Terms Flashcards
(162 cards)
What is adware?
Software that collects consumer surfing and purchasing data.
What is a botnet?
A network of hijacked computers.
What is a bot herder?
Hackers that control hijacked computers.
What is click fraud?
Inflating advertising revenue by clicking online ads numerous times.
What does DoS stand for?
Using the Internet to disrupt communications and e-commerce.
What are e-mail threats?
Sending an e-mail instructing the recipient to do something or else suffer adverse consequences.
What is hijacking?
Gaining control of a computer to carry out unauthorized illicit activities.
What is Internet misinformation?
Circulating lies or misleading information using the world’s largest network.
What is a key logger?
Use of spyware to record a user’s keystrokes.
What is Pharming?
Diverting traffic from a legitimate website to a hacker’s website to gain access to personal and confidential information.
What is phishing?
E-mails that look like they came from a legitimate source but are actually from a hacker who is trying to get the user to divulge personal information.
What is spamming?
E-mailing an unsolicited message to many people at the same time.
What is spyware?
Software that monitors and reports a user’s computing habits.
What is spoofing?
Making an e-mail look like it came from someone else.
What is typosquatting?
Creating websites with names similar to real websites so users making errors while entering a website name are sent to a hacker’s site.
What is packet sniffing?
Intercepting Internet and other network transmissions.
What is round-down fraud?
Placing truncated decimal places in an account controlled by the perpetrator.
What is bluebugging?
Making phone calls and sending text messages using another user’s phone without physically holding that phone.
What is scavenging?
Searching through garbage for confidential data.
What is chipping?
Inserting a chip that captures financial data in a legitimate credit card reader.
What is eavesdropping?
Intercepting and/or listening in on private voice and data transmissions.
What is the salami technique?
Embezzling small fractions of funds over time.
What is an evil twin?
A rogue wireless access point masquerading as a legitimate access point.
What is war dialing?
Searching for modems on unprotected phone lines in order to access the attached computer and gain access to the network(s) to which it is attached.