Security A to Z: Glossary of the most important terms

Understand what the most important security terms mean?

Author: Eija Paajanen
Date: 07.10.2015
Read Time: 1 Minutes

Security and cyber security are all over the media currently. But have you ever wondered what all the different IT security terms really mean?

We hope to demystify cyber security for you. Learn to speak like a pro and check out the most important security terms with our official explanations from F-Secure Labs.

Here are some examples:

CLIENT / ENDPOINT

PC/Mac workstation or laptop, or a mobile phone. Basically anything that runs code, and capable of running security software. The basic definition of a client is a device that can run independent applications, while a terminal is just a screen that input access to computer that is somewhere else.

REMOTE CODE EXECUTION

In computer security, remote code execution means that an outside party being able to run arbitrary commands on a target machine or in a target process, almost always with malicious intent. Remote code execution is usually the goal of a system or program exploit, as it essentially means an attacker can take complete control of the compromised machine.

TWO-FACTOR AUTHENTICATION

User login method that requires information in addition to a username and password. A typical example of two-factor authentication would be verification through an SMS.

Download the “Security A to Z” presentation slides or learn more at our SlideShare page.


Post Comment

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s