Adware: A form of spyware that collects information about a user in order to display advertisements in the Web browser based on the information it collects from the user's browsing patterns.
DNS: Short for Domain Name System (or Service or Server), an Internet service that allows domain names to be translated into IP addresses and IP addresses into domain names. We use domain names (such as www.awbank.net) when referring to web addresses because they're easier to remember. However, the internet is actually based on the IP addresses that correspond with the domain names. Every time you type a domain name, a DNS service translates the name into the corresponding IP address. For example, the domain name www.awbonline.com might translate to 66.97.95.2. As a user, keep in mind, you will not see the IP address, you will only be able to view the domain name.
E-mail Spoofing: When an e-mail appears to have been originated from one source, yet it has actually been generated from another is known as e-mail spoofing. The act of forging an e-mail header ( the .....@awbank.net portion of an e-mail ) allows individuals who are sending "junk mail", or "SPAM" to author e-mails that can not cannot ( or can be difficult ) be traced back to the originator.
Firewall: A gateway designed to limit access to or from a private network. Firewall's can be used in both hardware and software. They are frequently used to prevent unauthorized users from accessing private networks. Firewall's regulate certain levels of security and maintain by acting as the "gatekeeper".
Identity Theft: A crime of stealing personal and/or financial information, such as name, Social Security Number, or account numbers from a person, with the intent to commit fraud.
IP Address: A unique identifier for a computer or device on a TCP/IP network. Networks using the TCP/IP protocol route messages based on the IP address of the destination. Each number can be zero to 255. For example, 66.97.95.2 could be an IP address.
IP Spoofing: A method used to obtain non-permitted access to computers, whereby the trespasser sends information to a computer with an IP address that seems to be coming from a trusted host. The hacker must find an IP address of a trusted host and then modify the packet headers so that it appears to come from that host. Newer routers and firewalls can offer protection against IP spoofing.
ISP: Short for Internet Service Provider, a company that provides Internet access for consumers as well as commercial industries. ISP's now provide customers with a variety of ways to connect to the Internet: dial up through a modem, where they provide an access phone number, cable internet access, DSL, or even TI and T3 lines. These service allow you the capability to log on to the Internet, surf the Web, utilize e-mail, or set up a small network.
Keystroke Logger: A programs that operates without a users knowledge and records all of the keystrokes. Once the keystrokes are logged, they are hidden in the machine for later retrieval or shipped raw to the attacker. The attacker then carefully goes through the data in hopes of either finding a password, or possibly other useful information. Often used for identity theft.
Malware: Short for malicious software, a program or file that is designed to specifically damage or disrupt a system, such as a virus, worm, or a Trojan horse.
next --->