Glossary

  • Malware: Short for "malicious software," malware refers to software programs designed to damage or do other unwanted actions on a computer system

  • Phishing: a malicious individual or group of individuals who scam users. They do so by sending e-mails or creating web pages that are designed to collect an individual's online bank, credit card, or other login information

  • Vishing: When a Hacker calls you and tries to con you into surrendering confidential Information.

  • S-mishing: SMS phishing occurs thru text messages.

  • USB Attack: A hacker leaves a USB stick laying around for someone who is curious to plug it into a computer

  • Ransomware: form of malware in which rogue software code effectively holds a user's computer hostage until a "ransom" fee is paid. Ransomware often infiltrates a PC as a computer worm or Trojan horse that takes advantage of open security vulnerabilities

  • DVR: Digital Video Recorded

  • NVR: Network Video Recorder

  • Wi-Fi : A facility allowing computers, smartphones, or other devices to connect to the Internet or communicate with one another wirelessly within a particular area

  • Spear Phishing: Spear phishing is an email or electronic communications scam targeted towards a specific individual, organization or business

  • Drive by Download: A drive-by download refers to the unintentional download of malicious code to your computer or mobile device that leaves you open to a cyberattack. You don't have to click on anything, press download, or open a malicious email attachment to become infected. A drive-by download can take advantage of an app, operating system, or web browser that contains security flaws due to unsuccessful updates or lack of updates. Unlike many other types of cyberattack, a drive-by doesn't rely on the user to do anything to actively enable the attack.

  • PII: Personally identifiable information (PII) is any data that could potentially identify a specific individual. Any information that can be used to distinguish one person from another and can be used for de-anonymizing (data mining) anonymous data can be considered PII

  • Spoof: imitate (something)

  • Dark Web: the part of the World Wide Web that is only accessible by means of special software, allowing users and website operators to remain anonymous or untraceable.

  • Trusted Platform Module V2 (TMP): This technology is designed to provide hardware-based, security-related functions. The most common TPM functions are used for system integrity measurements and for key creation and use. During the boot process of a system, the boot code that is loaded (including firmware and the operating system components) can be measured and recorded in the TPM. For a more detailed Feature description please go to TMP Overview or go to Microsoft Windows 11 Specifications.

  • Motherboard: The motherboard is the backbone that ties the computer's components together at one spot and allows them to talk to each other. Without it, none of the computer pieces, such as the CPU, GPU, or hard drive, could interact.