Business Security and Online Content Auditing Advisory Boards Group Business Security and Online Content Auditing Advisory Boards Group

Cyber Security Assessment         Cyber Technological Terms

Business Security and Online Content Auditing

Cyber Security Terms

Understanding the Terms Relating to Cyber Security

A number of computer security terms have become rather commonplace in our society, others still remain a little mysterious to those running into them for the first time.

The following are a few basic Internet and cybersecurity terms that will assist you as you increase your knowledge in this area.

Antivirus Software

Just about all computer owners and internet users are well aware of computer security programs because they often come supplied in the short term with a new computer. In short security programs protect your computer from the Internet viruses and codes that can take over or area able to quickly disable your or all your computers.

Your security software if installed properly will monitor your computer to prevent viruses attacking and infecting your computer by send and installing updates those updates for you enhancing your protection.

AP (access point)

An Ap is a device that allows wireless devices to connect to a wired network using Wi-Fi or related standards.

Attacks

People believe that Attackers are people who seem to having nothing better to do but destroy or upset our way of life. While this could be true they can also gain access to your computer and steel your information, gain access to bank account information and so on. These attackers do this on an intentional stage, they compete ACTIVE and PASIVE ATTACKS This is down by attempting to bypass computer security controls.

While attempting an ACTIVE ATTACK those perpetrating the attempt to alter a system's data, resources and or operations.

Those looking to attempt a PASSIVE ATACK are trying to access and use maybe your computer system's information - Other than attempting to alter its resources, operations or data;

Blended Threats

Consider to be very bad people! HACKERS sometimes called CYBER TERRORISTS These people approach computer networks using a blended threat technique to attempt to maximize the damage they are able to inflict by using alternative forms of attack, using both viruses and worms.

Encryption

This is a process of translating plaintext into cipher text.
Also unencrypted data is called plaintext and encrypted data is referred to as ciphertext. Then both main types of encryption are referred to as asymmetric and symmetric.

Firewall

A firewall is a hardware/software device or a software program that is standard on all computers. It is designed to limit network traffic according the rules of what access is and is not allowed or authorized on your computer.

A Gateway

Can be described as a style of bridge between two computer networks

Malicious Code

This term refers to any and all types of software that can be installed in your computer system. Malicious code is able to perform unauthorized activities. Malware is also a term that refers to malicious software that is designed to cause damage or disrupt. This type of code can destroy a computer system by installing viruses, Trojan horses and other harmful programs on your computer.

Ransomware

is a strain of malware that restricts access to a computer system that it infects, and the hacker demands a ransom to be paid to the originator of the malware (the hacker) in order for the restriction to be removed.

Phishing

These are Internet scam programs. They are designed to contact unsuspecting people via their e-mail address. These are usually people urging you to visit fake websites and these sites look very much like the real thing! They are specially designed to confuse you! They look just like well-known banks or other financial institutions. These perpetrators then attempt to obtain your private information by telling you it is time to update their account passwords or usernames and alike. You need to check with your bank or financial intuition BEFORE you open or answer the email!!!! A number of unwitting people have comply to requests made by these perpetrators and lost thousands of dollars. Opening these types of email, opens the door the all types of fraudsters and potential identity theft.

Spyware

This is similar to Phishing, however this type of software is installed on a NETWORK of computers and always without the owner's knowledge. Its main goal and purpose is to gather Information, personal, group or other and communicate it to an unknown other parties. Spyware is able to monitor ALL your activities, it is able to collect critical information, bank account details, credit card numbers and usernames and passwords.

Trojan Horse

This type of computer program can be super harmful to your computer, a Trojan horse can be easily installed on your computer, usually while you are downloading unknown programs, files off the Internet or while you are opening up unfamiliar email attachment. A Trojan horse once on your computer will do some harm and needs to be removed as quickly as possible.

Virus

A computer virus can be introduce to your computer from an email or an attachment to an email. If you do not know the where the email came from delete it. A virus is harmful "software" that attaches itself to other programs on your computer so it can impair or destroy a computer's ability to function as it should.

Worm

Yes a worm! A worm that more or less wiggles its way across your network connections. It is an independent program that continues to replicate or reproduce from machine to machine across and will clog networks and information systems as it spreads.

Your Personal Cyber Security Checklist

1. Account authentication and password best practice

1.1 Strong passwords - are the first line of defence

Example:- Use passwords that are a sentence:- "I like to eat strawberries and cream"

1.2 Use different passwords for each website

1.3 Avoid giving your real name and business email if possible when you go to download whitepapers, etc. Most of the time they will spam you after you download a paper.

1.4 Use two-Step authentication on websites and services that offer it (example gmail)

 

        CYBER SECURITY COURSES

Advisory Boards Group - building a path to success for your company

Contact the Advisory Board Group

              

USE OUR ONLINE FORM  •

Advisory Boards Group - Pyrmont New South Wales

Advisory Board Group

PHONE: 02 9518 5540

Security Privacy Audits
March 2016
S M T W T F S
   1 2 3 4 5
6 7 8 9 10 11 12
13 14 15 16 17 18 19
20 21 22 23 24 25 26
27 28 29 30 31

register Advisory Board newsletter
Advisory Board webinars video events
on Facebook
        

© 2011 - 2016 Advisory Boards Group             website by aml websites