Send a link to your students to track their progress
76 Terms
1
New cards
Adware
Software that collects consumer surfing and purchasing data
2
New cards
Botnet
A network of hijacked computers
3
New cards
Bot Herder
Hackers that control hijacked computers
4
New cards
Click Fraud
Inflating advertising revenue by clicking online ads numerous times
5
New cards
DoS
Overloading an Internet service provider’s e‐mail server by sending hundreds of e‐mail messages per second from randomly generated false addresses
6
New cards
Email Threats
Sending an e‐mail instructing the recipient to do something or they will suffer adverse consequences
7
New cards
Hijacking
Gaining control of a computer to carry out unauthorized illicit activities
8
New cards
Internet Misinformation
Circulating lies or misleading information using the world’s largest network
9
New cards
Internet Terrorism
Using the Internet to disrupt communications and e‐commerce.
10
New cards
Key logger
Use of spyware to record a user’s keystrokes
11
New cards
Pharming
Diverting traffic from a legitimate Web site to a hacker’s Web site to gain access to personal and confidential information.
12
New cards
Phishing
E‐mails that look like they came from a legitimate source but are actually from a hacker who is trying to get the user to divulge personal information
13
New cards
Spamming
E‐mailing an unsolicited message to many people at the same time.
14
New cards
Splog
A spam blog that promotes affiliated Web sites to increase their Google PageRank.
15
New cards
Spyware
Software that monitors and reports a user’s computing habits
16
New cards
Spoofing
Making an e‐mail look like it came from someone else
17
New cards
Typosquatting
Creating Web sites with names similar to real Web sites so users making errors while entering a Web site name are sent to a hacker’s site.
18
New cards
Bluebugging
Making phone calls and sending text messages using another user’s phone without physically holding that phone.
19
New cards
Bluesnarfing
Capturing data from devices that use Bluetooth technology
20
New cards
Eavesdropping
Intercepting and/or listening in on private voice and data transmissions
21
New cards
Evil Twin
A rogue wireless access point masquerading as a legitimate access point
22
New cards
Packet Sniffing
Intercepting Internet and other network transmission
23
New cards
Phreaking
Using telephone lines to transmit viruses and to access, steal, and destroy data
24
New cards
Piggybacking
Gaining access to a protected system by latching on to a legitimate user
25
New cards
Vishing
E‐mails instructing a user to call a phone number where they are asked to divulge personal information.
26
New cards
War Dialing
Searching for modems on unprotected phone lines in order to access the attached computer and gain access to the network(s) to which it is attached
27
New cards
War Driving
Searching for unprotected wireless networks in a vehicle.
28
New cards
Chipping
Inserting a chip that captures financial data in a legitimate credit card reader
29
New cards
Data Diddling
Altering data during the IPO (Input‐Process‐Output) cycle
30
New cards
Data Leakage
Copying company data, such as computer files, without permission.
31
New cards
Identity Theft
Illegally obtaining confidential information, such as a Social Security number, about another person so that it can be used for financial gain.
32
New cards
Round-Down Fraud
Placing truncated decimal places in an account controlled by the perpetrator.
33
New cards
Salami Technique
Embezzling small fractions of funds over time.
34
New cards
Scavenging
Searching through garbage for confidential data
35
New cards
Dictionary Attack
Using software to guess company addresses, send them blank e‐mails, and adding unreturned messages to spammer e‐mail lists
36
New cards
Hacking
Gaining access to a computer system without permission.
37
New cards
Logic Bomb
Software that sits idle until a specified circumstance or time triggers it
38
New cards
Malware
Software used to do harm
39
New cards
Masquerading
Pretending to be a legitimate user, thereby gaining access to a system and all the rights and privileges of the legitimate user.
40
New cards
Password Cracking
Capturing and decrypting passwords to gain access to a system.
41
New cards
Piggybacking
Using a wireless network without permission
42
New cards
Posing
Creating a seemingly legitimate business, collecting personal information while making a sale, and never delivering the item sold
43
New cards
Pretexting
Acting under false pretenses to gain confidential information
44
New cards
Rootkit
Software that conceals processes, files, network connections, and system data from the operating system and other programs
45
New cards
Shoulder Surfing
Observing or listening to users as they divulge personal information
46
New cards
Skimming
Covertly swiping a credit card in a card reader that records the data for later use.
47
New cards
Social Engineering
Methods used to trick someone into divulging personal information
48
New cards
Software Piracy
Unauthorized copying or distribution of copyrighted software
49
New cards
Steganography
Concealing data within a large MP3 file.
50
New cards
Superzapping
Special software used to bypass system control
51
New cards
Trap Door
Entering a system using a back door that bypasses normal system controls
52
New cards
Trojan Horse
Unauthorized code in an authorized and properly functioning program.
53
New cards
Virus
A segment of executable code that attaches itself to software.
54
New cards
Worm
A program that can replicate itself and travel over networks.
55
New cards
Zero- Day Attack
Attack between the time a software vulnerability is discovered and a patch to fix the problem is released.
56
New cards
Address Resolution Protocol (ARP) spoofing
Fake computer networking protocol messages sent to an Ethernet LAN to determine a network host's hardware
57
New cards
Buffer Overflow Attack
So much input data that storage is exceeded; excess input contains code that takes control of the computer.
58
New cards
Carding
Verifying credit card validity.
59
New cards
Caller ID Spoofing
Displaying an incorrect phone number to hide the caller’s identity.
60
New cards
Cyber Extortion
A demand for payment to ensure a hacker does not harm a computer.
61
New cards
Cyber Bullying
Using social networking to harass another person
62
New cards
Economic Espionage
Theft of trade secrets and intellectual property.
63
New cards
E‐mail spoofing
Making an electronic communication appear as though it originated from a different source
64
New cards
IP Address Spoofing
Creating packets with a forged address to impersonate another computing system
65
New cards
Internet auction fraud
Using a site that sells to the highest bidder to defraud another person
66
New cards
Internet pump‐and‐dump fraud
Using the Internet to inflate a stock price so it can be sold for a profit.
67
New cards
Lebanese looping
Inserting a sleeve to trap a card in an ATM, pretending to help the owner to obtain a PIN, and using the card and PIN to drain the account
68
New cards
Man‐in‐the‐middle (MITM) attack
A hacker placing himself between a client and a host to intercept network traffic.
69
New cards
Podslurping
Using a small storage device to download unauthorized data from a computer.
70
New cards
Ransonware
Software that encrypts programs and data until a payment is made to remove it.
71
New cards
Scareware
Malicious software that people are frightened into buying
72
New cards
Sexting
Exchanging explicit messages and pictures by telephone
73
New cards
SQL Injection
Inserting a malicious database query in input in a way that it can be executed by an application program.
74
New cards
SMS Spoofing
Changing the name or number a text message appears to come from.
75
New cards
XSS Attack
A link containing malicious code that takes a victim to a vulnerable Web site. Once there, the victim’s browser executes the malicious code embedded in the link