| A | B |
| Malware | Short for malicious software, is any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems. This program is defined by its malicious intent, acting against the requirements of the computer user, and does not include software that causes unintentional harm due to some deficiency. |
| Spyware | software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive. |
| Trojan | is a generally non-self-replicating type of malware program containing malicious code that, when executed, carries out actions determined by the nature of the program, typically causing loss or theft of data, and possible system harm. |
| Social Engineering | In the context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information. A type of confidence trick for the purpose of information gathering, fraud, or system access, it differs from a traditional "con" in that it is often one of many steps in a more complex fraud scheme. |
| XSS | Cross Site Scripting is a security breach that takes advantage of dynamically generated Web pages. |
| MSRT | is a freely-distributed virus removal tool developed by Microsoft for the Microsoft Windows operating system. |
| Windows Defender | Formerly known as Microsoft AntiSpyware, is a software product that helps combat malware. Windows Defender was initially an antispyware program; it is included with Windows Vista and Windows 7 and is available as a free download for Windows XP and Windows Server 2003. |
| FAT | File Allocation Table |
| NTFS/New Technology File System | Is a proprietary file system developed by Microsoft that provides strong and user-transparent encryption of any file or folder. |
| FAT 16 | Used with DOS, Windows 95 - Does not support drives over 2 GB |
| FAT 32 | format is limited in size to 32 GB. |
| Encryption | Is the most effective way to achieve data security. To read an the file, you must have access to a secret key or password that enables you to decrypt it. Unencrypted data is called plain text ; encrypted data is referred to as cipher text. |
| PKI/Public Key Infrastructure | Is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates. In cryptography, a PKI is an arrangement that binds public keys with respective user identities by means of a certificate authority (CA). |
| Libraries | new in Windows 7—make it easier to find, work with, and organize files scattered across your PC or network. A library brings your stuff together in one place—no matter where it's actually stored. |
| Hub | multiport repeater - Layer 1 Device |
| Switch | Muliport Bridge - is a computer networking device that connects devices together on a computer network, by using a form of packet switching to forward data to the destination device. - Layer 2 |
| Router | Is a networking device that forwards data packets between computer networks. - Layer 3 Device |
| Segments | Is a portion of a computer network that is separated from the rest of the network by a device such as a repeater, hub, bridge, switch or router. |
| UDP or User Datagram Protocol | Is a communications protocol that offers a limited amount of service when messages are exchanged between computers in a network that uses the Internet Protocol (IP). It is connectionless! |
| TCP | Provides reliable, ordered and error-checked delivery (or notification of failure to deliver) of a stream of octets between programs running on computers connected to a local area network, intranet or the public Internet. It resides at the transport layer. |
| NIC | Is a circuit board or card that is installed in a computer so that it can be connected to a network. |
| DNS | The domain name system is the way that Internet domain names are located and translated into Internet Protocol addresses. A domain name is a meaningful and easy-to-remember "handle" for an Internet address. |
| Homegroups | A homegroup makes it easier to share files and printers on a home network. You can share pictures, music, videos, documents, and printers with other people in your homegroup. Other people can't change the files that you share, unless you give them permission to do so. |
| TCP/IP | The Internet protocol suite is the computer networking model and set of communications protocols used on the Internet and similar computer networks. |
| IP | The Internet Protocol is the principal communications protocol in the Internet protocol suite for relaying datagrams across network boundaries. Its routing function enables internetworking, and essentially establishes the Internet. |
| Group Policy | Is a feature of the Microsoft Windows NT family of operating systems that control the working environment of user accounts and computer accounts. This provides the centralized management and configuration of operating systems, applications, and users' settings in an Active Directory environment. |
| Authentication | Is the process of determining whether someone or something is, in fact, who or what it is declared to be. |
| Drivers | Software that allows your computer to communicate with hardware or devices. Without this software, the hardware you connect to your computer—for example, a video card or a printer—won't work properly. |
| PNP | Is a capability developed by Microsoft for its Windows 95 and later operating systems that gives users the ability to plug a device into a computer and have the computer recognize that the device is there. The user doesn't have to tell the computer. |
| IRQ address | In a computer, an interrupt request is a hardware signal sent to the processor that temporarily stops a running program and allows a special program, an interrupt handler, to run instead. Interrupts are used to handle such events as data receipt from a modem or network, or a key press or mouse movement. |
| I/O address | On x86-based PCs, a number used to identify a peripheral device, such as a disk, sound card or serial port. The address, which is expressed as a hex number (1F0, 37F, etc.), must be unique. |
| Heuristic analysis | Antivirus programs employ a "self-learning style" of analysis in order to find previously unknown computer viruses or to detect new variants of known viruses, often executed using a virtual machine. |