Key Terms
Adware: A computer program used to track users' online activities and deliver targeted pop-up ads to users (Maras, 2014).
Application: An application program is a comprehensive, self-contained program that performs a particular function directly for the user (Application Program, n.d.).
Authentication: A process whereby the original data is compared to a copy of the data to determine if the two are exactly the same (Maras, 2014).
Computer virus: A software program that is designed to spread, through user activity, to other computers and to damage or disrupt a computer, by attaching itself (or piggybacking) on files or programs (Maras, 2014).
Computer worm: A type of malware that does not need to piggyback on a file or program to replicate itself or require user activity to make copies of itself and spread (Maras, 2014).
Cookie: A file created by a website that is stored on a user's computer hard drive when he or she visits that particular website (Maras, 2014).
Copyright Infringement: The unlawful copying of movies, TV shows, music, software, literature, and video games; also known as piracy (Maras, 2014).
Data mining: The process of sorting and sifting through vast quantities of data to find valuable information (Maras, 2014).
Decryption: The transformation of ciphertext (encrypted text) into plaintext (unencrypted text) (Maras, 2014).
Encryption: A means of physically blocking third-party access to a file, either by using a password or by rendering the file or aspects of the file unusable (Maras, 2014).
Ethernet: Ethernet is an array of networking technologies and systems used in local area networks (LAN), where computers are connected within a primary physical space (Ethernet, n.d.).
Firewall: A computer security program that blocks incoming network traffic based on certain predetermined criteria (Maras, 2014).
Hacking: Unauthorized intrusion into computers (Maras, 2014).
HTTP: Hypertext Transfer Protocol; a protocol used to transmit files, including web pages, across the Internet or a network (Maras, 2014).
Internet Protocol (IP) address: A unique identifier assigned to a computer by the Internet service provider when it connects to the Internet (Maras, 2014).
Keylogger: A type of spyware that records every keystroke of the user and reports this information back to its source (Maras, 2014).
MAC address: Media access control address; a unique identifier that is used to connect a computer to a network (Maras, 2014).
Malware: Malicious software that causes damage to a computer or invades a computer to steal information from it; includes computer viruses, worms, Trojan horses, spyware, and botnets (Maras, 2014).
Man-in-the-middle attacks: A type of computer attack in which the offender hijacks a TCP connection between a client and a server, and eavesdrops on their communication (Maras, 2014).
Metadata: Data about data (Maras, 2014).
Multi-Factor Authentication (MFA): Multi-factor authentication (MFA) is a security mechanism in which individuals are authenticated through more than one required security and validation procedure (Multi-Factor Authentication (MFA), n.d.).
Multimedia Messaging Service (MMS): Messages containing a combination of text, images, videos, and sound (Maras, 2014).
Networked computer: A computer that is connected to one or more computers in a manner that allows them to share data, software, and hardware (Maras, 2014).
Network traffic: Data in a network (Maras, 2014).
Password Manager: A password manager is a software application that is used to store and manage the passwords that a user has for various online accounts and security features. Password managers store the passwords in an encrypted format and provide secure access to all the password information with the help of a master password (Password Manager, n.d.).
Phishing: A type of cybercrime in which individuals deceive others by posing as legitimately established enterprises so as to steal communication users' valuable personal information, such as account data and credit card information (Maras, 2014).
Pharming: A type of scam in which the offender creates a website that looks identical to an authentic website; the mirror website carries a malicious payload (Maras, 2014).
Piracy: See Copyright Infringement.
Pop-Up Ads: Pop-up ads are a form of online advertising focused on attracting Web traffic. There is no standard size or shape of the window for pop-up ads. Pop-up ads often appear to be standalone websites, sponsored web pages, interactive games or some other form that is likely to get people to interact. One of the features of pop-up ads is that visitors need to close them before proceeding, and this ensures that the message in the pop-up ad is viewed. A pop-up window can also contain a game, audio or video to entice users (Pop-Up Ad, n.d.).
Short Message Service (SMS): Text messages (Maras, 2014).
Sniffer: A type of software that is used to monitor and analyze networks, but can also be used to collect individuals' usernames, passwords, and other personal information (Maras, 2014).
Spam: Junk email that fills up individuals' email accounts and may be used to commit online fraud (Maras, 2014).
Spyware: A type of malware that enables the remote monitoring of a computer user's activities or information on an individual's computer where this software has been installed. It may also secretly gather information on users without their knowledge and relay it to interested third parties (Maras, 2014).
Tor: An anonymous Internet communication system that provides individuals (and organizations) the ability to share information and communicate over public networks without compromising their privacy (Maras, 2014).
Torrenting: Torrenting is the act of using BitTorrent, a peer-to-peer file-sharing protocol that enables massive distribution of files over the Internet. It allows users to share very large files like movies, books, and TV shows (BitTorrent, n.d.).
Trojan horse: A type of malware that tricks the computer user into thinking that it is legitimate software, but actually contains hidden functions. When the computer user downloads and installs the program, these hidden functions are executed along with the software (Maras, 2014).
USB Devices: Any peripheral device like a keyboard or media player that uses the USB interface to connect to a personal computer.
Virtual Private Network (VPN): A virtual private network (VPN) is a private network that is built over a public infrastructure. Security mechanisms, such as encryption, allow VPN users to securely access a network from different locations via a public telecommunications network, most frequently the Internet (Virtual Private Network (VPN), n.d.).
Vishing: Voice phishing; a type of fraud that occurs via voice or text messages sent to cell phones (Maras, 2014).
WiFi: Wi-Fi is a type of wireless network technology used for connecting to the Internet (Wireless Fidelity, n.d.).
References:
Application Program. (n.d.). In Techopedia. Retrieved from https://www.techopedia.com/definition/5635/application-program Links to an external site.
BitTorrent. (n.d.). In Techopedia. Retrieved from https://www.techopedia.com/definition/1865/bittorrent Links to an external site.
Links to an external site.Ethernet. (n.d.). In Techopedia. Retrieved from https://www.techopedia.com/definition/5280/ethernet Links to an external site.
Maras, M. H. (2014). Computer Forensics: Cybercriminals, Laws and Evidence. 2nd Ed.
Multi-Factor Authentication (MFA). (n.d.). In Techopedia. Retrieved from https://www.techopedia.com/definition/13657/multi-factor-authentication-mfa Links to an external site.
Password Manager. (n.d.). In Techopedia. Retrieved from https://www.techopedia.com/definition/31435/password-manager Links to an external site.
Virtual Private Network (VPN). (n.d.). In Techopedia. Retrieved from https://www.techopedia.com/definition/4806/virtual-private-network-vpn Links to an external site.
Wireless Fidelity (Wi-Fi). (n.d.). In Techopedia. Retrieved from https://www.techopedia.com/definition/10035/wireless-fidelity-wi-fi Links to an external site.