Cyber Security and Hacker Terms Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Adware

A

Software designed to force pre-chosen ads to display on your system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Back Door

A

A point of entry that circumvents normal security and can be used by a cracker to access a network or computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Black Hat

A

Just like in the old westerns, these are the bad guys. Another name for a bad hacker, or cracker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Bot

A

A software “robot” that performs an extensive set of automated tasks on its own. They can be instructed to perform a number of destructive tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cookies

A

A small packet of information from a visited webserver stored on your system by your computer’s browser. It is designed to store personalized information in order to customize your next visit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cracker

A

A bad, or black hat, hacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DOS

A

Denial of Service Attack. Designed to overwhelm a targeted website to the point of crashing it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Dumpster Diving

A

The act of rummaging through the trash of an individual or business to gather information that could be useful for a cyber criminal to gain access to a system or attain personal information to aid them in identity theft or system intrusion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Easter Egg

A

A non-malicious surprise contained in a program or on a circuit board installed by the developer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Firewall

A

A security barrier designed to keep unwanted intruders “outside” a computer system or network while allowing safe communication between systems and users on the “inside” of the firewall.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Gray Hat

A

A white hat/black hat hybrid. Thankfully, like white hats, their mission is not to do damage to a system or network, but to expose flaws in system security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Hacker

A

Originally, it was a label for someone who applied ingenuity to achieve a clever result. Today, it refers to those who gain illegal access to another computer and to cause damage or steal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cyber Squatting

A

Scammers who register a web address that has almost the same address as a legitimate site in order to trick users to going to their site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Malware

A

A malicious program that causes damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Phishing

A

A form of social engineering carried out by black hats in electronic form, usually by email, with the purpose of gathering sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Troll

A

A person who sows discord on the Internet by starting arguments or upsetting people, by posting off-topic messages in an online community in order to provoke an emotional response.

17
Q

Spam

A

unsolicited email, also known as junk email

18
Q

Spoofing

A

The art of misdirection. Black hat crackers will often cover their tracks by spoofing (faking) an IP address or masking/changing the sender information on an email so as to deceive the recipient as to its origin.

19
Q

Spyware

A

Software designed to gather information about a user’s computer use without their knowledge. Sometimes spyware is simply used to track a user’s Internet surfing habits for advertising purposes in an effort to match your interests with relevant ads.

20
Q

Trojan

A

a malicious program disguised to look like a valid program, making it difficult to distinguish from programs that are supposed to be there.

21
Q

Cryptography

A

The art of writing or solving codes.

22
Q

Virus

A

A malicious program or code that attaches itself to another program file and can replicate itself and thereby infect other systems. Just like the flu virus, it can spread from one system to another when the infected program is used by another system.

23
Q

Wardriving

A

The act of driving around in a vehicle with the purpose of finding an open, unsecured Wi-Fi wireless network. This can also be done via biking or just walking…

24
Q

White Hat

A

ethical hackers. They use their knowledge and skill to thwart the black hats and secure the integrity of computer systems or networks.

25
Q

Worm

A

Very similar to a virus in that it is a destructive self-contained program that can replicate itself. But unlike a virus, a worm does not need to be a part of another program or document. A worm can copy and transfer itself to other systems on a network

26
Q

Cipher

A

A secrete way of writing; another word for a code.

27
Q

Encryption

A

The process of encoding messages or information in such a way that only authorized parties can read it

28
Q

Online Fraud

A

Websites that promise more than they offer.