Translate Page To German Tranlate Page To Spanish Translate Page To French Translate Page To Italian Translate Page To Japanese Translate Page To Korean Translate Page To Portuguese Translate Page To Chinese
  Number Times Read : 927    Word Count: 2008  
Categories

Arts & Entertainment
Business
Career
Cars and Trucks
Celebrities
Communications
Computers
Culture and Society
Disease & Illness
Environment
Fashion
Finance
Food & Beverage
Health & Fitness
Hobbies
Home & Family
Inspirational
Internet Business
Legal
Online Shopping
Pets & Animals
Politics
Product Reviews
Recreation & Sports
Reference & Education
Religion
Self Improvement
Travel & Leisure
Vehicles
Womens Issues
Writing & Speaking
 


   

Online Banking and E-Commerce: Terms and Definitions



[Valid RSS feed]  Category Rss Feed - http://articlespromoter.com/rss.php?rss=272
By : Ann Knapp    99 or more times read
Submitted 0000-00-00 00:00:00
Access to information and entertainment, credit and financial services, and products from every corner of the world is greater than earlier generations could ever have imagined. Thanks to the Internet, consumers may order products, download games and music, or conduct online banking 24 hours a day.

However, the flip side is that the Internet also affords online scammers, hackers, and identity thieves access to personal computers, information, finances, and much more. According to the Federal Trade Commission, there are millions of victims of identity theft a year. It's often difficult to know how thieves obtain a victim's personal information, but instances of ID theft often start when online data is stolen.

The following is a glossary of terms, provided by the Federal Trade Commission, aimed at educating consumers on various software and computer scams used to steal and protect individuals from ID theft:

Anti-Virus Softare

Protects personal computers from viruses that can destroy data, slow a computer's performance, cause a crash, or even allow spammers to send email through a private account.

Bizopps

Shorthand for "business opportunity;" some schemes involve extravagant and unfounded earnings - claims and are actually fraudulent business ventures.

Browser Highjacker

A common spyware program that changes a web browser's home page automatically, even if the owner changes it back.

CAN-SPAM Act

A law that prohibits senders of unsolicited commercial email from using false or misleading header information or deceptive subject lines, and requires they identify each email as an advertisement, among other provisions.

Download

To copy files from one computer to another; to view a website or other web material with a browser.

Drive-by Download

Software that installs on a computer without the owner's knowledge when he or she visits certain websites. To avoid drive-by downloads, make sure to update operating system and Web browser regularly.

Encryption

The scrambling of data into a secret code that can be read only by software set to decode the information.

End User Licensing Agreement (EULA)

A provider's legal terms. An "end user" may be required to "click" to accept before downloading software.

Exposure

When sensitive data is released to someone without authorization.

Filter

Software that screens information on the Internet, classifies its content, and allows the user to block certain kinds of content.

Firewall

Hardware or software that helps keep hackers from using a personal computer to send out personal information without permission.

Hacker

Someone who uses the Internet to access computers without permission.

Hidden Dialers

Programs that a user may unknowingly download that can use a computer to silently dial expensive phone calls which later show up on a phone bill.

IP Address

A computer's "address," which consists of a series of numbers separated by periods.

Keystroke Logger

A device or program that records each keystroke typed on a particular computer.

Malware

Criminals sometimes use malware, programs like viruses and spyware, to get into a personal computer. Once there, the criminal can steal information, send spam, and commit fraud

Online Profiling

Compiling information about consumers' preferences and interests by tracking their online movements and actions in order to create targeted ads.

Personal Information

Information that can identify someone, such as bank and credit card numbers; income; Social Security Number; or name, address and phone numbers

Phishing

A scam that involves Internet fraudsters who send span or pop-up messages to lure personal information from unsuspecting victims.

Spam Zombies

Home computers that have been taken over by spammers who then use them to send spam in a way that hides the true origin.

Spam

Unsolicited commercial email, often sent in bulk qualities.

Spyware

Software program that may be installed on a personal computer without the owner's consent to monitor his or her use, send pop-up ads, redirect the computer to certain websites, or record keystrokes, which could lead to identity theft.

Trojans

Programs that, when installed on a computer, can enable unauthorized people to access it and sometimes send spam from it.

Virus

A program that can sneak onto a computer - often through an email attachment - and then make copies of itself, quickly using up all available memory.

Wi-Fi Protected Access (WPA)

A security protocol developed to fix flaws in WEP. Encrypts data sent to and from wireless devices within a network.

Worm

A program that reproduces itself over a network and can use up a computer's resources and possibly shut the system down.

With awareness as a safety net, computer users conducting online banking or other activities that require the use of personal information can minimize the chances of identity theft. Vigilance is required when it comes to protecting personal information, a computer, and even yourself.
Author Resource:- AmericanMomentumBank.com provides a wide array of personal banking and business banking options and banking solutions tailored to your individual needs. For more information, please visit AmericanMomentumBank.com.
Article From Articles Promoter Article Directory

HTML Ready Article. Click on the "Copy" button to copy into your clipboard.




Firefox users please select/copy/paste as usual
New Members
select
Sign up
select
learn more
Affiliate Sign in
Affiliate Sign In
 
Nav Menu
Home
Login
Submit Articles
Submission Guidelines
Top Articles
Link Directory
About Us
Contact Us
Privacy Policy
RSS Feeds

Actions
Print This Article
Add To Favorites

 

Free Article Submission

Website Security Test