in

Cyber Jargon YOU Need To Know

Cyber Jargon YOU Need To Know - top government contractors - best government contracting event
https://executivebiz-media.s3.amazonaws.com/2022/08/19/30/9f/c3/a0/b7/6f/d4/64/Executive-Biz.png

As the use of the internet and technology grows, so do its terms and definitions. Here is a rundown of today’s most frequently used cyber terms.

We left something out? Please feel free to leave a comment below to further enhance our ‘cyber jargon’ glossary.

Authentication: Confirms that a computer program or individual attempting to access a system is authorized and is not infected with malware.

Botnet: Short for robot network, refers to a series of computers that are linked through one ‘command and control center’ computer through installed viruses, that can be used to launch malicious attacks.

Cloud computing: Less is more. All business operation systems are stored in one hub or ‘cloud’ not connected to outside networks, reducing cost and increasing security and efficiency.

Cyber Command: Created by Defense Secretary Gates in the Summer of 2009 for the Department of Defense. Nicknamed CyberCom, the new Pentagon center’s purpose is to protect the United States military and government in cyberspace. CyberCom will be located at Fort Meade, Maryland beginning in October of 2009 and will be fully functional by October 2010.

Cyber Squatting: The use of a domain name similar to one commonly accessed, with the sole purpose of exploiting the site for an inflated amount of money. Cyber squatting lawsuits are often filed by celebrities, Oprah Winfrey, Madonna and Jay Leno are all cyber squatting victims and won their cases.

Identity Management: Or IDM, refers to the process of validating the identity of an individual on a secured technology network.

Malware: Short for malicious software.  Malicious code that is used to attack a computer by spreading viruses, stealing data, corrupting data, distributing false information, or crashing networks.

Phishing (and spear phishing): With the goal of acquiring personal information, phishing refers to a hacker’s use of fake portals that are almost identical to  common sites. The familiarity of these common websites (such as Twitter or online banking) makes the victim more likely to give up personal information.

SEO (search engine optimization): A technique used by hackers to make infected websites higher in search engine results by editing content to have an optimal amount of ‘key words’.

Smart Grid: A network infrastructure not connected to the internet that delivers power from providers to consumers using digital technology. The power generators save on power and are considered a way of addressing the concern over global warming. Supported by the Obama Administration. To read more click here.

Spam: The use of personal networks, such as email, to send indiscriminate information because there are little to no operating costs for the spreading of the information.

Spoofing: An email that is disgused by one source to look like another.

Spyware: Software placed in computers without the knowledge of the user so that an individual can secretly monitor the actions of the user. The GhostNet report is a recent example.

Trojan Horse: Malicious software disguised as a helpful computer program but once activated, infiltrates the computer’s hard-drive.

Worm: A type of malicious software that penetrates computer networks and needs no program to latch onto (unlike most malware). Mostly consumes bandwidth and usually does not corrupt current software programs.


ExecutiveBiz Logo

Sign Up Now! ExecutiveBiz provides you with Daily Updates and News Briefings about Industry News

mm

Written by Admin

Partnerships With States Could Solve Environmental, Economic Problems - top government contractors - best government contracting event
Partnerships With States Could Solve Environmental, Economic Problems
FightNight 2009 Recap - top government contractors - best government contracting event
FightNight 2009 Recap