Glossary

Bitlocker 

Bitlocker is a security program from Microsoft for certain Windows operating systems. This security program is used to secure files, against theft or even physical deletion. The files are encrypted so that only authorized persons have access to the file.

Botnet

A botnet is a program that has remote access to a PC. If several PCs are connected together by remote control, this is called a botnet. This is often used to infect several PCs. [1]

Cross-site scripting

Cross-site scripting is an attack method that uses the client’s vulnerability to attack the server. Thereby a malicious code is stored in a trustworthy environment, e.g. to change internet pages, to take over browsers or to take over passwords.

Distributed Denial of Service attack (DDoS)

Distributed Denial of Service (DDoS) attacks are distributed network attacks. The capacity limitations of each network resource are exploited. A DDoS attack occurs in which several requests are sent to the website in order to overload the capacity and thus disrupt the availability of the provided pages. Example pages for a DDoS attack could include online shopping sites, online casinos, or any other company or organization that provides online services.

Drive-by-Infection

Drive by Infection downloads malicious data without deliberately downloading the file. The infection occurs automatically and without the knowledge of the user, by calling up the website.

Emotet

Emotet is a new version of a malicious software. It affects the modern versions of the Windows operating system from Microsoft.

Mail header

The e-mail header is an information carrier that provides a lot of information about the sender, recipient, time of sending, arrival time, IP address, content and format. In addition, the e-mail header provides information about the stations the e-mail has taken. Both sender and recipient have access to the e-mail header.

Phishing

Phishers and spammers are getting better and better in the design and content of their mails. (Phishing: formed from the English term “fishing” for fishing and the onomatopoeically identical replacement of the “f” by a “ph”, where the “P” stands for “password”).

Pre-shared key

Pre-shared key is used to encrypt and decrypt data. As the name makes clear, pre-shared key can be thought of as a key. Therefore, it is necessary to share the pre-shared key with the desired parties beforehand

Privacy by Design

Privacy by Design is that the guidelines of data protection are implemented from the beginning, i.e. already during the development of a hardware for data processing. So that the guidelines are technically integrated.

Privacy by Default

Privacy by Default means that the factory settings comply with the privacy policy. This is especially to protect users with less IT/technical know-how.

Ransomware

Ransomware is a special kind of malicious software. It can lead to a restriction or prevention of access to data and systems. Either the system is blocked or user data is encrypted. This prevents certain programs from opening.

Often a ransom is demanded for the removal.

rendering engine 

Rendering Engine is a program that is used to process and display HTML.

Unifying Protocol

Unifying Protocol is a wireless data transmission method owned be Logitech. It allows wireless mice, keyboards, trackballs or touchpads to be wirelessly connected to the PC. There is no possibility to connect Unifying with Bluetooth or vice versa.