Android |
Google's brand name for its mobile operating system. Uses a traditional open-install
model for software; anti-virus is recommended. |
Anti-virus |
Anti-malware software that usually tries to recognize virus/malware looking for files
that look for previously known and analyzed malware files. |
Bot |
Malware that provides interactive control of your PC to criminals, often for the purpose
of attacking other computers, stealing information or sending spam. From the term
'robot'. |
Confidential Data |
Educational records and business files, including faculty/staff email, are considered
Confidential data. University Confidential data must be protected by a unique account password
assigned to each account that has access to the data. |
Data Breach |
An incident that results in the confirmed disclosure—not just potential exposure—of
data to an unauthorized party.1 ISO incidents that result in a notice to affected parties of potential data exposure,
either legally mandated or voluntary, as Data Breaches. |
Drive-by Download |
A malware download and install that takes place simply because you use an out-of-date
browser or computer to access a malicious website (or legitimate website with malicious
ads). |
Guideline |
Recommended actions and operational guides. More general than procedures, and optional,
in contrast to standards. |
iOS |
Apple's brand name for its mobile operating system. Uses a "walled garden" security
model; "jailbreaking" iOS devices removes this security. |
Java |
Programming language and min-operating system; used on most personal computers and
some mobile devices. |
Malware |
Any malicious software designed to operate on your computer without your consent. |
Phishing |
Any message with an urgent request to reply or click a link or open a file. It's
designed to trick you into giving away your passwords, sending money or infecting
your computer.. |
PIN |
Personal Identification Number, used like a password, but weaker |
Policy |
An organization-wide statement produced by senior management, or the appropriate policy
board or committee, that dicates organizational goals for specific scopes, e.g information
security. |
Procedure |
Detailed step-by-step instructions to achieve a certain task. More specific than
guidelines and policies. |
RESTRICTED Data |
Data, which if disclosed to unauthorized parties results in legally or contractually
required costs or fines, is considered RESTRICTED data. Examples of RESTRICTED data
include Social Security & Credit Card numbers, as well as Health Records. University
RESTRICTED data must be protected by encryption when stored or transmitted. See Schedule A for a detailed list of RESTRICTED data fields. |
Security Event |
Some change, reconnaissance or attack make against Pepperdine people, systems or data. |
Security Incident |
A security event that compromises the integrity, confidentiality or availability of
an information asset.1 ISO security events that are investigated as possible incidents receive this label
in our tracker. |
Spam |
Unsolicited email offers to sell you goods and services |
Standard |
A mandatory technology, result or procedure to be applied in all appropriate situations. |
Trojan |
Malware that spreads because you install or download it for certain legitimate functions,
but it carries out hidden, harmful functions - for example, stealing information.
AKA Trojan Horse. |
Updates |
Software patches to close security holes and fix bugs in software. |
Virus |
Malware that spreads by copying itself into files; as the files spread, so does the
virus. |
Vishing |
A unexpected call or voice chat, typically purporting to be from an unknown technician,
asking you to take actions or provide access to your computer or device. |
Worm |
Malware that spreads by copying itself across the network to other computers. |