Quick Links
Skip to main contentSkip to navigation

Ell-Saline USD 307

Working...

Ajax Loading Image

 

Security Definitions

Here are MY basic definitions.

Pop-Up / Pop-Under Ads
A Pop-Up is a window that appears on top of (over) the internet browser or program window. A Pop-Under-Ad is one that is behind or in back of the internet browser. These windows usually contain advertisements and can capture e-mail and cookie information, but clicking on Pop-Ups or Pop-Under can install Malware.

Cookies
Cookies are small files placed on your computer by websites and now e-mail that identify you and your computer for the purpose of tracking or identifying your internet / e-mail habits. Cookies can make your internet browsing easier and faster as good websites will remember who you are and show information that interests you. However, cookies can be used by sites that do not always have the best of intentions.

Spam
Spam is unwanted or unsolicited e-mail. But defining what is unwanted, can be unique to each person or each e-mail account. For example when vendors send me e-mail announcements to my work e-mail, I do not consider that Spam. But, if those same e-mails went to my personal e-mail account I would consider those e-mails as Spam. Spam can also be nearly identical e-mails sent to numerous recipients.

Phishing
Phishing refers to baits (e-mails or instant messages) used to “catch” personal financial information. Usually the authentic looking e-mail or instant message (from e-bay, your bank, or credit card) will redirect you to another authentic looking website where you can enter your username, password, account or credit card numbers. This data will then be used to make purchases or withdraws in your name.

Malware
Malware includes computer viruses, worms, trojan horses, spyware, dishonest adware and other malicious, hostile, annoying and unwanted software.

Virus
Computer Virus is an unwanted program that can copy itself and infect other computers usually with the intent to harm, destroy, or damage files or other programs. A virus uses a host to move between computers such as a floppy disk, CD, DVD, USB drive, e-mail or file.

Worm
A Worm is a program that exploits vulnerabilities to spread to other computers without a host.

Trojan Horse
Trojan Horse is a program with a hidden agenda but appears harmless. Like a screen saver that secretly allows others remote access to your computer and information on your computer. Or a program that changes your desktop pictures that secretly uses your computer to send spam. Another is a game downloaded from the internet that disables security software and settings.

adware
adware (yes in lower case) is free software that is supported by advertisements. adware typically requires an active internet connection to run and sends your personal information to third parties, without your knowledge. Below is a short list of common adware;
 

123 Messenger Cydoor limewire
180SearchAssistant Direct Revenue Messenger Plus! Live
888bar DivX RealPlayer
Adssite Toolbar DollarRevenue Smiley Central
AOL Instant Messenger ErrorSafe Viewpoint Media Player
Antivirus 200 Family Evernote VirusProtectPro
Bearshare Ezula WeatherBug
Bonzi Buddy FaceGame.exe WhenU
BlockChecker Gamespy WinAce
Burn4Free Gamevance WinFixer
ClipGenie Gator Winzix
Comet Cursor Kazaa Zango Toolbar


Spyware
Spyware is basically adware that is installed on the computer with out the user’s consent. Spyware has been known to change internet settings, i.e., home page, security settings, search options, cause pop-ups and install other unwanted software.