A software application that can display advertising banners while the program is running or via some other triggering mechanism. Adware delivery systems are most often integrated into free applications as a way for developers to recover costs or generate revenue.
A critical eye has been placed on adware since in many cases, in addition to downloading ads, they may also upload user information collected to a third party without explicit permission.
Software which, when installed onto a computer, scans all programmes to detect and remove viruses.
A piece of information such as a document, presentation or image that can be added to an email and sent over the Internet.
An intentional act of attempting to bypass one or more computer or network security controls.
To verify the identity of a user, user device, or other entity, or the integrity of data stored, transmitted, or otherwise exposed to unauthorised modification in an information system, or to establish the validity of a transmission.
'Authentication' - security measure designed to establish the validity of a transmission, message, or originator, or a means of verifying an individual's authorisation to receive specific categories of information.
A domain name is the unique name of a website on the Internet. Internet users access your website using your domain name.
The domain name that this Security Centre is on is 'aib.ie'.
Encryption scrambles or codes information to protect it when encrypted information is sent over the Internet, unauthorised users cannot read the information.
AIB uses 128-bit SSL Encryption, which is the industry standard.
A way to make data unreadable to everyone except the receipient of a message. Encryption is often used to make the transmission of credit card numbers secure for those who are shopping on the Internet.
A device or program designed to prevent unauthorised access to a computer, while it's connected to the Internet.
Unauthorised user who attempts to or gains access to an information system and the data it supports.
A crime in which an impostor obtains key pieces of personal information, such as Social Security or driver's licence numbers, in order to impersonate someone else. The information can be used to obtain credit, merchandise, and services in the name of the victim, or to provide the thief with false credentials.
A company that provides access to the Internet.
A program that logs a user's keystrokes and may transmit that information to a fraudster. Key Loggers can infect a computer from an email or directly from a website.
A government initiative to educate the public about the safe use of the internet in the areas of online fraud, identity theft and child safety.
The operating system is the foundation on which programs are built. It controls the allocation and usage of hardware resources, such as memory, central processing unit (CPU) time, disk space and peripheral devices.
The closed padlock symbol appears at the bottom of your browser window to show you that you are visiting a secure web page.
Phishing attacks use both social engineering and technical subterfuge to steal consumers' personal identity data and financial account credentials. Social-engineering schemes use 'spoofed' e-mails to lead consumers to counterfeit websites designed to trick recipients into divulging financial data such as credit card numbers, account usernames, passwords and social security numbers.
Hijacking brand names of banks, e-retailers and credit card companies, phishers often convince recipients to respond.
A fraudulent practice in which malicious code is installed on a personal computer or server, misdirecting users to fraudulent websites without their knowledge or consent. Pharming has been called "phishing without a lure."
Unsolicited advertising that appears as a " pop-up" window on a computer screen. Sometimes these can be created to look like a financial institution's request for personal information.
When you log in to Internet Banking you are said to be in a "secure session".
You can tell if you're accessing a secure website when the address begins with 'https', and a closed padlock appears on your browser window (in Internet Explorer it is at the bottom right-hand side of your screen).
Depending on your browser, a pop-up window may appear to let you know you that you will be entering a secure page.
Site certificates form an essential part of providing reassurance that the site you are visiting is genuine.
A site certificate shows you that a secure connection has been established and secure communication can take place. It will also demonstrate that you are not being tricked to enter your details on a fraudulent website.
SSL technology encodes information that is sent over the Internet between your computer and AIB Internet Banking websites, helping to ensure that the information remains confidential.
A server is a computer that provides services to other computers in a network - such as access to files, access to shared peripherals or the routing of e-mail.
Shoulder surfing is when someone looks over your shoulder to observe what you are doing on a computer or ATM.
Beware of anyone standing or sitting closely behind you, as this is one of the easiest ways of obtaining your PAC, passwords, PIN or other personal details.
A software install that is performed to enhance or repair a previously installed computer program.
Spam is unsolicited e-mail, commercial e-mail or unsolicited bulk e-mail that the recipient does not want to receive.
Spyware is a computer program which can be installed on personal computers (usually without permission from the owner) and has the purpose of collecting information and sending it back to another source - usually an Internet marketing website.
Impersonating another person or computer, usually by providing a false email name, URL or IP address.
A Trojan Horse program is a malicious program that pretends to be a benign application; a Trojan Horse program purposefully does something the user does not expect. Trojans are not viruses since they do not replicate, but Trojan horse programs can be just as destructive and may be spread as a result of a viral infection.
Self-replicating, malicious code that attaches itself to an application program or other executable system component and leaves no obvious signs of its presence.
Independent program that replicates from machine to machine across network connections often clogging networks and information systems as it spreads.