![]() |
|
#0044 Computer Security Terms Defined
INSERT IMAGE HEREIntro
There is a lot of terminology when it comes to computer security that you many not be
familiar. These terms are often used incorrectly. Some people simply refer to
most everything as a virus which is incorrect. The definitions provided here should help to
clarify the differences and provide some examples.
Computer Virus
A piece of code that is capable of copying itself and typically has a detrimental effect,
such as corrupting the system or destroying data. Once created, a virus spreads by itself
through various methods and will continue to spread until stopped by some type of security
software.
Example: The early viruses were harmless pranks. The virus would do
things like turn your screen upside down, or a video effect to make the screen appear to
melt.
Example: A virus that deletes your files, directory or entire
drive.
Example: A virus that changes Windows to make it vulnerable to more
viruses. This creates a snowball effect and you start having more and more problems.
Example: Years ago there was a Microsoft Word virus that messed with
the spell checker. It would randomly transpose letters in your documents making you look
like a bad speller. It would randomly pick a letter of the alphabet such as letter M and
replace it with the letter Q. The victim thinks they made typing mistakes and they run
spell chek again. Every time you use the spell check, it would contine to
swap letters and mess up the document even more.
Spyware
Software that enables a bad actor to covertly obtain information found on
another person’s computer by secretly transmitting data from a victim’s computer. The
spyware stays hidden and doesn’t display anything on the screen, so the user is unaware that
they have a breach. Spyware is often used in conjunction with a virus that spreads
spyware.
Keylogger
A keylogger is a type of malware that records a user's keystrokes and sends a
record of the keystrokes to a hacker or scammer. The keylogger software is typically
installed on a victim's computer without their knowledge.
Example: A keylogger may record the keystrokes used when you type your
password or credit card number or even a sensitive email. It records and/or sends that
information back to the person who placed the keylogger software.
Ransomware
A type of malicious software designed to encrypt and block access to data stored
on a computer system until a sum of money is paid. Payment is typically done with
untraceable crypto currency such as bitcoin. Failure to pay results in the loss of all data.
Ransomware is one of the worst things you may encounter.
Example: Ransomware has been used to attack hospitals by encrypting all
medical and billing records, effectively shutting down the facility until the ransom is
paid or the facility restores from backups. Either way, it disrupts the business
and can cause significant downtime. This can be very expensive for the
victim.
Adware
Software that automatically displays or downloads advertising material (usually
unwanted) when a user is online. These are often displayed as popups that come up
repeatedly. They try to get you to buy something or will have you call a number that
leads to a social engineering attack. Adaware can also lead to spam email.
Malware
Software that is specifically designed to disrupt, damage, or gain unauthorized
access to a computer system. These are often FAKE software programs that the user
installs thinking its something useful. The software then reports back to the person
that created it with whatever the Malware was designed to do.
Example: A fake browser tool bar that looks for low prices & discounts
on shopping websites.
Example: A fake antivirus program that looks convincing but its
actually harming your computer.
Example: A computer game that is actually a game but it does unwanted
things in the background.
Cloning
This typically happens on social media. A scammer will create a new account on
Facebook or other social media using the same name and profile picture as someone
else. The person being cloned is NOT the victim. Then the scammer will befriend the
same set of friends taken from the account being cloned by sending friend requests. At some
point they will send messages or begin a chat (pretending to be the person they cloned)
saying that they received a great deal purchasing some product or service. They claim they
can get you the same deal if you give them money or information. Some people fall for it
because it's coming from a account with a friends name on it.
Example: I once had a scammer contact me from a cloned account of a
person I knew for a fact was deceased. I reported the fake account to Facebook.
Hacked, Hacking
In cybersecurity, hacking is the act of identifying and exploiting weaknesses in a
computer system or network to gain unauthorized access to data. This is what you
often see glamorized on TV or in the movies.
Comment: This is probably the least likely and the most difficult way of
getting into your computer. It typically requires the MOST amount of work.
Privacy Policy
When computer software or cellphone apps are installed, the user is often
presented with a privacy policy. Few people take time to read it and simply click OK. These
policies are carefully worded by the company. They may contain just about anything. When you
click OK, you grant that company rights to anything within that policy.
Example: Adobe Creative Cloud software has a new policy that gives Adobe
usage rights to anything the user creates, such as websites, graphics, animations etc.
Many people have switched to other software.
Example: Some cellphone apps grant themselves permission to any and all
content on your phone. (addressbook, call logs, photos, stored files etc.) TikTok is one
of the worst offenders. If TikTok is installed; you should consider your data
comprimised. Unfortunately, TikTok remains highly popular.
Related Articles
This is a complete list of security related articles on this website. Several more
are planned and will be added over time.
#0069 [SECURITY]
What Major Email Services Now Require OAuth2?
#0059 [SECURITY]
Bitlocker: Is it a Feature or Your Worst Nightmare?
#0051 [SECURITY]
How to Spot SCAM emails
#0046 [SECURITY]
My Thoughts on Antivirus Software
#0044 [SECURITY]
Computer Security Terms Defined
#0040 [SECURITY]
'Driver' Update software is often harmful
#0032 [SECURITY]
How often should I replace my router?
#0024 [SECURITY]
Lost Customer Passwords
#0015 [SECURITY]
New Government Password Recommendations
#0011 [SECURITY]
Multiple Antivirus Programs
Social Engineering
A psychological attack that uses manipulation to trick victims into giving away sensitive information or performing actions that compromise security. It's basically an old-fashioned con game over the phone or by email. Someone will attempt to talk you out of a password, or account information. They may try to talk you into sending them bitcoin, gift cards, or even plane tickets using some type of scam. They may ask to connect to your computer remotely to help make the so-called payment or money transfer. DON'T BE A VICTIM!
Comment: This is one of the most common ways to get into your computer as it is MUCH easier than hacking.