Chapter 19 Flashcards
botnets
Hordes of surreptitiously infiltrated computers, linked and controlled remotely, also known as zombie networks.
distributed denial of service (DDoS)
An attack where a firm’s computer systems are flooded with thousands of seemingly legitimate requests, the sheer volume of which will slow or shut down the site’s use. DDoS attacks are often performed via botnets.
zero-day exploits
Attacks that are so new that they haven’t been clearly identified, and so they haven’t made it into security screening systems.
hack
A term that may, depending on the context, refer to either (1) breaking into a computer system, or (2) a particularly clever solution.
CAPTCHAs
An acronym standing for completely automated public Turing test to tell computers and humans apart. The Turing test is, rather redundantly, an idea (rather than an official test) that one can create a test to tell computers apart from humans.
biometrics
Technologies that measure and analyze human body characteristics for identification or authentication. These might include fingerprint readers, retina scanners, voice and face recognition, and more.
hacker
A term that, depending on the context, may be applied to either (1) someone who breaks into computer systems, or (2) a particularly clever programmer.
intrusion detection systems
A system that monitors network use for potential hacking attempts. Such a system may take preventative action to block, isolate, or identify attempted infiltration, and raise further alarms to warn security personnel.
cash-out fraudsters
Criminals who purchase assets from data harvesters to be used for illegal financial gain. Actions may include using stolen credit card numbers to purchase goods, creating fake accounts via identity fraud, and more.
encryption
Scrambling data using a code or formula, known as a cipher, such that it is hidden from those who do not have the unlocking key.
honeypots
A seemingly tempting, but bogus target meant to draw hacking attempts. By monitoring infiltration attempts against a honeypot, organizations may gain insight into the identity of hackers and their techniques, and they can share this with partners and law enforcement.
whitelists
Highly restrictive programs that permit communication only with approved entities and/or in an approved manner.
blacklists
Programs that deny the entry or exit of specific IP addresses, products, Internet domains, and other communication restrictions.
certificate authority
A trusted third party that provides authentication services in public key encryption schemes.
spoofed
Term used in security to refer to forging or disguising the origin or identity. E-mail transmissions and packets that have been altered to seem as if they came from another source are referred to as being “spoofed.”