Glossary of Terms:
Anti-Spyware ProgramAntivirus ProgramAutomatic Disconnection
in the Absence of Activity
Declaration of PrivacyDigital Signature
Hacker / Cracker
Secure SessionSecure Socket Layer (SSL/TLS)Security VulnerabilitiesSmart CardSPAMSpyware
A program that combats spyware in order to protect your computer from spyware being installed.
The use of such programs improves the level of the security on your computer and of the information stored on it.
An antivirus program is designed to identify known viruses (which in themselves are a type of program), to prevent them from getting onto your computer and to eliminate them.
New viruses are distributed rapidly, and therefore, it is important to update the antivirus program on a current basis.
For data security reasons, websites that require a high level of security are automatically disconnected after a set period of inactivity.
Back to top
Biometrics is an identification and authentication technique based on physical information about a person, such as: fingerprint, iris recognition, palm vein recognition or voice signature.
Software for viewing web pages. For example: Firefox, Internet Explorer, and Netscape Navigator.
Hacker: a concept used to describe different types of computer experts, especially computer experts who have the technical knowledge to circumvent boundaries. They are known for their programming and rapid program writing skills.
Back to top
A type of fraud that involves collecting personal information in order to impersonate the owner of the information, such as: date of birth, bank account details and driver's license details. The information collected is used to conduct unlawful actions, to purchase products and services or to attempt access to bank accounts. Fraudsters exploit human nature to choose passwords that are easy to guess, such as: names of children, pets, addresses or dates of birth.
Back to top
Ransomware is computer malware that installs covertly on a victim's computer, executes a cryptovirology attack that adversely affects it, and demands a ransom payment to restore it.
When logging in to a bank website, after typing in username and password, the web user is transferred to a "secure zone" in which executed transactions are encrypted using a protocol such as SSL (see separate explanation). Sometimes, in order to emphasize entry and leaving of a secure zone, a window appears stating the change of zone.
A protocol that enables highly secure and encrypted communication. It enables encrypted traffic between your browser and the web server.
Software faults or errors (security weaknesses or bugs). These vulnerabilities are liable to be exploited by unauthorized entities/hackers in order to log in to computer networks, applications and databases. When such vulnerability is discovered, antivirus companies generally issue a patch or a fix to resolve the vulnerability.
A smart card stores information and applications on a processor component integrated in the body of the card. A digital certificate can also be installed on the card (see separate explanation) to identify users to the system.
Companies purchase databases containing lists of email addresses to distribute advertising material about them. For the most part, such information is not useful and constitutes a nuisance. There are several automated software tools that identify such mail and prevent it from entering your inbox, redirecting it instead to the junk mail folder or deleting it.
A computer program that secretly tracks the surfing habits of the users on the computer on which it is installed, and that transfers the information about these habits to the sites that planted them.
Spyware is designed to identify user preferences and areas of interest, generally in order to custom tailor advertisements to users when they surf the Internet, for purposes of financial gain.
Automatic password generator which displays one-time passwords valid for a short, pre-specified time period.