Advertisement
Tech

Can You Quarantine a Computer Virus? Learn Definitions & Descriptions of Common Security Terms

If you’re new the computing world, all of the acronyms, nomenclature, and strange terms can become a little intimidating. It’s my hope that this dictionary series will help you absorb this information and shed some light on the world of “techno babble.”

By Finn Orfano
Desk Tech
Reading time 3 min read
Word count 488
Smb security Computing Securitytraining
Can You Quarantine a Computer Virus? Learn Definitions & Descriptions of Common Security Terms
Advertisement
Quick Take

If you’re new the computing world, all of the acronyms, nomenclature, and strange terms can become a little intimidating. It’s my hope that this dictionary series will help you absorb this information and shed some light on the world of “techno babble.”

On this page

Q - R

Q

Quarantine

Advertisement

Often used in reference to a virus or malicious software application that has been detected by an antivirus program. For example, file(s) deemed malicious in nature or possible altered/damaged by a virus would automatically be quarantined for deletion or restoration as the case may be.

Query

Advertisement

A request for information. A query can be sent from any number of network devices or software applications. A query usually requests specific types of information such as the status level of a network port or a set of data from a database.

R

Advertisement

Regression Analysis

A series of tests comprised of mock data used to analyze a software application. This assists developers by enabling them to plan for all possible scenarios of data input. This process can help detect bugs and security vulnerabilities early on in the course of software development.

Advertisement

Regression Testing

Although similar to regression analysis, regression testing has a distinct purpose. The purpose is to thoroughly test patches or updates made to an existing application to ensure that additional security issues are not introduced by the intended fix.

Advertisement

Risk Assessment

A vitally important part of information security analysis. The product of a risk assessment is usually a report that reveals vulnerabilities, estimated costs due to exploitation of those vulnerabilities, and the cost of fixing or preventing these vulnerabilities. Essentially it is an educated guess of what would happen during a worst-case-scenario. A risk assessment should be the first step in the network hardening process.

Advertisement

Role Based Access Control

A process by which individual users or groups of users are assigned specific security roles. These roles determine which systems these users can have access to and the extent of that access. Role based access control is an excellent way to properly structure and organize the security architecture of a network.

Advertisement

Rootkit

A set of programs or utilities that “camouflage” their existence, enabling them to run undetected at the root of a system (i.e. registry of a PC). As the name implies, it can potentially give an attacker root access to a system which translates to total control.

Advertisement

This post is part of the series: Common Security Terms Dictionary

If you’re new the computing world, all of the acronyms, nomenclature, and strange terms can become a little intimidating. It’s my hope that this dictionary series will help you absorb this information and shed some light on the world of “techno-babble.”

  1. Common Security Terms Dictionary: A to B
  2. Common Security Terms Dictionary: C to D
  3. Common Security Terms Dictionary: E to F
  4. Common Security Terms Dictionary: G to H
  5. Common Security Terms Dictionary: I to K
  6. Common Security Terms Dictionary: L to M
  7. Common Security Terms Dictionary: N to O
  8. Common Security Terms Dictionary: P
  9. Common Security Terms Dictionary: Q to R
  10. Common Security Terms Dictionary: S
  11. Common Security Terms Dictionary: T
  12. Common Security Terms Dictionary: U - V
  13. Common Security Terms Dictionary: W - Z
Keep Exploring

More from Tech

Filed under
Smb security Computing
More topics
Securitytraining
Advertisement