Your privacy matters to us

CaixaBank uses our own and third-party cookies to analyse your browsing habits in order to create data, personalise your browsing experience (e.g. language) and advertising, including showing you advertisements which are tailored to the profile created based on your browsing habits. Click for more information or to to set up or reject their use. Or, you can accept all cookies by clicking on "Accept and continue browsing".

Accept and continue browsing

Individuals
Selecciona tu segmento

Selecciona tu segmento

Close
  • Personal Banking
  • Business Banking
  • EN
    Change English for another

    Change English for another

    Close
    • Castellano
    • Català
    • Euskara
    • Galego
    • Valencià
    • Deutsch
    • English
    • Français
  • Corporate information
    • Work with us
    • CaixaBank Research
    • Communication room
    • Corporate responsibility
    • Corporate website
Oficinas
Menu
Close
 
  • ...Searching!

    Soon we will show results

  • Follow your search

    More results

CaixaBank (Ir a Inicio)

Hazte Cliente
Digital Banking
Log in

Glossary

  • Security
  • Glossary
Glossary
Move left
  • Information and assistance

    • 10 basic security tips
    • Security and CaixaBank
    • Phishing
    Close
  • Useful links

    • Glossary
    • CaixaBankProtect
    Close
Move right

Glossary

Glossary

Certificate

Digital document emitted by an independent entity that guarantees the identity of the systems and persons on Internet. The certificate security is protected by criptographic techniques.

Maliciuos Code

Any malevolent or illegal programme or one with intention to annoy. They are generally designed to function without the intervention of the user.

Password

Group of letters, ciphers and symbols, including phrases, used to identify users in a computer system. To ensure an effective password it should be chosen in a way that makes it difficult to be discovered by an attacker.

Chain letters

These are emails in which you are asked to send them on to more people so that these people also send them on. They are one of the possible sources of email problems, as they often contain false information, can be carriers of viruses etc.

Criptography

Area dealing with the security of transmission and storage of information.

Worm

Type of malicious code whose principal characteristic is that of copying from one system to another over the Internet.

Service denial

Computer attack that, without affecting the information contained in the system, leaves it out of order. The denial could be produced due to overloading or blocking of the machines.

Social engineering

Techniques that attempt to attack the computer systems by fooling their users and administrators. The majority of the techniques of social engineering are similar to swindles.

Espies - Spyware

The Spy programmes or spyware are malicious or fraudulent applications that are installed hidden within other programmes downloaded by the user. This type of programme can carry out various actions:

Some deal with collecting information from the system in which they are installed in order to send it over the Internet: others exist that continually show undesired publicity or modify pages shown to include links that were not included in the original. All these activities are hidden behind confusing authorizations, so that the user is not usually conscious of them.

More information about Spyware

Screening of contents

Group of technologies that permit a control of the information transmitted over the Internet. The filter of contents is used to block viruses sent by email, to control internet access of under age children etc.

Cookie

Information that, having been sent by an Internet server to the navigator, reappears in every new connection. This can be used for legitimate reasons such as for identification of users, or malevolent reasons such as for unauthorized storage of navigation guidelines.

Intrusion

Computer attack in which the attacker succeeds in obtaining complete control over the machine. During the intrusion the attacker can obtain and alter all the data in the computer, modify its operation and even attack other computers.

Deluge or spam

Undesired commercial mail sent over the Internet. The volume and content of the spam can cause considerable problems in the use of email services.

Phishing

A so Phishing attack uses misleading emails and fraudulent servers to deceive users of the Internet services. In the case of financial entities, its aim is to make users divulge their details, such as their credit card number or PIN access code.

More information about Phishing

Proxy or mediating server

Computer system whose mission is to act as mediator between one system and another via Internet. Amongst the missions of a Proxy are those of accelerating Internet access, content filtering of those have gained access and protection of the systems avoiding their direct communication.

Electronic signature

Digital information associated with a specific operation carried out over the Internet that, together with those certified, permits the guaranteeing of participants in a transaction.

Firebreak or firewall

Computer system that controls computer and service access on a net. This could be a specialist system or an installed programme (personal firewall). When this control is carried out on information transmitted and not simply on the connection, the system used is a proxy.

More information about firewall

Trojan

A malicious code camouflaged within another apparently useful and inoffensive programme. Trojans can be found within known programmes, making it necessary to control the source of software.

Virus

It is the best-known type. This is a programme that copies itself inside other programmes and attempts to reproduce itself the most times possible. Although it is not so in every case, the majority of times the virus, as well as copying itself, alters or destroys information in the systems in which it is running.

More information about viruses

Encoding

Codification of data through various mathematical techniques that guarantee its confidentiality during transmission.

  • Products

    • HolaBank Account
    • HolaBank Club
    • HolaBank Mortgage
    • HolaBank Insurance
    • HolaBank Cards
    • Online banking
  • Services

    • What is HolaBank?
    • Family time
    • Time to relax
    • I work here
    • I'm an investor
  • Communication and social networks

    • Communication(Opens in a new window)
    • Linkedin(Open in a new widnow)
    • Instagram(Open in a new widnow)
    • Facebook(Open in a new widnow)
    • Twitter(Open in a new widnow)
    • Youtube(Open in a new widnow)
    • Blog(Open in a new widnow)
    • See more on social networks
  • Awards and recognition

    • Awards
 
  • ...Searching!

    Soon we will show results

  • Follow your search

    More results

Add the branch finder app to your mobile phone

Download the app now

© CaixaBank, S.A. 2021

  • Cookies policy
  • Policy
  • Legal notice
  • Interest rates and information
  • MIFID
  • Legal information about CaixaBank, S.A.
  • ILUNION Tecnología y Accesibilidad, Certificación WCAG-WAI AA (Abre en ventana nueva)
  • ANAB Accredited
  • Sello de Excelencia EFQM (Abre en ventana nueva)
  • Banco más innovador (Abre en ventana nueva)
  • Certificación ISO
  • AQmetrix (Abre en ventana nueva)