Chapter 9 Flashcards
botnet
a network of private computers infected with malicious software and controlled as a group without the owners’ knowledge
Distributed Denial of Service attack
many hacked computers send a large number of simultaneous request to the server, causing servers to become overloaded and crash
hacktivism
people want to make a political statement by using technological means
data harvesters
criminals who only steal data to resell them
cash-out fraudster
someone who buys data from a data harvester
white hat hacker
good natured hacker
black hat hacker
cybercriminal
social engineering
forger who impersonates an identity of a person or company in which people or companies are fooled
spear phishing attack
when there is a focus on a specific target group
spoofed message
messages which pretend to be from a friend
zero-day exploits
attacks that are so new that they have not been processed in security systems yet
biometrics
technologies that measure human characteristics
SQL injection technique
people can be registered and removed from the file of a website
intrusion detection system
help to stop these types of criminals (SQL injection technique criminals) because this type of software specialises in identifying unauthorised behavior
malware
malicious software that searches for weak spots in a security system