Definitions Flashcards

1
Q

Adware

A

software that auto displays/downloads advertising material when online
* often without knowledge or consent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Brute Force Attack

A

Method of breaking a password/encryption by trying all possible combos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Chipping

A

Practice of altering/replacing microchips to change functionality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Click Fraud

A

Act of repeatedly clicking on a pay-per-click ad to generate fraudulent charges for the advertiser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Denial-of-Service Attack

A

An attack that makes a machine/network resource unavailable to its intended user by flooding internet traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Hacking

A

Unathorized intrusion into computer/network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Identity Theft

A

Fraudulent acquisition and use of a person’s private identifying information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

IP Address Spoofing

A

Creation of IP packets with a false source IP address to conceal the sender’s identity/impersonate another system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Keylogger

A

Surveillance software that records every keystroke made on a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Lebanese Looping

A

Technique used to commit fraud at ATMs where devices are used to trap a victim’s card in teh machine, allowing the criminal to retrieve it later

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Password Cracking

A

Process of attempting to gain unauthorized access to restricted systems using common passwords/algorithms that guess passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Pharming

A

Cyberattack intended to redirect a website’s traffic to another, bogus site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Phishing

A

Attempt to acquire sensitive info such as usernames, passwords, and credit card details by acting as a trustworthy entity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Phreaking

A

Act of hacking into telecommunications systems, primarily to make free long-distance phone calls or to have calls billed to other accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Pod Slurping

A

Unathorized access and downloading of data from a computer/network using portable devices like smartphones, USB drives, or other portable media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Posing

A

Act of pretending to be someone else in order to gain unathorized access to information/resources

17
Q

Pretexting

A

Practice of presenting oneself as someone else in order to obtain private information

18
Q

Ransomware

A

Malware that encrypts a user’s data and demands payment in order to decrypt and restore access

19
Q

Salami Technique

A

Small, stealthy alterations or transactions that are below the threshold of detection, but accumulate to a significant amount over time
* Office Space

20
Q

Scavenging/Dumpster Diving

A

Searching through trash/discarded digital media to find confidential info that can be used in fraudulent activities

21
Q

Shoulder Surfing

A

Observing someone’s private information/password by looking over their shoulder as they enter it on a device

22
Q

Skimming

A

Theft of credit/debit card info by using a device that reads and stores the card’s magnetic strip data during a transaction

23
Q

Spyware

A

Software that is installed on a computer without the user’s knowledge and collects and transmits info about the user’s computer activities

24
Q

Steganography

A

Practice of hiding secret info within something non-secret, such as embedding a message within an image or audio file, to avoid detection

25
Trap Door/Back Door
Secret entry points into a software program/network/system often creaed by developers, which allow for unauthorized access bypassing normal authentication
26
Trojan Horse
Malicious software that misleads users of its true intent, often disguised as legit software, and when activated can compromise the security of a system
27
Typosquatting/ URL Hijacking
Practice of registering domains that are misspellings of popular websites to exploit typing errors made by internet users, often to redirect them to fraudulent sites or to steal information
28
Virus
Malicious software that replicates itself by modifying other computer programs and inserting its own code
29
Vishing
Attacker uses phone calls/voice messages to trick individuals into divulging sensitive personal info * form of phishing
30
Worm
Standalone malware that replicates itself in order to spread to other computers without needing to attach itself to a software program
31
Zero-Day Attack
Cyber-attack that occurs on the same day as a weakness is discovered in software. * Exploited before a fix becomes available