security.illinois.edu

Website:https://techservices.illinois.edu/
Upvotes received0
Downvotes received0
Karma:0 (upvotes-downvotes)



0 earned Badges

No badges were found



Definitions (53)

1

0 Thumbs up   0 Thumbs down

adware


A form of spyware that enters your computer from an Internet download. Like spyware, it monitors your computer use, such as what Web sites you visit. Adware gets its name from also launching numerous [..]
Source: security.illinois.edu

2

0 Thumbs up   0 Thumbs down

antivirus software


Antivirus software will protect your computer from viruses encountered on the Web. New viruses are born every day, so it's important to update your antivirus software regularly.
Source: security.illinois.edu

3

0 Thumbs up   0 Thumbs down

attachment


A document, a picture, a video clip, program or any other kind of file that can be attached and sent with an e-mail or instant message. Malicious programs, viruses or spyware are commonly spread throu [..]
Source: security.illinois.edu

4

0 Thumbs up   0 Thumbs down

authentication


To gain access to many secure systems, you have to identify yourself. Authentication is the process of providing information to identify yourself. Many systems utilize an ID and a password for users t [..]
Source: security.illinois.edu

5

0 Thumbs up   0 Thumbs down

authoriztion


A decision whether an authenticated identity has permission to access a resource. Once you identify yourself through authentication, you are granted or denied access through authorization.
Source: security.illinois.edu

6

0 Thumbs up   0 Thumbs down

availability


A condition where an information technology resources can be accessed and used. System or network outages preclude availability.
Source: security.illinois.edu

7

0 Thumbs up   0 Thumbs down

backdoor


In a computer system, a backdoor refers to an overlooked or hidden entry into a computer system. A backdoor allows a hacker or other unauthorized user to bypass a password requirement and to gain acce [..]
Source: security.illinois.edu

8

0 Thumbs up   0 Thumbs down

backup


Anyone that has had a computer drive fail can tell you the importance of creating a backup of your important information. There are several ways to backup important data on your computer, including up [..]
Source: security.illinois.edu

9

0 Thumbs up   0 Thumbs down

botnet


Once a computer is compromised by a hacker and turned into a zombie machine, hackers will often combine the power of several compromised machines into one network called a botnet. While botnets will o [..]
Source: security.illinois.edu

10

0 Thumbs up   0 Thumbs down

cleartext


Any information that is transmitted without encryption and can be read by anyone with access to that data. Any sensitive data, including login information, should never be sent as cleartext.
Source: security.illinois.edu


To view all 53 definitions, please sign in.