Lexington Herald-Leader (KY)

January 13, 2002

SECURITY GLOSSARY

Edition: Final
Section: Technology and Your Money
Page: E1

Estimated printed pages: 2

Article Text:

Common terms used in computer security:

* Virus: A program that replicates itself across a network, or the Internet as a whole. The virus payload might be destructive, or it could try to overwhelm a network by copying itself.

* Worm: A virus that replicates itself without human intervention. If the victim has to open an e-mail attachment to get infected, it's a virus. But if the virus scans for new victims and attacks on its own, it's a worm.

* Trojan horse: A Trojan horse program is more than it seems. For example, it might look like a game, but instead it steals your personal information and sends it to a criminal.

* Password sniffer: A file that seeks out passwords on your computer, then sends them to a hacker.

* Blended threat: A program that combines the characteristics of viruses, worms and Trojan horses.

* Exploit: A program that takes advantage of a security hole in a computer program, like Microsoft Windows or AOL Instant Messenger.

* Spyware: A general term for a program that surreptitiously monitors your actions. While spyware can be sinister, such as a remote control program used by a hacker, software companies have been known to use spyware to gather data about customers. The practice is generally frowned upon.

* Virus signature: The "fingerprints" of a virus, which anti-virus programs use to identify and isolate viruses. Users should regularly update their anti-virus programs online to download the latest virus signatures, so they're protected against new viruses.

* Firewall: Software that monitors incoming and outgoing Internet traffic to your computer and checks for suspicious patterns. A firewall may alert you to spyware or a Trojan horse installed on your computer.

Copyright (c) 2002 Lexington Herald-Leader
Record Number: 0201140405