Chapter 19 Flashcards
A term that, depending on the context, may be applied to either (1) someone who breaks into computer systems, or (2) a particularly clever programmer.
Hacker
Someone who uncovers computer weaknesses without exploiting them. The goal of the white hat hacker is to improve system security.
white hat hackers
Computer criminals.
black hat hackers
Hordes of surreptitiously infiltrated computers, linked and controlled remotely, also known as zombie networks.
botnets
An attack where a firm’s computer systems are flooded with thousands of seemingly legitimate requests, the sheer volume of which will slow or shut down the site’s use. DDoS attacks are often performed via botnets.
distributed denial of service (DDoS)
A protester seeking to make a political point by leveraging technology tools, often through system infiltration, defacement, or damage.
hacktivists
A term that may, depending on the context, refer to either (1) breaking into a computer system, or (2) a particularly clever solution.
hack
Criminals who purchase assets from data harvesters to be used for illegal financial gain. Actions may include using stolen credit card numbers to purchase goods, creating fake accounts via identity fraud, and more.
cash-out fraudsters
Cybercriminals who infiltrate systems and collect data for illegal resale.
data harvesters
Code that unlocks encryption.
key (encryption)
When identity is proven by presenting more than one item for proof of credentials. Multiple factors often include a password and some other identifier such as a unique code sent via e-mail or mobile phone text, a biometric reading (e.g., fingerprint or iris scan), a swipe or tap card, or other form of identification.
multi-factor authentication
A con executed using technology, typically targeted at acquiring sensitive information or tricking someone into installing malicious software.
phishing
Scrambling data using a code or formula, known as a cipher, such that it is hidden from those who do not have the unlocking key.
encryption
Term used in security to refer to forging or disguising the origin or identity. E-mail transmissions and packets that have been altered to seem as if they came from another source are referred to as being “spoofed.”
spoofed
Attacks that are so new that they haven’t been clearly identified, and so they haven’t made it into security screening systems.
zero-day exploits