A Closer Look at Some Tech-ier Terms
It’s called “tech-speak” for a reason — because some of the truly technical terms in the tech world can appear almost like a foreign language to the untrained eye. At Pacific Premier Bank, we pride ourselves on our ability to connect and talk in ways that everyone can easily understand.
Algorithm: A process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer.
Cache: Portion of a computer’s hard disk space where a browser temporarily stores recently visited webpages to speed up internet surfing.
Cookie: A small file created by a website that is stored in the user’s computer either temporarily for that session only or permanently on the hard disk (persistent cookie). Cookies provide a way for the website to recognize you and keep track of your preferences.
Encryption: The translation of data into a secret code. Encryption is the most effective way to achieve data security by scrambling the contents into an unreadable form at.To read an encrypted file, you must have access to a secret key or password that enables you to read it. Encryption does not of itself prevent interception, but denies the message content to the interceptor.
Firewall: A part of a computer system or network that is designed to block unauthorized access while permitting outward communication.
IP Address: An IP (Internet Protocol) address is a numerical label assigned to each device (e.g. computer, printer) participating in a computer network that uses the Internet Protocol for communication. An IP address serves two principal functions: host or network interface identification and location addressing. Think of your home address. It has a number, street name, etc. to help identify where your house is located. An IP address tells the internet or your home network where your computer is.
Malware: An umbrella term used to refer to a variety of forms of hostile or intrusive software, including computer viruses, worms, Trojan horses, ransomware, spyware, adware, scareware, and other malicious programs. It can take the form of executable code, scripts, active content, and other software.
Phishing: The activity of defrauding an online account holder of financial information by posing as a legitimate company.
Social engineering: A cyberattack vector that relies heavily on human interaction and often involves tricking people into breaking normal security procedures.
Software Vulnerability: A security flaw, glitch, or weakness found in software or in an operating system (OS) that can lead to security concerns.
Spear-phishing: An e-mail spoofing fraud attempt that targets a specific organization, seeking unauthorized access to confidential data. Spear-fishing attempts are not typically initiated by “random hackers” but are more likely to be conducted by perpetrators out for financial gain, trade secrets or military information.
SSID: SSID (Service Set Identifier) is a case-sensitive, 32-alphanumeric character unique identifier attached to the header of packets sent over a wireless network.
Two-Factor Authentication: A method of confirming a user’s claimed identity by utilizing a combination of two different components.
Virtual Private Network (VPN): A private network that extends across a public network or internet. It creates an additional layer of security over an insecure network when the network infrastructure alone cannot provide it.
Vishing: Similar to phishing, but via phone call instead of email. Always validate the caller, especially when sensitive information is being addressed. Telephone Caller IDs can be manipulated by Fraudsters and should not be used to validate the caller.
Let’s Talk® More
We hope you’ve found this informative and helpful. All of us at Pacific Premier Bank remain devoted to safeguarding and ensuring your security while banking with us. We also welcome the opportunity to talk to you about meeting and exceeding any and all business and personal banking needs you may have.
Give us a call at 855.343.4070 and Let's Talk®.
Download Cybersecurity Guides
Cybersecurity at a Glance – A Brief Guide to Serious Security
Cybersecurity Matters – An In-Depth Look at Online Security