Definitions Flashcards

1
Q

Adware

A

software that auto displays/downloads advertising material when online
* often without knowledge or consent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Brute Force Attack

A

Method of breaking a password/encryption by trying all possible combos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Chipping

A

Practice of altering/replacing microchips to change functionality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Click Fraud

A

Act of repeatedly clicking on a pay-per-click ad to generate fraudulent charges for the advertiser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Denial-of-Service Attack

A

An attack that makes a machine/network resource unavailable to its intended user by flooding internet traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Hacking

A

Unathorized intrusion into computer/network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Identity Theft

A

Fraudulent acquisition and use of a person’s private identifying information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

IP Address Spoofing

A

Creation of IP packets with a false source IP address to conceal the sender’s identity/impersonate another system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Keylogger

A

Surveillance software that records every keystroke made on a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Lebanese Looping

A

Technique used to commit fraud at ATMs where devices are used to trap a victim’s card in teh machine, allowing the criminal to retrieve it later

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Password Cracking

A

Process of attempting to gain unauthorized access to restricted systems using common passwords/algorithms that guess passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Pharming

A

Cyberattack intended to redirect a website’s traffic to another, bogus site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Phishing

A

Attempt to acquire sensitive info such as usernames, passwords, and credit card details by acting as a trustworthy entity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Phreaking

A

Act of hacking into telecommunications systems, primarily to make free long-distance phone calls or to have calls billed to other accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Pod Slurping

A

Unathorized access and downloading of data from a computer/network using portable devices like smartphones, USB drives, or other portable media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Posing

A

Act of pretending to be someone else in order to gain unathorized access to information/resources

17
Q

Pretexting

A

Practice of presenting oneself as someone else in order to obtain private information

18
Q

Ransomware

A

Malware that encrypts a user’s data and demands payment in order to decrypt and restore access

19
Q

Salami Technique

A

Small, stealthy alterations or transactions that are below the threshold of detection, but accumulate to a significant amount over time
* Office Space

20
Q

Scavenging/Dumpster Diving

A

Searching through trash/discarded digital media to find confidential info that can be used in fraudulent activities

21
Q

Shoulder Surfing

A

Observing someone’s private information/password by looking over their shoulder as they enter it on a device

22
Q

Skimming

A

Theft of credit/debit card info by using a device that reads and stores the card’s magnetic strip data during a transaction

23
Q

Spyware

A

Software that is installed on a computer without the user’s knowledge and collects and transmits info about the user’s computer activities

24
Q

Steganography

A

Practice of hiding secret info within something non-secret, such as embedding a message within an image or audio file, to avoid detection

25
Q

Trap Door/Back Door

A

Secret entry points into a software program/network/system often creaed by developers, which allow for unauthorized access bypassing normal authentication

26
Q

Trojan Horse

A

Malicious software that misleads users of its true intent, often disguised as legit software, and when activated can compromise the security of a system

27
Q

Typosquatting/ URL Hijacking

A

Practice of registering domains that are misspellings of popular websites to exploit typing errors made by internet users, often to redirect them to fraudulent sites or to steal information

28
Q

Virus

A

Malicious software that replicates itself by modifying other computer programs and inserting its own code

29
Q

Vishing

A

Attacker uses phone calls/voice messages to trick individuals into divulging sensitive personal info
* form of phishing

30
Q

Worm

A

Standalone malware that replicates itself in order to spread to other computers without needing to attach itself to a software program

31
Q

Zero-Day Attack

A

Cyber-attack that occurs on the same day as a weakness is discovered in software.
* Exploited before a fix becomes available