Dangerous Data Flashcards
(46 cards)
Cybersecurity
The information, tools, and practises relating to the protection of computers, networks, programs, and data.
Hacker
A person who illegally accesses computers to cause intentional harm.
White Hat Hacker
A hacker who is employed in order to identify flaws in a computer system.
Black Hat Hacker
A hacker who acts with malicious intent.
CIA (Cybersecurity)
Confidentiality, Integrity, and Availability - the three principles of information security, suggesting that information should only be read by the intended people, should remain unchanged, and be available when required.
Phishing
The process of sending emails or other forms of communication to a user supposedly coming from a company or other legitimate source. This is in order to trick a user in to responding with personal information such as a password or bank account details.
Spear Phishing
A type of phishing directed towards people and organisations of interest using pre-known information.
Whaling
A type of spear phishing directed towards senior management.
Backdoor
A gap in a computers security which allows hackers to steal data or control the device. This permits a hacker to log keystrokes, monitor clipboard activity, capture screenshots, and detect security software.
Keystroke Logging
The process of recording a series of entered keys in order to obtain information such as passwords or PIN numbers.
Clipboard Activity Monitoring
The process of recording information on an area of memory known as the ‘clipboard’ which contains copied text and data.
APT (Dangerous Data)
Advanced Persistent Threat - a combination of several attacks, such as spear phishing and malware, to expose an organisation for a long period of time.
Hashing
The process of transforming a piece of plaintext to a hash using a certain algorithm such as MD5. Every piece of plaintext has a unique hash, with all hashes being of the same length. It is almost impossible to transform a hash back in to plaintext.
Brute Force Attack
A method of breaking passwords which means cycling through every possible password.
Dictionary Attack
A method of breaking passwords which means trying common passwords stored in a dictionary.
Keylogger Program
A program which logs combinations of entered keys.
Password Manager
An application for storing passwords for different sites and software.
Two-factor Authentication
A requirement by a facility to present two items of information, such as a fingerprint and password, or bank card and PIN.
Hardware Security Token
A small item kept in a wallet or on a keychain. The one-time password on it can be used together with a known password to sign in to a bank account online.
Malware
A term for malicious software.
Ransomware
A type of malware which asks the user for a financial payment, threatening to destroy or encrypt files if it is not given.
Virus
A type of malware which can duplicate itself once in a computer. They are attached to specific applications and are activated once the program is run, at which point they send copies to new areas of memory. They consist of three components: the infection mechanism, the trigger, and the payload.
Infection Mechanism (Malware)
The part of a virus which locates targets by searching through files or for a new device on a network.
Trigger (Malware)
An event which activates a virus - often a date or action.