Cybersecurity Terms (Basic) Flashcards
Software that automatically displays or downloads advertising material (often unwanted) when a user is online.
Adware
A method by which an authorized user can gain access to a system by bypassing normal security mechanisms.
Backdoor
Malicious hackers who break into systems for personal gain or to cause harm. They often engage in illegal activities such as stealing data, vandalizing websites, and spreading malware.
Black Hat
A network of private computers infected with malicious software and controlled as a group without the owners’ knowledge.
Botnet
An attempt to guess a password or PIN by systematically trying every possible combination of letters, numbers, and symbols until the correct one is found.
Brute Force Attack
An attack meant to shut down a machine or network, making it inaccessible to its intended users by overwhelming the target with a flood of Internet traffic.
Denial of Service (DoS)
Similar to DoS but the attack is launched from many computers (often part of a botnet) simultaneously.
DDoS (Distributed Denial of Service)
A piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic.
Exploit
A network security device that monitors and filters incoming and outgoing network traffic based on an organization’s previously established security policies.
Firewall
The first step in the hacking process, where a hacker gathers information about a target system to find ways to intrude. It involves both passive and active reconnaissance techniques.
Footprinting
In the context of malware and antivirus, FUD refers to malware that is undetectable by antivirus software. Hackers aim to create FUD to keep their malicious activities hidden from security measures.
FUD (Fear, Uncertainty, and Doubt)
Hackers who fall somewhere between white hats and black hats. They might violate laws or ethical standards but usually without malicious intent. They may find a vulnerability and report it (sometimes requesting a fee for the fix) without permission.
Grey Hat
A type of surveillance technology used to monitor and record each keystroke typed on a specific computer’s keyboard.
Keylogger
Software specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
Malware
A method of trying to gather personal information using deceptive e-mails and websites.
Phishing
A server that acts as an intermediary for requests from clients seeking resources from other servers. Proxies provide varying levels of functionality, security, and privacy.
Proxy
A type of malicious software designed to block access to a computer system until a sum of money is paid.
Ransomware
A type of malware that provides the attacker with administrative control over the target computer. RATs are typically downloaded invisibly with a user-requested program, such as a game or app.
RAT (Remote Access Trojan)
A type of shell where the target machine connects back to the attacking machine. This is often used to bypass firewalls and other security measures that might block an incoming connection to the target machine.
Reverse Shells
A collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed (such as to an unauthorized user) while masking its existence or the existence of other software.
Rootkit
An unskilled individual who uses scripts or programs developed by others to attack computer systems and networks and deface websites.
Script Kiddie
Intercepting and logging traffic that passes over a digital network or part of a network.
Sniffing
The use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes.
Social Engineering
Software that enables a user to obtain covert information about another’s computer activities by transmitting data covertly from their hard drive.
Spyware