Cyber Security and Hacker Terms Flashcards
Adware
Software designed to force pre-chosen ads to display on your system.
Back Door
A point of entry that circumvents normal security and can be used by a cracker to access a network or computer system.
Black Hat
Just like in the old westerns, these are the bad guys. Another name for a bad hacker, or cracker.
Bot
A software “robot” that performs an extensive set of automated tasks on its own. They can be instructed to perform a number of destructive tasks.
Cookies
A small packet of information from a visited webserver stored on your system by your computer’s browser. It is designed to store personalized information in order to customize your next visit.
Cracker
A bad, or black hat, hacker.
DOS
Denial of Service Attack. Designed to overwhelm a targeted website to the point of crashing it.
Dumpster Diving
The act of rummaging through the trash of an individual or business to gather information that could be useful for a cyber criminal to gain access to a system or attain personal information to aid them in identity theft or system intrusion.
Easter Egg
A non-malicious surprise contained in a program or on a circuit board installed by the developer.
Firewall
A security barrier designed to keep unwanted intruders “outside” a computer system or network while allowing safe communication between systems and users on the “inside” of the firewall.
Gray Hat
A white hat/black hat hybrid. Thankfully, like white hats, their mission is not to do damage to a system or network, but to expose flaws in system security.
Hacker
Originally, it was a label for someone who applied ingenuity to achieve a clever result. Today, it refers to those who gain illegal access to another computer and to cause damage or steal information
Cyber Squatting
Scammers who register a web address that has almost the same address as a legitimate site in order to trick users to going to their site.
Malware
A malicious program that causes damage
Phishing
A form of social engineering carried out by black hats in electronic form, usually by email, with the purpose of gathering sensitive information