0% found this document useful (0 votes)
46 views3 pages

Unit 7 Working Online

The document provides definitions for various technical terms related to cybersecurity, online security, and computer usage. Some key terms defined include backing up files, being down or inactive, blacklisting users, creating strong passwords with multiple characters, servers being compromised, encrypting sensitive data, hacking networks or files, investing in security procedures, and preventing cyberattacks and cybercriminals from accessing systems.

Uploaded by

edzell
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
46 views3 pages

Unit 7 Working Online

The document provides definitions for various technical terms related to cybersecurity, online security, and computer usage. Some key terms defined include backing up files, being down or inactive, blacklisting users, creating strong passwords with multiple characters, servers being compromised, encrypting sensitive data, hacking networks or files, investing in security procedures, and preventing cyberattacks and cybercriminals from accessing systems.

Uploaded by

edzell
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

back up files /bæk ʌp faɪlz/ Archivos de Don’t forget to back up all

phrase respaldo your files so you have a copy.

be down phrase /bi daʊn/ Estar inactive, sin The website was down for
funcionar, caído nearly a week.

blacklisted adj /ˈblæklɪstɪd/ Estar en las listas The organization manages


negras databases of spammers and
blacklisted users for business
corporations.

character n /ˈkærəktə(r)/ Caracter, personaje, To make the password


carácter stronger, it has to be eight
characters including at least
one number and one capital
letter.

compromised /ˈkɒmprəmaɪzd/ Comprometido o en The servers were


adj riesgo, vulnerable compromised and the website
is down.

cover v /ˈkʌvə(r)/ Cubrir, abarcar Well, I think that covers


everything.

create a new /kriˈeɪt ə njuː Crear una nueva To prevent hackers, create a
password phrase ˈpɑːswɜːd/ contraseña new password every month.

cyberattack n /ˈsaɪbə(r) əˈtæk/ The organization became


another victim of a
cyberattack.

cybercrime n /ˈsaɪbə(r) kraɪm/ Have you ever been a victim


of cybercrime?

cybercriminal n /ˈsaɪbə(r) ˈkrɪmɪnl/ Despite our online security,


we couldn’t prevent
cybercriminals hacking the
system.

cybersecurity n /ˈsaɪbə(r) The company plans to


sɪˈkjʊərəti/ increase spending on
cybersecurity.

encrypt v /ɪnˈkrɪpt/ Codificar, encriptar Regularly changing passwords


and encrypting files is
important for online security.
encrypt data /ɪnˈkrɪpt ˈdeɪtə/ Codificar la Businesses need to encrypt
phrase información sensitive data so no one else
can read it.

excessive adj /ɪkˈsesɪv/ Employees can use the


Internet as long as it is not
excessive and during
lunchtime or breaks only.

fingerprint n /ˈfɪŋɡəprɪnt/ Huella digital I want to discuss the new


fingerprint technology for
company security.

hacker n /ˈhækə(r)/ Hackers managed to access


our company files.

invest in v /ɪnˈvest ɪn/ Invertir en If you follow basic security


procedures, then you might
not need to invest in more
security.

log on v /ˈlɒɡ ɒn/ Iniciar sesión Once you have your username
and password, you can log
on.

network n /ˈnetwɜːk/ Red, red de Hackers often access a


contactos network without the
company realizing there’s a
problem.

online security n /ˌɒnˈlaɪn Seguridad en línea Spamhaus had a special


sɪˈkjʊərəti/ understanding of online
security.

open /ˈəʊpən Abrir archivos Double-click this icon to open


attachments əˈtætʃmənts/ adjuntos the attachment on your
phrase email.

permission n /pəˈmɪʃn/ Employees are not allowed to


download or upgrade
software without permission.

personal details /ˈpɜːsənl ˈdiːteɪlz/ Datos personales Enter your personal details on
n pl the website.

personal use n /ˈpɜːsənl juːs/ Uso personal Employees mustn’t access the
Internet for personal use
during working hours.
policy n /ˈpɒləsi/ Política de la I have to change my password
empresa every 12 weeks because it’s
company policy.

prevent v /prɪˈvent/ Evitar, prevenir que To prevent hackers, create a


new password every month.

register v /ˈredʒɪstə(r)/ Do you know how I can


register with this website?

reliant adj /rɪˈlaɪənt/ Ser dependiente de Businesses are becoming


more reliant on the Internet.

run scans phrase /rʌn skænz/ Ejecutar un escaneo, Try running a scan to check
un análisis for a virus.

share documents /ʃeə(r) Compartir archivos I often open attachments and


phrase ˈdɒkjuments/ share documents for my job.

spammer n /ˈspæmə(r)/ Persona o bot que The attack was especially bad
realiza envío de because the organization
correo basura manages databases of
spammers.

sum up phr v /sʌm ʌp/ Resumir, sintetizar I’ll sum up the main points in
an email.

target v /ˈtɑːɡɪt/ Dirigir hacia Criminals are targeting


businesses, looking to steal
data from their servers.

temporary /ˈtemprəri Contraseña This is your temporary


password n ˈpɑːswɜːd/ temporal password. Log on with it and
then you need to choose a
new one.

upgrade software /ˈʌpɡreɪd Actualizer software How often do you upgrade


phrase ˈsɒftweə(r)/ your software?

victim n /ˈvɪktɪm/ The organization had become


another victim of a
cyberattack.

vulnerable adj /ˈvʌlnərəbl/ All organizations and


businesses are vulnerable to
cyberattacks.

You might also like