Definitions Flashcards
Adware
software that auto displays/downloads advertising material when online
* often without knowledge or consent
Brute Force Attack
Method of breaking a password/encryption by trying all possible combos
Chipping
Practice of altering/replacing microchips to change functionality
Click Fraud
Act of repeatedly clicking on a pay-per-click ad to generate fraudulent charges for the advertiser
Denial-of-Service Attack
An attack that makes a machine/network resource unavailable to its intended user by flooding internet traffic
Hacking
Unathorized intrusion into computer/network
Identity Theft
Fraudulent acquisition and use of a person’s private identifying information
IP Address Spoofing
Creation of IP packets with a false source IP address to conceal the sender’s identity/impersonate another system
Keylogger
Surveillance software that records every keystroke made on a computer
Lebanese Looping
Technique used to commit fraud at ATMs where devices are used to trap a victim’s card in teh machine, allowing the criminal to retrieve it later
Password Cracking
Process of attempting to gain unauthorized access to restricted systems using common passwords/algorithms that guess passwords
Pharming
Cyberattack intended to redirect a website’s traffic to another, bogus site
Phishing
Attempt to acquire sensitive info such as usernames, passwords, and credit card details by acting as a trustworthy entity
Phreaking
Act of hacking into telecommunications systems, primarily to make free long-distance phone calls or to have calls billed to other accounts
Pod Slurping
Unathorized access and downloading of data from a computer/network using portable devices like smartphones, USB drives, or other portable media