Glossary of basic terms ****************************************************************************************** * ****************************************************************************************** Short explanation of the most common terms that may appear in connection with IT security University. A Antivirus [ URL "MYLIFEEN-208.html "] - a program that protects devices from malicious sof spyware). Checks the system regularly and blocks suspicious files. Authentication – verification of your identity when logging into the system (e.g. entering confirmation in the application). B Backup [ URL "MYLIFEEN-44.html "] – storing a copy of data (e.g. on a university disk or c can be recovered when the device is lost or attacked. Brute force attack – an attempt to crack a password by trying all possible combinations. D Digital identity - a set of data that uniquely identifies you in the online world - such a account. Data [ URL "MYLIFEEN-44.html "] (personal / university) – all electronic information (file emails) that may contain sensitive data and must be protected. Data leaks [ URL "MYLIFEEN-46.html "] – situations where sensitive information reaches an person. It can occur by mistake or by attack. Domain reputations – trustworthiness of a web address; sites with suspicious content may b security software. E Encryption - a process that converts data into an unreadable form until it is unlocked wit key. [ URL "MYLIFEEN-1.html#null"] F Firewall – a “protective gateway” between your device and the internet. Monitors and filte traffic, blocks unsafe connections. Fake login [ URL "MYLIFEEN-42.html "] a website that pretends to be an official website (e tries to lure out your password. H Hoax – an alarm or false message that spreads over the Internet (e.g. a false warning, an forward an email). I Incident [ URL "MYLIFEEN-46.html "] - any event that may compromise the security of the sy e.g. a breached password, a lost laptop or a phishing attack. M Malware [ URL "MYLIFEEN-42.html "] – malicious software that can damage a system or steal includes viruses, spyware and ransomware. P Phishing [ URL "MYLIFEEN-42.html "] – a fraudulent message (e-mail, SMS, chat) that tries or make you click on a dangerous link. PIN / biometrics – means of device security (number, fingerprint, facial recognition). Patch (update) [ URL "MYLIFEEN-45.html "] – software add-on that fixes bugs or vulnerabili system. Password [ URL "MYLIFEEN-17.html "] – your key account protection. It should be strong (mi combination of letters, numbers and symbols) and unique. R Ransomware – a malicious program that encrypts your files and demands a ransom for their r S Social engineering [ URL "MYLIFEEN-42.html "] – manipulating people to gain their trust an sensitive data. Spam [ URL "MYLIFEEN-42.html "] – unsolicited emails, often with advertisement, links to m scams. Spear phishing – an attacker targets a specific person (e.g. a university employee) and ad to appear trustworthy. Spyware – a program that secretly tracks what you do on your computer and sends this data T Two-factor authentication (2FA) [ URL "MYLIFEEN-41.html "] - a method of logging in when, your password, you confirm your identity with a second factor - e.g. a mobile application. Trojan horse - a program that appears to be useful, but after installation allows an attac system. V VPN [ URL "MYLIFEEN-25.html "] (Virtual Private Network) – an encrypted connection that pr transmission when working remotely or from public networks. Virus – a program that spreads itself and damages files or systems. Vishing/smishing – phishing by phone (vishing) or by SMS (smishing). Vulnerability – a bug in the software that can be exploited by attackers.