Ethics in Tech Flashcards
a cyperattack that takes place before the security community and/or software developers become aware of and fix security vulnerability
Zero-day exploits
malware that keeps you from accessing your accessing data until you meet certain demands
Ransomware
umbrella term for a piece of programming code that causes a computer to behave in an unexpected and desirable manner
Viruses
a harmful program that resides in the active memory of the computer and duplicates itself
Worm
a seemingly harmless program with malicious code.. infected software seems harmless
Trojan Horse
an attack in which a malicious hacker takes over a computer via internet to flood the target site and make it so legitimate users cannot access the site
Distributed denial-of-service attack (DDoS)
allows a user to gain access administrator-level access to a computer without permission
Rootkit
a network attack that allows a hacker to gain access to a network undetected in order to steal data over a period of time
Advanced persistent threat
fraudulently using email to try to get a recipient to reveal personal data
Phishing
a type of phishing that sends fraudulent emails to employees
Spear Phishing
a variation of phishing that involves texting
Smishing
a variation of phishing that involves voicemail
Vishing
the deployment of malware that secretly steals data in the computer system of organizations
Cyberespionage
intimidation of a government or civilian population by using information technology to disable national infrastructure to achieve political, religious, or ideological goals
Cyberterrorism
oversees U.S. cyber and communication infrastructure
The Department of Homeland Security’s Office of Cybersecurity and Communications