Cybersecurity Terms (Basic) Flashcards
Software that automatically displays or downloads advertising material (often unwanted) when a user is online.
Adware
A method by which an authorized user can gain access to a system by bypassing normal security mechanisms.
Backdoor
Malicious hackers who break into systems for personal gain or to cause harm. They often engage in illegal activities such as stealing data, vandalizing websites, and spreading malware.
Black Hat
A network of private computers infected with malicious software and controlled as a group without the owners’ knowledge.
Botnet
An attempt to guess a password or PIN by systematically trying every possible combination of letters, numbers, and symbols until the correct one is found.
Brute Force Attack
An attack meant to shut down a machine or network, making it inaccessible to its intended users by overwhelming the target with a flood of Internet traffic.
Denial of Service (DoS)
Similar to DoS but the attack is launched from many computers (often part of a botnet) simultaneously.
DDoS (Distributed Denial of Service)
A piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic.
Exploit
A network security device that monitors and filters incoming and outgoing network traffic based on an organization’s previously established security policies.
Firewall
The first step in the hacking process, where a hacker gathers information about a target system to find ways to intrude. It involves both passive and active reconnaissance techniques.
Footprinting
In the context of malware and antivirus, FUD refers to malware that is undetectable by antivirus software. Hackers aim to create FUD to keep their malicious activities hidden from security measures.
FUD (Fear, Uncertainty, and Doubt)
Hackers who fall somewhere between white hats and black hats. They might violate laws or ethical standards but usually without malicious intent. They may find a vulnerability and report it (sometimes requesting a fee for the fix) without permission.
Grey Hat
A type of surveillance technology used to monitor and record each keystroke typed on a specific computer’s keyboard.
Keylogger
Software specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
Malware
A method of trying to gather personal information using deceptive e-mails and websites.
Phishing