Glossary of key terms related to piracy, its causes, impacts, and legal aspects. Perfect for those who want to better understand this phenomenon.
Term | Definition |
---|---|
2FA (Two-Factor Authentication) | Authentication method requiring two different factors to gain access, enhancing security. |
Antivirus | Software that detects and removes malware and other threats from a system. |
Multi-factor Authentication (MFA) | Verification process using more than one method to confirm user identity. |
Encryption | Process of encoding data to prevent unauthorized access. |
Data Leak | Unauthorized disclosure of sensitive or private information. |
Firewall | System that monitors and controls network traffic based on security rules. |
HTTPS | Protocol for secure communication on the web using SSL/TLS encryption. |
Keylogger | Software or hardware that records keystrokes for spying or data theft. |
Penetration Testing | Controlled simulation of attacks to identify system vulnerabilities. |
Phishing | Fraudulent technique to obtain personal information by pretending to be a trusted entity. |
Privacy | Rights and practices to protect personal data and control its use. |
Privacy Policy | Document explaining how an organization collects, uses, and protects user data. |
Proxy | Server acting as an intermediary between user and the internet to protect identity and access. |
Ransomware | Malware type that blocks data access until a ransom is paid. |
Information Security | Practice of protecting data against unauthorized access, use, disclosure, or destruction. |
Strong Password | Password difficult to guess, usually combining letters, numbers, and symbols. |
Token | Device or code used for secure authentication. |
VPN (Virtual Private Network) | Private network creating a secure and encrypted connection over the internet. |
Zero Trust | Security model that assumes no entity, internal or external, is trusted by default. |
End-to-End Encryption | Encryption method where only sender and receiver can read the data. |
Malware | Malicious software designed to cause damage or unauthorized access to systems. |
Spyware | Software that collects user information without their knowledge. |