Skip to main content

Glossary
This is the Glossary for Totem’s Secure your devices course

Anti-malware: Also known as antivirus software, this is a computer program used to prevent, detect and remove malicious software.

Backup: A copy of computer data stored elsewhere so that it can be used to restore original data after this has been lost.

Bluetooth: A short-range wireless technology standard used for exchanging data between fixed and mobile devices over short distances using UHF radio waves.

Device: Also referred to in this course as network-connected device or electronic device, is a machine used to connect to the Internet or a mobile phone network. A device can be a desktop computer, a laptop, a mobile phone or smartphone, a tablet, a smart watch, a smart TV or any other Internet-connected machine.

Encryption: Encryption is the method by which information is converted into secret code that hides the information's true meaning.

File-based encryption (FBE): A cryptographic method that allows different files to be encrypted with different keys that can be unlocked independently.

Full Disk Encryption (FDE): A cryptographic method that applies encryption to the entire hard drive of a device, scrambling data, files, the entire operating system and software programs using a single encryption key.

Internet Service Provider (ISP): A company that provides Internet access.

IMSI: Internet Mobile Subscriber Identity. A code used by phone companies to identify a specific SIM card on a mobile network.

IMEI number: The IMEI (International Mobile Equipment Identity) is a unique number to identify mobile phone hardware connected to a phone network.

Kensington Security Slot: An anti-theft system consisting of a small, metal-reinforced hole commonly found on small or portable computers and electronics equipment.

Malware: Malicious computer software that runs on your computer with unintended and usually harmful consequences.

Operating system (OS): Software that acts as an interface between computer hardware components and the user.

Overwriting: In computer data storage, overwriting is the process of replacing old information with new information by literally writing text over it.

Password Manager: A password manager is a software application that is used to store and manage the passwords that a user has for various online accounts and security features.

Phishing: The act of trying to get someone to reveal data about themselves by sending them a message that seems to come from someone they trust.

Pirated or cracked operating system: This an unlicensed and unsupported copy of the official operating system (typically of Microsoft Windows).

Ransomware: Malware that requires the victim to pay a ransom to retrieve access to files encrypted by the malware.

Removable (storage) device: A device for storing and transporting data from one electronic device to another. For example, a USB flash drive, external hard disk drive, optical disk, etc.

Scam: A fraudulent business scheme or swindle.

Shoulder surfing: A visual hacking practice where thieves steal personal data such as your screen lock passcode or PIN number by spying over your shoulder as you use a laptop, ATM machine or other electronic device in public.

Spyware: A form of malware that secretly gathers information about a person or organisation and is designed to take partial or full control of a computer's operation without the knowledge of the user.

Virus: A type of malware program that replicates itself by modifying other computer programs and inserting its own code. When this replication succeeds, the affected areas are then said to be "infected" with a computer virus.