CSCE 4560/5560 - Secure Electronic Commerce

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/18

flashcard set

Earn XP

Description and Tags

These flashcards cover key vocabulary and concepts related to threats and attacks in secure electronic commerce.

Last updated 4:32 PM on 4/17/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

19 Terms

1
New cards

DDoS

Distributed Denial of Service; an attack that involves multiple compromised devices overwhelming a target system.

2
New cards

Botnet

A collection of compromised computers controlled by an attacker, typically used to launch DDoS attacks.

3
New cards

SQL Injection

A code injection technique that exploits a security vulnerability in an application's software by manipulating SQL queries.

4
New cards

Cross-Site Scripting (XSS)

A security vulnerability that allows an attacker to inject malicious scripts into content from otherwise trusted websites.

5
New cards

Social Engineering

The psychological manipulation of people into performing actions or divulging confidential information.

6
New cards

Buffer Overflow

A situation where a program writes more data to a block of memory, or buffer, than it was allocated for.

7
New cards

Threat Components

Elements that dictate how threats manifest, including threat agents, capabilities, inhibitors, amplifiers, and catalysts.

8
New cards

Threat Agents

Individuals or groups that actively seek to exploit vulnerabilities for malicious intents.

9
New cards

Natural Threats

Threats from environmental events such as fires or floods.

10
New cards

Human Threats

Threats originating from human actions, which can be benign, malicious, or non-hostile.

11
New cards

Reconnaissance

The initial step in a successful attack where attackers discover key elements of a network or system.

12
New cards

Modification

A form of attack where an unauthorized party changes an asset without permission.

13
New cards

Exfiltration

The act of stealing files or data from a system during a cyber attack.

14
New cards

Denial of Service (DoS) Attack

An interruption or degradation of service availability to legitimate users.

15
New cards

Anger (Retaliatory) Motivation

A criminal motivation arising from rage, aimed at correcting perceived injustices.

16
New cards

Sadistic Motivation

Deriving pleasure from the pain or suffering inflicted on others.

17
New cards

Profit-oriented Motivation

The drive to commit cyber crimes for material or personal gain.

18
New cards

Network Layer Attack

DDoS attacks that target network infrastructure using high traffic volume typically at Layer 3/4.

19
New cards

Application Layer Attack

DDoS attacks that target specific applications, often appearing legitimate, at Layer 7.