||Google's brand name for its mobile operating system. Uses a traditional open-install
model for software; anti-virus is recommended.
||Anti-malware software that usually tries to recognize virus/malware looking for files
that look for previously known and analyzed malware files.
||Malware that provides interactive control of your PC to criminals, often for the purpose
of attacking other computers, stealing information or sending spam. From the term
||Educational records and business files, including faculty/staff email, are considered
Confidential data. University Confidential data must be protected by a unique account password
assigned to each account that has access to the data.
|| An incident that results in the confirmed disclosure—not just potential exposure—of
data to an unauthorized party.1 ISO incidents that result in a notice to affected parties of potential data exposure,
either legally mandated or voluntary, as Data Breaches.
||A malware download and install that takes place simply because you use an out-of-date
browser or computer to access a malicious website (or legitimate website with malicious
||Recommended actions and operational guides. More general than procedures, and optional,
in contrast to standards.
||Apple's brand name for its mobile operating system. Uses a "walled garden" security
model; "jailbreaking" iOS devices removes this security.
||Programming language and min-operating system; used on most personal computers and
some mobile devices.
||Any malicious software designed to operate on your computer without your consent.
||Any message with an urgent request to reply or click a link or open a file. It's
designed to trick you into giving away your passwords, sending money or infecting
||Personal Identification Number, used like a password, but weaker
||An organization-wide statement produced by senior management, or the appropriate policy
board or committee, that dicates organizational goals for specific scopes, e.g information
||Detailed step-by-step instructions to achieve a certain task. More specific than
guidelines and policies.
||Data, which if disclosed to unauthorized parties results in legally or contractually
required costs or fines, is considered RESTRICTED data. Examples of RESTRICTED data
include Social Security & Credit Card numbers, as well as Health Records. University
RESTRICTED data must be protected by encryption when stored or transmitted. See Schedule A for a detailed list of RESTRICTED data fields.
||Some change, reconnaissance or attack make against Pepperdine people, systems or data.
||A security event that compromises the integrity, confidentiality or availability of
an information asset.1 ISO security events that are investigated as possible incidents receive this label
in our tracker.
||Unsolicited email offers to sell you goods and services
||A mandatory technology, result or procedure to be applied in all appropriate situations.
||Malware that spreads because you install or download it for certain legitimate functions,
but it carries out hidden, harmful functions - for example, stealing information.
AKA Trojan Horse.
||Software patches to close security holes and fix bugs in software.
||Malware that spreads by copying itself into files; as the files spread, so does the
||A unexpected call or voice chat, typically purporting to be from an unknown technician,
asking you to take actions or provide access to your computer or device.
||Malware that spreads by copying itself across the network to other computers.