Chapter 9 Flashcards
botnet
a network of private computers infected with malicious software and controlled as a group without the owners’ knowledge
Distributed Denial of Service attack
many hacked computers send a large number of simultaneous request to the server, causing servers to become overloaded and crash
hacktivism
people want to make a political statement by using technological means
data harvesters
criminals who only steal data to resell them
cash-out fraudster
someone who buys data from a data harvester
white hat hacker
good natured hacker
black hat hacker
cybercriminal
social engineering
forger who impersonates an identity of a person or company in which people or companies are fooled
spear phishing attack
when there is a focus on a specific target group
spoofed message
messages which pretend to be from a friend
zero-day exploits
attacks that are so new that they have not been processed in security systems yet
biometrics
technologies that measure human characteristics
SQL injection technique
people can be registered and removed from the file of a website
intrusion detection system
help to stop these types of criminals (SQL injection technique criminals) because this type of software specialises in identifying unauthorised behavior
malware
malicious software that searches for weak spots in a security system
worm
damages other software or files whereby the worm independently finds its way
trojan
malware that tries to penetrate by pretending to be something else
malicious adware
programs that provide unwanted advertisements
CAPTCHA’s
tasks you must perform to prove that you are a human and not a computer
RAM scraping or storage scanning software
a code that scans the computer memory to find sensitive data
ransomware
users must pay money to regain access to these files
blended threat
when multiple types of malware to plan an attack are used
brute force attack
trying all passwords to enter an account
public key encryption
there is public key that is used when locking data. People that have a separate, private key that they can use to access the data