Security terms
This section describes usage for specific security terms. For definitions of security terms, see the Microsoft Malware Protection Glossary.
Term | Usage |
---|---|
antimalware | Use only as an adjective to describe a category of software used to detect and respond to malicious software, such as viruses, worms, trojans, and sometimes spyware and adware. |
antiphishing | Use only as an adjective to describe practices or a category of software used to detect and respond to phishing scams, which are attempts to trick individuals into revealing sensitive information, such as passwords or credit card numbers. |
antispyware | Use only as an adjective to describe software that detects and sometimes removes spyware. |
antivirus | Use only as an adjective to describe software that detects and responds to malware. Use antivirus instead of antimalware to differentiate between antispyware and other antimalware programs. Example Microsoft Security Essentials has both antivirus and antispyware capabilities. |
black hat hacker | Consider alternatives where possible. Examples computer criminal unauthorized user malicious hacker |
bullet-proof | Don’t use. |
deceptive software | Don’t use. Use unwanted software instead. |
hacker, hack | Use malicious hacker to refer to an unauthorized user who accesses a system with the intent to cause harm. If the unauthorized user’s intent isn’t known or isn’t malicious, use unauthorized user. Don't use hacker in content for a general audience. In general use, the term often has negative connotations. It’s OK to use hack and hacker in content for developers or in contexts where positive outcomes are involved, such as hackathons. Don’t use hacker to mean an amateur programmer. Don’t use hack to mean improvising a solution to a programming problem unless the positive context is well understood. |
insecure | Don’t use to mean not secure. |
lock | Don’t use to mean protect. |
malicious code | Don’t use. Use malware or malicious software instead. |
malicious user | Don’t use. Use malicious hacker instead. |
malware, malicious software | Use malware instead of malicious software to describe unwanted software installed without adequate user consent. Viruses, worms, and trojans are malware. If your audience might not be familiar with the term malware, define it as malicious software on the first mention. Example The security filter helps prevent malware (malicious software) from damaging your computer. |
spyware | Before using the term spyware to describe specific software, be certain the software has been identified as spyware. |
trojan horse, trojan | In content for a technical audience, it’s OK to shorten to trojan. |
unwanted software | Use as a general term for spyware, adware, and similar software. |
vulnerability | Don’t use to describe intentional software behavior. For example, don’t describe trusting a domain administrator to control any other domain within a forest as a vulnerability. On the first mention, use a modifier to identify the type of vulnerability:
For other security issues, use the most specific term that describes the issue. Define the term if the audience might be unfamiliar with it. If no specific term exists, use security issue. |
white hat hacker | Consider alternatives where possible. Example computer security expert |