DIGITALSECURITYGUIDE Backup - An extra copy of computer files, usually kept physically separate from the originals. Essential for recovery when original files are damaged or lost. Digital signature - A way of using encryption to prove that a particular file or message was truly sent by the person claiming to have sent it. A digital signature typically depends upon three elements: public key encryption, a Certificate Authority and a digital certificate. End-to-end encryption - The way data is protected by encoding it at the starting point and then decoding it at the destination. The sender and the receiver are the only ones with the encryption key so noone can eavsdrop. Examples of end-to-end encryption include PGP for email and OTR for instant messaging. HTTPS - A variation of the web communication standard HTTP (HyperText Transfer Protocol) enabling secure data transmission. You can usually see if you are using HTTPS in the upper left corner of your browser’s address bar. IP address (Internet Protocol address) – A unique identifier assigned to your computer when it is connected to the Internet. Masking your IP address can help disguise your location and other personal details. Linux - An open source version of the UNIX operating system considered to be very secure. Keylogger - Software that monitors and captures everything a user types into a computer keyboard. Used for technical support and surveillance purposes. Can also be integrated into malware and used to gather passwords, user names, and other private information. Malware - Derived from "malicious software." Software designed to do harm by causing damage to systems or data, invading privacy, stealing information, or infiltrating computers without permission. Includes viruses, worms, Trojan horses, some keyloggers, spyware, adware, and bots. Virus - A programme that can self-replicate and infect files, programmes, and computer systems. Some viruses simply replicate and spread themselves, while others can also damage your computer system and data. Open source software - Computer software with a source code that can be seen, modified and distributed freely. Open source software is generally considered a safer alternative than proprietary software because developers can test or audit it to detect any backdoors. OTR (Off The Record) - Cryptographic protocol used for encrypting instant messaging conversations. For example, OTR is used with the Pidgin instant messaging program. PGP (Pretty Good Privacy) - A freeware program primarily for secure electronic mail. Alternative: GnuPG. OpenPGP is a protocol for encrypting email using public key cryptography and is based on PGP. Adware - Software that displays advertising content on your computer. Like its cousin spyware, some adware runs with your full knowledge and consent, some does not. More often an annoyance than a security risk, adware may also monitor browsing activities and relay that information to someone else over the Internet. Spyware - Software that collects information about your computer and how you use it and then relays that information to someone else over the Internet. Spyware ordinarily runs in the background and often installs itself on your computer without your knowledge or permission. 30