E-commerce Security (II) *MIDTERM CONTENT INCLUSIVE* Flashcards
Malicious code (Malware)
Includes a variety of threats such as viruses, worms, Trojan horses, and bots
Exploit Kits
Collection of exploits bundled together and rented or sold as a commercial product. Use of a kit does not require much skill, allowing for non-fluent digital users to commit cybercrime
Drive-by download
Malware that comes with a downloaded file that a user requests
Malvertising
Online advertising that contains malicious code
Virus
A computer program that can replicate or make copies of itself and spread to other files
Worm
Malware that is designed to spread from computer to computer
Ransomware
Malware that blocks or limits access to a computer or network by encrypting files and then demanding a ransom payment, typically in a cyryptocurrency such as Bitcoin, in exchange for the decryption key
Trojan horse
Appears to be harmless but then does something other than expected. Often a way for viruses or other malicious code to be introduced into a computer system
Backdoor
Malware feature that allows an attacker to covertly access a compromised computer or network
Bot
Type of malicious code that can be covertly installed on a computer when connected to the Internet. Once installed, the bot responds to external commands sent by the attacker
Botnet
A collection of captured bot computers
Potentially Unwanted Program (PUP)
Program that installs itself on a computer, typically without the user’s informed consent
Adware
A PUP that serves pop-up ads to your computer
Browser parasite
A program that can monitor and change the settings of a user’s browser
Cryptojacking
Installs a browser parasite that sucks up a computer’s processing power to mine cryptocurrency without the user’s knowledge or consent
Spyware
A program used to obtain information such as a user’s keystrokes, e-mails, instant messages, and so on
Social engineering
Exploitation of human fallibility and gullibility to distribute malware
Phishing
Any deceptive, online attempt by a third party to obtain confidential information for financial gain
BEC (business e-mail compromise) phishing
Variation of Nigerian letter scam in which an attacker poses as a high-level employee of a company and requests that another employee transfer funds to what is actually a fraudulent account
Hacker
An individual who intends to gain unauthorized access to a computer system
Cracker
Within the hacking community, a term typically used to denote a hacker with criminal intent
Cybervandalism
Intentionally disrupting, defacing, or even destroying a site
Hacktivism
Cybervandalism and data theft for political purposes
Data breach
Occurs when an organization loses control over corporate information, including the personal information of customers and employees, to outsiders