Dangerous Data Flashcards
Cybersecurity
The information, tools, and practises relating to the protection of computers, networks, programs, and data.
Hacker
A person who illegally accesses computers to cause intentional harm.
White Hat Hacker
A hacker who is employed in order to identify flaws in a computer system.
Black Hat Hacker
A hacker who acts with malicious intent.
CIA (Cybersecurity)
Confidentiality, Integrity, and Availability - the three principles of information security, suggesting that information should only be read by the intended people, should remain unchanged, and be available when required.
Phishing
The process of sending emails or other forms of communication to a user supposedly coming from a company or other legitimate source. This is in order to trick a user in to responding with personal information such as a password or bank account details.
Spear Phishing
A type of phishing directed towards people and organisations of interest using pre-known information.
Whaling
A type of spear phishing directed towards senior management.
Backdoor
A gap in a computers security which allows hackers to steal data or control the device. This permits a hacker to log keystrokes, monitor clipboard activity, capture screenshots, and detect security software.
Keystroke Logging
The process of recording a series of entered keys in order to obtain information such as passwords or PIN numbers.
Clipboard Activity Monitoring
The process of recording information on an area of memory known as the ‘clipboard’ which contains copied text and data.
APT (Dangerous Data)
Advanced Persistent Threat - a combination of several attacks, such as spear phishing and malware, to expose an organisation for a long period of time.
Hashing
The process of transforming a piece of plaintext to a hash using a certain algorithm such as MD5. Every piece of plaintext has a unique hash, with all hashes being of the same length. It is almost impossible to transform a hash back in to plaintext.
Brute Force Attack
A method of breaking passwords which means cycling through every possible password.
Dictionary Attack
A method of breaking passwords which means trying common passwords stored in a dictionary.
Keylogger Program
A program which logs combinations of entered keys.
Password Manager
An application for storing passwords for different sites and software.
Two-factor Authentication
A requirement by a facility to present two items of information, such as a fingerprint and password, or bank card and PIN.