Cybersecurity Glossary

Enquiry in the glossary on topics of security that they can result of your interest.

  • Is a computer program specifically designed for detect, block and delete catty code (virus, Trojan, maggots, etc.), as well as protect other dangerous programmes' teams acquaintances generically as malware.

  • Consists of find out a password proving all the possible combinations until finding the correct combination.

  • Backup that is made on files or applications within a computer with the aim of recovering the details if the information system suffers damages or accidental losses of the stored data.

  • Is a periodically updated website that compiles chronologically texts or articles of one or more authors, appearing first the more recent, where the author conserve always the freedom of leaving published which creates pertinent. This English end blog or weblog comes of the words website and log (‘log’ in English = daily).

  • Is an error or mistake in a programme of device or system of software that triggers in an unwanted result.

  • Additionally known as ciber harassment. Use of the telematic means (Internet, mobile phones and videogames online mostly) to practice the psychological harassment between equals. It does not be the kind harassment or abuse strictly sexual nor of the cases in which intervene older persons.

  • Operation or function mathematician used in combination with a key that guarantees the confidentiality and entirety of the information contained.

  • Body of tools or measures that you can take to avoid that the minor children do an improper use of the computer, access inappropriate contents or are explained to risks via Internet.

  • A cookie is a small file that stores information sent by a website and that is stored in our team, so that the website can consult the user's previous activity to have clear some of its preferences.

  • Set of strategies that an older person develops to earn the confidence of the minor via Internet with the final aim of obtain grantings in a sexual kind.

  • Is a catty programme (or malware) that has as a main feature its high degree of «dispersabilidad», that is, it quickly that is spread. Whereas the Trojan depend on that an user accesses a catty website or it executes an infected file, the maggots carry out copies of themselves, infect to other computers and are spread automatically in a network regardless of the human stock.

  • End used to define to a person with major knowledge in computer science and telecommunications and that it uses them with a purpose that can or be not malignant or illegal. The stock of using its knowledge is denominated hacking or hackeo. The end “hacker” usually has a derogatory or negative connotation, then is related to illegal tasks. It is more own call computer hackers to those hackers that they carry out malignant stock with its knowledge.

  • Canard that is sent to thousands of internet users. In many cases includes catty software in others has as an objective create major “email chains” (of the users that it receive and they send to its contacts).

  • They are techniques of persuasion used to obtain sensitive nature information, many a time keys or codes, of a person. These tactics usually are worth of the good willpower and lack of precaution of the casualty.

  • Is a software or hardware that it can intercept and save pulses carried out in the keyboard of a team that it has been infected. When compiling everything that we write, can save in a file or you can send by e-mail in an automated way.

  • Is type of software that has as an objective damage or infiltrate without its owner's consent in an information system. Within this definition fits a broad programmes list catty: virus, maggots, Trojan, backdoors, spyware, etc. The common note to all these programmes is its harmful or damaging character.

  • Fall or loss of the web link, provoked in an intentional way for some person. The computer on that which an is made nuke, also can be blocked.

  • Set of additional files to the original software of a tool or computer program, that they serve to solve its possible deficiencies, vulnerabilities, or defects of operation.

  • The phishing consists of the massive shipment of messages that they look come of a sure source with the aim of achieving confidential information (passwords, bank details, etc.,) in a fraudulent way. The racketeer supplants the personality of a person or reliable company so that the receiver of the electronic communication apparently official (via email, fax, SMS or telephonically) creates in its truthfulness and provides, this way, the private details that they result of interest for the racketeer.

  • They are those programmes that they compile details on navigational, preferences and tastes habits of the user, for then send them to a remote company without our consent.

  • Is a type of malware that takeover control of the team infected and «kidnaps» the information of the user quantifying her. The ciberdelicuente extorts to the user and requests rescue for its liberation.

  • Type contents shipment sexual (usually photographs and/or videos) created in general by the sender, to other people through the computers or mobile phones.

  • Sexual operations way in which is blackmailed to a person through an image of herself naked that it has shared via Internet through sexting.

  • Is a programme that monitors the information circulating for the network with the object of capturing information.

  • Is non requested email, usually with advertising content, that is sent in a massive way.

  • Is the catty activity in which an attacker is done involve another person to commit some type of fraud, harassment (cyberbulling). An example is, in the social networks, create a profile of another person and interact with other users doing involve she.

  • Apparently harmless programme that is installed and carries out stock without the consent of the system's owner.

  • They are programmes that you can introduce in the computers and computer systems of ways very various, producing annoying effects, harmful and even destructive and irreparable

  • Mistakes or gaps of detected security in some programme that make good use of the virus.

  • They are those vulnerabilities in systems or programmes that are only well-known for certain attackers and they are strangers by manufacturers and users. When being strangers by manufacturers, there is not a patch of security to solve them. For this reason are very dangerous since the attacker can exploit them without the user is aware of that is vulnerable.

  • Is the name that is given to remote way controlled computers for a cybercriminal to the credit been infected by a malware. The computers zombies are controlled through the use of bots (set of controlled computers remotely for an attacker that they can be used in group to carry out catty activities, such as attacks of refusal of service)