cyberriskinsuranceforum.com

Website:https://www.cyberriskinsuranceforum.com
Upvotes received0
Downvotes received0
Karma:0 (upvotes-downvotes)



0 earned Badges

No badges were found



Definitions (85)

1

0 Thumbs up   0 Thumbs down

Adware


Any software application that displays advertising banners while the program is running. Adware often includes code that tracks a user’s personal information and passes it on to third parties without [..]
Source: cyberriskinsuranceforum.com

2

0 Thumbs up   0 Thumbs down

Advanced persistent threat


Advanced persistent threat (APT) usually refers to a group, such as a foreign government, with both the capability and the intent to persistently and effectively target a specific entity. The term is [..]
Source: cyberriskinsuranceforum.com

3

0 Thumbs up   0 Thumbs down

Anti-virus software


Software designed to detect and potentially eliminate viruses before they have had a chance to wreak havoc within the system. Anti-virus software can also repair or quarantine files that have already [..]
Source: cyberriskinsuranceforum.com

4

0 Thumbs up   0 Thumbs down

APPLICATION


Software that performs automated functions for a user, such as word processing, spreadsheets, graphics, presentations and databases—as opposed to operating system (OS) software.
Source: cyberriskinsuranceforum.com

5

0 Thumbs up   0 Thumbs down

attachment


A file that has been added to an email—often an image or document. It could be something useful to you or something harmful to your computer. See also Virus.
Source: cyberriskinsuranceforum.com

6

0 Thumbs up   0 Thumbs down

Authentication


Confirming the correctness of the claimed identity of an individual user, machine, software component or any other entity.
Source: cyberriskinsuranceforum.com

7

0 Thumbs up   0 Thumbs down

Authorization


The approval, permission or empowerment for someone or something to do something.
Source: cyberriskinsuranceforum.com

8

0 Thumbs up   0 Thumbs down

Backdoor


Hidden software or hardware mechanism used to circumvent security controls.
Source: cyberriskinsuranceforum.com

9

0 Thumbs up   0 Thumbs down

Backup


File copies that are saved as protection against loss, damage or unavailability of the primary data. Saving methods include high-capacity tape, separate disk sub-systems or on the Internet. Off-site b [..]
Source: cyberriskinsuranceforum.com

10

0 Thumbs up   0 Thumbs down

Badware


See Malware, Adware and Spyware.
Source: cyberriskinsuranceforum.com


To view all 85 definitions, please sign in.