe their success to the vast number of unprotected or inadequately protected computers connected to the Internet.


Brute Force Attack
A method employed by cyptanalysts or hackers that uses an exhaustive procedure to try all possibilities, one by one.  This process is used to gain unauthorized access to someone's account.  A common objective for this type of attack is password guessing.


Back to Top ^


C

CIA
This acronym stands for Confidentiality, Integrity and Availability.  The ultimate goal of computer and network security is to ensure that only authorized users have access to private and confidential information; that any changes to that information are made only by those authorized to do so, and that information is available to those authorized users when required.


Confidentiality
The initial third of the CIA triad, confidentiality ensures that only authorized users have access to confidential, private information.



D

Denial of Service (DoS) Attack
A common type of attack where a network resource such as a server is flooded with spurious requests to the point where it is unable to respond to legitimate requests.  Web servers are often the target of such attacks.  The end result is that the server "crashes" and is no longer able to serve up the web pages it provides.


Distributed Denial of Service (DDoS) Attacks
A method employed by malicious individuals where DoS attacks are coordinated and launched from multiple sources in order to incapacitate the target server or servers.


Drive-by Downloads
A drive-by download attack can take place when a web browser automatically downloads malware from a compromised web site.  This malicous software could range from rogue security software such as fake anti-virus programs, to keystroke loggers.  The process of downloading and installation takes place without the knowledge or interaction of the victim.



E

Encryption
A method of taking information that is readable and making it unreadable.  Encryption uses a set of mathematical rules or algorithms to transform clear text into an unreadable format (cipher text).  Encryption is an effective way of safeguarding important and confidential information.



F

Firewall
A system designed to prevent unauthorized access to a network or computer resource.  Firewalls can be hardware, software, or a combination of both.  Firewalls monitor the flow of information in or out of a network and either allow or disallow passage of that information based on a set of rules.  Firewalls are an important line of defense between private networks and the Internet.



Back to Top ^


I

Identity
In simple terms, identity is who someone is or what something is.  For individuals, identity is a set of characteristics and information that uniquely identifies a person.  Characteristics can include height, eye color, hair color, and skin color.  Information could include name, address, date of birth, or Social Insurance number.  In a network setting, identity is associated with an unique user name.


Identity Theft
Identity theft occurs when someone uses another person's profile in order to represent themselves as that person.  This usually occurs in the context of using another person's identity for fraudulent gain.  Identity theft is a growning problem in our digital age.  Therefore, it is more important that ever to protect personally identifiable information and prevent it from getting into the wrong hands.


Integrity
The middle third of the CIA triad, integrity is the assurance that information has not been altered by anyone other than those who have been authorized to do so.


Back to Top ^


M


Malware (Malicious Software)
Malware is the collective name for any malicious code or program that can be inadvertantly or surrepticiously downloaded and installed.  Common malware applications include viruses, worms, Trojan horses, and logic bombs.  Sources of malware include email attachments, Instant Messaging, infected documents, certain applications downloaded from the Internet, and external media such as USB flash drives.


Multi-Factor Authentication
By themselves, passwords often do not provide a strong level of security.  Multi-factor authentication adds extra requirements in order to provide secure access.  Multi-factor authentication combines something you know (i.e. a password or PIN) with something you have (i.e. a token or smartcard) and/or something you are (i.e. a fingerprint or voiceprint).



P

Patch
A patch is a segment of code which vendors develop in order to fix a bug or vulnerability that has been discovered in a software program.  An example of patching for Windows users is the Automatic Update feature which downloads and installs the latest security patches for Windows and internet Explorer.  It is a good practice to ensure that patching is kept up to date.


Personally Identifiable Information (PII)
PII, or personally identifiable information, is information that uniquely identifies an individual.  Such information can include, but is not limited to, full name, date of birth, address, Social Insurance number, credit card numbers, banking information, etc.  Because identity theft is rampant in this day and age, it is extremely important to protect this type of information and prevent it from getting into the hands of malicious individuals.


Phishing
A common exploit where malicious individuals use email, or more recently, compromised web sites, to misrrepresent themselves as legitimate sources to gain confidential, personally identifiable information such as credit card numbers, bank account details, etc..  Phishing relies on social engineering and, to a large extent, the gullibility of the recipient to reveal PII or to follow links that direct them to malicious web sites.



S

Social Engineering
A means of gaining confidential information, or unauthorized access, by tricking or conning an individual.  Social engineering is both an art and a science that malicious people employ to gain the confidence of an unsuspecting person in order to get them to reveal details such names, phone numbers, account names and passwords.



T

Trojan Horse
A type of malware that is concealed in otherwise seemingly desireable and/or harmless software.  Trojan viruses often contain code that allows control of a computer by someone other than the computer's owner, usually for criminal related activities.


Back to Top ^


V

Virus
A virus is a segment of malicious code that, when downloaded, adversely affects computer systems.  Once embedded in a system, the virus code is executed as per its programming.  There are many different types and classes of viruses.  Viruses are commonly downloaded via email and instant messaging programs.  In most cases, the victim is totally unaware that they have been infected until it is too late.  This is why having a good anti-virus program installed and kept up to date is so important.


Virus Signature
A virus signature is the binary pattern or code string that uniquely identifies a particular virus.  AV programs use virus signatures in order to detect the presence of known viruses.


Vulnerability
A vulnerability is a weakness or gap in a program or system that can be exploited by malicious individuals in order to gain unauthorized access and/or to compromise computer, network, and information resources.



W

Worm
A mailcious segment of code that infects a computer much like a virus does.  In many ways, worms are much more sophisticated than viruses and are able to replicate themselves from one system in order to infect many other systems.



Z

Zero Day Attacks
A measurement called "latency" is the length of time between when a vulnerability is discovered and when an exploit for that vulnerability is created and distributed.  In a "zero day" attack, there is no latency.  In other words, a vulnerabiltiy is exploited within mere hours of its discovery.


Zombie Computer
A computer that has been compromised by a bot for the purpose of conducting automated (usually malicious) activities via the Internet.


Back to Top ^
Online Safety Tips

It goes without saying that online safety is becoming increasingly important.

While technology can help provide a safer online experience, ultimately you are responsible for your own protection.

With that in mind, IT blogger, Ed Bott, has written a great article entitled “Stay Safe Online: 5 Secrets Every PC (and Mac) Owner Should Know.”

In summary, those 5 tips are:

 1. Don't panic 
2. Stay up to date 
 3. Learn how to make smart trust decisions (how to spot scams) 
 4. Never install any software unless you're certain it's safe 
5. Be smart with passwords
 You can find the full article at http://zd.net/otVXmB
 
Twitter Facebook Linkedin Flikr UFV on Google+ YouTube goUFV