LESSON 6: INFORMATION WARFARE & ONLINE CRIMES Flashcards
(107 cards)
unauthorized intrusion into a computer or a network.
hacking
The person engaged in hacking activities
hacker
Hackers employ a variety of techniques for hacking, including:
- ● Vulnerability scanner
● Password cracking
● Packet sniffer
● Spoofing attack
● Root kit
● Trojan horse
● Viruses
● Key loggers
can also refer to non-malicious activities, usually involving unusual or improvised alterations to equipment or processes.
Hacking
: checks computers on networks for known weaknesses
Vulnerability scanner
: the process of recovering passwords from data stored or transmitted by computer systems
Password cracking
: applications that capture data packets in order to view data and passwords in transit over networks
Packet sniffer
involves websites which falsify data by mimicking legitimate sites, and they are therefore treated as trusted sites by users or other programs
Spoofing attack:
: represents a set of programs which work to subvert control of an operating system from legitimate operators
Root kit
: serves as a back door in a computer system to allow an intruder to gain access to the system later
Trojan horse
: self-replicating programs that spread by inserting copies of themselves into other executable code files or documents
Viruses
: tools designed to record every keystroke on the affected machine for later retrieval
Key loggers
is a program or utility to assist a hacker with hacking. It can also be proactively utilized to protect a network or computer from hackers.
hacking tool
is intentional modification of computer software or hardware that is outside the architectural perimeters and design
Hacking
is a slang term used to refer to cybercriminals who hack into celebrity email accounts to gain access to their personal information. T
Hackerazzi
this term is derived from the term paparazzi, which refers to the aggressive photojournalists who often intrude on celebrities’ privacy and make a living by selling candid photos of famous people.
Hackerazzi
is a piece of malware intended to get financial information or hack users through a banking or financial system, commonly through an online banking or brokerage interface.
banker Trojan
is a Mozilla Firefox extension that uses packet sniffing to hijack unsecured Wi-Fi network sessions and capture unencrypted website cookies during network data transmission.
Firesheep
Firesheep was created by software developer >\??
Eric Butler (2010)
is the use of electronic messaging systems like e-mails and other digital delivery systems and broadcast media to send unwanted bulk messages indiscriminately.
Spamming
is also applied to other media like in internet forums, instant messaging, and mobile text messaging, social networking spam, junk fax transmissions, television advertising and sharing network spam.
spamming
involves sending nearly identical messages to thousands (or millions) of recipients.
Spam
it is a spammers software robots (also Web crawlers or Web spiders) in order to get valid email addresses from company Web sites, blogs and newsgroups
spambots
Spam is commonly used for advertising thus given an acronym
Sales Promotion and Marketing.