A
Antivirus - Software that is designed to detect, stop and remove viruses.
Authentication - Verifying that someone is who they claim to be when they access a computer or online service.
B
Backing up - Making a copy of data stored on a computer or server in case the original data is damaged or lost.
Bring your own device (BYOD) - When personally owned mobile devices such as smartphones or tablets are authorised for use in the workplace.
Broadband - High-speed data transmission system capable of transporting multiple traffic types.
C
CEO fraud – When a fraudster purporting to be a senior member of an organisation emails the firm’s cashier or an employee responsible for finance, requesting them to make a bank transfer to a third party. The fraudster may email from a look-a-like email address, so the employee assumes it is a genuine instruction.
Cloud - Where shared resources are stored and accessed, usually online instead of locally.
Cyber - A broad term encompassing the technological elements of modern society, from computers and emails to websites and smart devices
Cyber-attack - An attack on the technology used by an individual or organisation, using technical and social engineering techniques to gain unauthorised access to data and systems.
E
Encryption - The conversion of data into a code in order to prevent unauthorised access.
F
Firewall - Hardware or software designed to act as a barrier between a trusted network and an untrusted network by controlling incoming and outgoing network traffic.
H
Hacker - Someone who violates computer security to gain unauthorised access to data.
Hard disk - Permanent storage medium within a computer.
I
Identification - The process of recognising a particular user of a computer or service.
Invoice fraud - A fraudster obtains details of a firm’s suppliers (for example, IT suppliers) and emails the finance department, purportedly as the supplier, asking for invoice remittances to be sent to a new bank.
Internet service provider (ISP) - Company that provides access to the internet and further services.
K
Keyboard logger - A virus that records keystrokes to secretly capture confidential information (such as credit card details).
L
Local area network (LAN) - Communications network linking multiple computers within a geographical location such as an office building.
M
Macro virus - Malware that infects common applications (eg word processing programs) and causes a sequence of actions to be performed when the application is started.
Malware - Software intended to infiltrate and damage computers (abbreviation of malicious software).
N
No hang-up - Fraudsters purporting to be trustworthy may suggest you hang up and ring your bank or the police immediately on a trusted number. However, they don’t disconnect the call, so when you dial the genuine phone number you are still connected to the fraudster or an accomplice who pursues the scam.
P
Phishing - The fraudulent practice of sending emails purporting to be from a trustworthy source in order to induce individuals to reveal sensitive information, such as usernames, passwords and payment card numbers, online. Phishing is often associated with spam emails.
S
Smart device - A device that has internet connectivity and the ability to run computer programs or apps. Includes smartphones and tablets.
Spyware - Malware that secretly passes on information about a computer user’s activities to an external party.
T
Trojan - A type of virus disguised as legitimate software that can be used to hack into the victim’s computer.
Two-factor authentication - Obtaining evidence of identity by two independent means, eg knowing a password and receiving a pass code via a mobile phone.
V
Virus - A piece of code loaded onto a computer without the user’s knowledge, capable of copying itself and causing damage or disruption.
Vishing – Using telephone calls to dupe someone into providing personal details (abbreviation of ‘voice phishing’). It is often accompanied by knowledge of transactions gained during phishing.
W
Wide area network (WAN) - Communications network linking computers across different geographical locations.
No comments yet