Assisting Lawyers

Have a query? Call the Helpdesk
PII & RM: +603-2032 4511
General Line: +603-2050 2050
Font size
  • small text
  • medium text
  • large text

Word Challenge: CYBER

ANTIVIRUS (antivirus)
A software utility that detects, prevents, and removes viruses, worms, and other malware from a computer. Most antivirus programs include an auto update feature that permits the program to download profiles of new viruses, enabling the system to check for new threats. Antivirus programs are essential utilities for any computer but the choice of which one is very important. One antivirus program might find a certain virus or worm while another cannot, or vice-versa. Anti virus software is also known as an anti-virus program or a vaccine.**
Atur cara yang digunakan untuk mengesan dan menghapuskan virus komputer.*

FIREWALL (tembok api)
A software used to maintain the security of a private network. Firewalls block unauthorized access to or from private networks and are often employed to prevent unauthorized web users or illicit software from gaining access to private networks connected to the Internet. A firewall may be implemented using hardware, software, or a combination of both. A firewall is recognized as the first line of defence in securing sensitive information. For better safety, the data can be encrypted.**
Perisian atau perkakasan yang digunakan untuk mengawal capaian keluar dan masuk ke prasarana pengkomputeran organisasi berasaskan dasar keselamatan. Perisian atau perkakasan ini mempunyai petua semburan tembok api paras rangkaian tertib rotor.*

CLOUD STORAGE (simpanan di alam maya)
A cloud computing model in which data is stored on remote servers accessed from the Internet, or “cloud”. It is maintained, operated and managed by a cloud storage service provider on storage servers that are built on virtualization techniques.**
Tempat simpanan maklumat di pangkalan maya.

DATA BREACH (pelanggaran data)
An incident that involves the unauthorized or illegal viewing, access or retrieval of data by an individual, application or service. It is a type of security breach specifically designed to steal and/or publish data to an
unsecured or illegal location. A data breach is also known as a data spill or data leak.**
Kejadian yang berlaku sama ada dengan sengaja atau tidak sengaja yang menyebabkan maklumat sulit dibaca, dicapai oleh pihak luar atau tersebar.

COOKIE (kuki)
A text file that a Web browser stores on a user’s machine. Cookies are a way for Web applications to maintain application state. They are used by websites for authentication, storing website information/preferences, other browsing information and anything else that can help the Web browser while accessing Web servers. HTTP cookies are known by many different names, including browser cookies, Web cookies or HTTP cookies.**
Fail-fail (kecil) yang disimpan dalam komputer pengguna yang mempunyai maklumat spesifik komputer tersebut untuk memudahkan laman sesawang menjejak penggunaan laman tersebut.

HACKER (penggodam)
A person who can gain access into a computer system multiple times in many ways.
Orang yang dapat menggunakan sesuatu sistem komputer selepas mencuba berkali-kali dengan pelbagai cara.*

HARD DRIVE (cakera keras)
A data storage device used for storing and retrieving digital information.
**Peranti simpanan data yang digunakan untuk menyimpan dan mendapatkan semula maklumat digital.*

MALWARE (perisian hasad)
Any software that brings harm to a computer system. Malware can be in the form of worms, viruses, trojans,
spyware, adware and rootkits, etc, which steal protected data, delete documents or add software not approved by a user.**
Perisian yang direka bentuk untuk memusnahkan sistem komputer tanpa pengetahuan pemilik komputer. Contoh perisian ini ialah virus komputer, cecacing, kuda Trojan, perisian pintu belakang, perisian intip, perisian jenayah dan sesetengah perisian iklan. Perisian hasad berbeza daripada perisian cacat. Perisian hasad dicipta untuk tujuan jahat manakala perisian cacat merupakan perisian yang sah tetapi mengandungi pepijat.*

ONLINE (dalam talian)
Controlled by or connected to a computer and as an activity or service which is available on or performed using the Internet or other computer network.
Berada dalam talian.*

PHISHING (memancing data)
An attempt to acquire sensitive information by masquerading as a trustworthy entity in an electronic communication.
Cubaan dengan niat jahat dan menyalahi peraturan untuk mendapatkan maklumat sensitif dalam talian seperti usernames, passwords dan kad kredit, dengan menyamar sebagai entiti sah.*

RANSOMWARE (perisian tebusan)
Ransomware is a type of malware program that infects, locks or takes control of a system and demands ransom to undo it. Ransomware attacks and infects a computer with the intention of extorting money from its owner. Ransomware may also be referred to as a crypto-virus, crypto-Trojan or crypto-worm.**
Perisian hasad yang menyulitkan cakera keras komputer yang dijangkiti. Penggodam hanya akan mengembalikan semula data asal dalam cakera tersebut dengan perisian nyahsulit sekiranya pemilik komputer tersebut membayar tebusan.*

SPAM (spam)
Unsolicited or undesired emails.
E-mel yang tidak diminta atau diingini.

SPAMWARE (perisian spam)
Spamware is a software utility designed specifically by spammers for spamming. Spamware enables a user to
search, sort and compile a list of email addresses and provides an automated email broadcasting solution. This can be used to send spam or unsolicited emails to unsuspecting recipients. Not all software that sends bulk email is spamware, as email listserver software can be used for legitimate purposes, rather than spam.**
Perisian yang digunakan oleh penspam untuk menghantar e-mel spam secara automatik. Pakej perisian ini juga termasuk dalam alat pungutan e-mel.*

SPYWARE (perisian intip)
An infiltration software that secretly monitors unsuspecting users. It can enable a hacker to obtain sensitive information, such as passwords, from the user’s computer. Spyware exploits user and application vulnerabilities and is often attached to free online software downloads or to links that are clicked by users. Peer-topeer (P2P) file sharing has increased the proliferation of spyware and its ramifications.**
Perisian yang dipasang secara tersembunyi pada komputer peribadi untuk memintas atau mengambil sebahagian kawalan ke atas interaksi pengguna dengan komputer tanpa pengetahuan pengguna tersebut. Perisian ini secara rahsia mengawasi tingkah laku pengguna seperti laman web yang dilawati dan tabiat melayari Internet. Perisian ini juga dapat mengganggu kawalan pengguna terhadap komputer seperti memasang perisian tambahan dan mengalih aktiviti pelayar web. Selain itu, perisian ini dapat mengubah pengesetan komputer, mengakibatkan kelajuan capaian menjadi perlahan dan sambungan rangkaian terputus serta ketidakfungsian atur cara lain. Perisian intip boleh juga diklasifikasikan sebagai perisian langgar privasi.*

TROJAN (trojan)
A seemingly benign program that when activated, causes harm to a computer system. A Trojan horse is also known as a Trojan virus or Trojan Horse.**
Atur cara komputer yang berfungsi sebagai umpan seperti kuda Troy dalam dongeng Yunani. Atur cara ini kononnya berfaedah tetapi sebenarnya mengandungi suruhan yang diletakkan oleh pencipta atur cara untuk menceroboh keselamatan sistem komputer apabila atur cara digunakan.*

Credit:
* Portal atas talian Dewan Bahasa dan Pustaka Malaysia.
** www.techopedia.com