Shelby

Shelby Meyer

Written February 3, 2025
AI Enhanced -
Updated September 18, 2025
Category [SECURITY]

#0044 Computer Security Terms Defined

INSERT IMAGE HERE

Intro

There is a lot of terminology when it comes to computer security that you many not be familiar. These terms are often used incorrectly. Some people simply refer to most everything as a virus which is incorrect. The definitions provided here should help to clarify the differences and provide some examples.

Computer Virus

A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data. Once created, a virus spreads by itself through various methods and will continue to spread until stopped by some type of security software.

Example: The early viruses were harmless pranks. The virus would do things like turn your screen upside down, or a video effect to make the screen appear to melt.
Example: A virus that deletes your files, directory or entire drive.
Example: A virus that changes Windows to make it vulnerable to more viruses. This creates a snowball effect and you start having more and more problems.
Example: Years ago there was a Microsoft Word virus that messed with the spell checker. It would randomly transpose letters in your documents making you look like a bad speller. It would randomly pick a letter of the alphabet such as letter M and replace it with the letter Q. The victim thinks they made typing mistakes and they run spell chek again. Every time you use the spell check, it would contine to swap letters and mess up the document even more.

Spyware

Software that enables a bad actor to covertly obtain information found on another person’s computer by secretly transmitting data from a victim’s computer. The spyware stays hidden and doesn’t display anything on the screen, so the user is unaware that they have a breach. Spyware is often used in conjunction with a virus that spreads spyware.

Keylogger

A keylogger is a type of malware that records a user's keystrokes and sends a record of the keystrokes to a hacker or scammer. The keylogger software is typically installed on a victim's computer without their knowledge.

Example: A keylogger may record the keystrokes used when you type your password or credit card number or even a sensitive email. It records and/or sends that information back to the person who placed the keylogger software.

Ransomware

A type of malicious software designed to encrypt and block access to data stored on a computer system until a sum of money is paid. Payment is typically done with untraceable crypto currency such as bitcoin. Failure to pay results in the loss of all data. Ransomware is one of the worst things you may encounter.

Example: Ransomware has been used to attack hospitals by encrypting all medical and billing records, effectively shutting down the facility until the ransom is paid or the facility restores from backups. Either way, it disrupts the business and can cause significant downtime. This can be very expensive for the victim.

Adware

Software that automatically displays or downloads advertising material (usually unwanted) when a user is online. These are often displayed as popups that come up repeatedly. They try to get you to buy something or will have you call a number that leads to a social engineering attack. Adaware can also lead to spam email.

Malware

Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system. These are often FAKE software programs that the user installs thinking its something useful. The software then reports back to the person that created it with whatever the Malware was designed to do.

Example: A fake browser tool bar that looks for low prices & discounts on shopping websites.
Example: A fake antivirus program that looks convincing but its actually harming your computer.
Example: A computer game that is actually a game but it does unwanted things in the background.

Cloning

This typically happens on social media. A scammer will create a new account on Facebook or other social media using the same name and profile picture as someone else. The person being cloned is NOT the victim. Then the scammer will befriend the same set of friends taken from the account being cloned by sending friend requests. At some point they will send messages or begin a chat (pretending to be the person they cloned) saying that they received a great deal purchasing some product or service. They claim they can get you the same deal if you give them money or information. Some people fall for it because it's coming from a account with a friends name on it.

Example: I once had a scammer contact me from a cloned account of a person I knew for a fact was deceased. I reported the fake account to Facebook.

Hacked, Hacking

In cybersecurity, hacking is the act of identifying and exploiting weaknesses in a computer system or network to gain unauthorized access to data. This is what you often see glamorized on TV or in the movies.

Comment: This is probably the least likely and the most difficult way of getting into your computer. It typically requires the MOST amount of work.

Social Engineering

A psychological attack that uses manipulation to trick victims into giving away sensitive information or performing actions that compromise security. It's basically an old-fashioned con game over the phone or by email. Someone will attempt to talk you out of a password, or account information. They may try to talk you into sending them bitcoin, gift cards, or even plane tickets using some type of scam. They may ask to connect to your computer remotely to help make the so-called payment or money transfer. DON'T BE A VICTIM!

Comment: This is one of the most common ways to get into your computer as it is MUCH easier than hacking.

Privacy Policy

When computer software or cellphone apps are installed, the user is often presented with a privacy policy. Few people take time to read it and simply click OK. These policies are carefully worded by the company. They may contain just about anything. When you click OK, you grant that company rights to anything within that policy.

Example: Adobe Creative Cloud software has a new policy that gives Adobe usage rights to anything the user creates, such as websites, graphics, animations etc. Many people have switched to other software.
Example: Some cellphone apps grant themselves permission to any and all content on your phone. (addressbook, call logs, photos, stored files etc.) TikTok is one of the worst offenders. If TikTok is installed; you should consider your data comprimised. Unfortunately, TikTok remains highly popular.

Back Door

A so called 'back door' is a special login added by the manufacturer to software or hardware. The login totally bypasses all security setup by an owner and usually grants full unrestricted access. There is a serious problem with backdoors. Somehow the backdoor login name and password will eventually become public. Once the login information is leaked, ALL of the users with that hardware or software are now vulnerable. Anyone can waltz right in to your system. Any security that's configured is suddenly worthless. The equipment or software MUST be replaced.

Example: Some cable internet providers have a 'backdoor' into customers cable modems. It can be remotely accessed by the ISP at any time.
Example: Huawei telecom equipment was banned in the USA. Backdoors were found in cellphones, and cell tower equipment allowing the Chinese government to tap into phone calls. All Huawei equipment was pulled from service.

Related Articles

This is a complete list of security related articles on this website. Several more are planned and will be added over time.

#0069 [SECURITY] What Major Email Services Now Require OAuth2?
#0059 [SECURITY] Bitlocker: Is it a Feature or Your Worst Nightmare?
#0051 [SECURITY] How to Spot SCAM emails
#0046 [SECURITY] My Thoughts on Antivirus Software
#0044 [SECURITY] Computer Security Terms Defined
#0040 [SECURITY] 'Driver' Update software is often harmful
#0032 [SECURITY] How often should I replace my router?
#0024 [SECURITY] Lost Customer Passwords
#0015 [SECURITY] New Government Password Recommendations
#0011 [SECURITY] Multiple Antivirus Programs