SECURITY
GLOSSARY
Edition: Final
Section: Technology and Your Money
Page: E1
Estimated printed pages: 2
Article Text:
Common terms used in computer
security:
* Virus: A program that
replicates itself across a network, or the Internet as a whole. The virus
payload might be destructive, or it could try to overwhelm a network by copying
itself.
* Worm: A virus that replicates
itself without human intervention. If the victim has to open an e-mail
attachment to get infected, it's a virus. But if the virus scans for new
victims and attacks on its own, it's a worm.
* Trojan horse: A Trojan horse
program is more than it seems. For example, it might look like a game, but
instead it steals your personal information and sends it to a criminal.
* Password sniffer: A file that
seeks out passwords on your computer, then sends them
to a hacker.
* Blended threat: A program that
combines the characteristics of viruses, worms and Trojan horses.
* Exploit: A program that takes
advantage of a security hole in a computer program, like Microsoft Windows or
AOL Instant Messenger.
* Spyware: A general term for a
program that surreptitiously monitors your actions. While spyware can be
sinister, such as a remote control program used by a hacker, software companies have been known to use spyware to
gather data about customers. The practice is generally frowned upon.
* Virus signature: The
"fingerprints" of a virus, which anti-virus programs use to identify
and isolate viruses. Users should regularly update their anti-virus programs
online to download the latest virus signatures, so they're protected against
new viruses.
* Firewall: Software that
monitors incoming and outgoing Internet traffic to your computer and checks for
suspicious patterns. A firewall may alert you to spyware or a Trojan horse
installed on your computer.
Copyright (c) 2002 Lexington
Herald-Leader
Record Number: 0201140405