NOTES
Encryption* - The process of scrambling or hiding information so that it cannot be
understood without the key necessary to change it back into its original form.
AES* - (Advanced Encryption Standard) An encryption standard based on the Rijndael
encryption algorithm that uses multiple steps to encrypt data.
Malware* - Programs such as viruses, worms, and bots designed to disrupt computer
operations.
Computer Virus* - A program designed to attach itself to a file, reproduce, destroy data,
display an irritating message, or otherwise disrupt computer operations.
Rootkit* - Software that conceals running processes; used by hackers to disguise
security breaches and break-ins.
Computer Worm* - A software program designed to enter a computer system, usually a
network, through security "holes" and then replicate itself and spread to other devices.
Internet Worm* - A type of malware that spreads over the Internet, usually by sending
itself to random IP addresses.
Trojan* - A computer program that appears to perform one function while actually doing
something else, such as inserting a virus into a computer system or stealing a
password.
Antivirus Software* - A computer program used to identify, isolate, and eliminate viruses
by scanning files as they arrive, leave, or are executed.
Heuristic Analysis* - In the context of antivirus software, the process of identifying
malware based not on a signature, but on other factors, such as context and behavior.
Ransomware* - Malware that encrypts files as part of an exploit to extort money from
victims who want to regain use of their files in unencrypted format.
Botnet* - A group of bots under the remote control of a botmaster, used to distribute
spam and denial-of-service attacks.
Firewall* - Software or hardware designed to analyze and control incoming and
outgoing packets on a network; used to enhance security by filtering out potential
intrusion attempts.