Home Training Consulting News roomContact CIS  
Welcome to SACFiS


Definitions of cyber security threats and attacks

Account Hijacking – Using someone else's personal information to access current financial accounts or create new ones

Adware – Software that displays advertising banners or pop-up windows

Backdoor – A method of accessing a computer system undetected for either illegitimate or legitimate access

BlackHat – A person who compromises a computer system's security without authorization, typically maliciously

Bluebugging – Use of Bluetooth to illegitimately access sensitive information on mobile devices

Bluejacking – Using Bluetooth to send unsolicited messages to nearby Bluetooth-enabled devices

Bluejacking – Using Bluetooth to send unsolicited messages to nearby Bluetooth-enabled devices

Bluesnarfing – Stealing information from mobile devices using a wireless connection

BruteForceAttack – Figuring out a password by trying every possible combination of letters, numbers, and symbols

BufferOverflow – A type of vulnerability in software that allows attackers to go inside the system and damage it

Chanslash – Fan fiction that involves underage characters in romantic pairings

ClickFraud – The imitation of clicking on web advertisements to increase ad revenue for the Web site owner

Cookie – Information, usually in a file, about someone’s Internet activities, such as the date of the last visit to a Web site, preferences, etc.

Cracking – Trying to get into computer systems in order to steal, corrupt, or illegitimately view data

Crimeware – A special type of malware used to commit financial crimes

Cross-siteScripting (XSS) – A vulnerability of dynamic Web content where a malicious user may embed code into a Web site that may cross over to a victim's computer

CyberEspionage – The use of software tools to obtain secret or private government or business information

Cyberbullying – Using the Internet to harass, intimidate, embarrass, or demean others

Cyberpiracy – Using the Internet to copy a digital document without authorization

Cyberstalking – Using the Internet to threaten or make unwanted advances towards someone else

Cyberterrorism – Threat, harm or extortion via the Internet

Cyberwoozling – The unauthorized gathering of data from visitors of a Web site

DataTheft – The unauthorized taking or interception of computer-based information

DigitalWallet – The electronic equivalent of a wallet for e-commerce transactions

DirectoryTraversalAttack – Attacks that access restricted files by combing through a computer's directories

Distributed Denial of Service (DDoS) – Interfering with a computer system by sending more Internet traffic to it than it can handle

Eavesdropping – Method of secretly listening in on a conversation

Exploit – A piece of software that targets vulnerabilities in installed software in order to take over a computer

FakeAnti-spyware – Harmful programs disguised as anti-spyware

Flaming – Posting messages that are deliberately hostile and insulting

Griefer – Individuals who play multiplayer online games with the intent to harass other players

Hacking – Trying to get into computer systems in order to steal, corrupt, or illegitimately view data

Hoax – Phony email warning about a computer virus or other threat

IJacking – Theft of a laptop by snatching it from an owner's hands

IPSpoofing – Using fake computer identification to communicate with another machine, usually for malicious purposes

IdentityTheft – When someone uses your personal information to commit fraud

Intrusion – Getting into someone's computer without their permission

Keylogger – A device or software that records keystrokes entered by a user, usually to secretly monitor and/or maliciously use this information

LaptopTheft – Stealing of laptop computers, typically from public places where they are left behind or unattended

Lurking – Hanging out on Internet bulletin boards or chat rooms without posting

Malware – Programs that are designed to harm your computer

Man in the Middle Attack – Intercepting communications between two parties without either party knowing about it

Misinformation – Incorrect or misleading information on Web sites

OnlineGambling – The placing of bets using the Internet

OnlineGrooming – Working to gain the trust of children and young people, often with the goal of a sexual relationship, though the use of cyber technology like the Internet or mobile phone

Packet Sniffer – A program that reads or snoops on network traffic

• Password Cracking – Trying to figure out someone else's computer password to get past a security system

Pharming – Redirecting users from legitimate Web sites they are trying to visit to fraudulent Web sites

Phishing – Using fake Web sites to trick you into giving away personal information

Pin Cracking – A procedure for breaking into Bluetooth devices by determining the personal identification number (PIN) used for secure transmissions

Plagiarism – Using content that has been created by others without giving them due credit

Port Scanning – Trying to find open ports on a computer in order to gain access to it

SMS Spam – Junk mail sent to mobile phones

Sexting – A slang term for the sending of sexually explicit or suggestive content between mobile devices

Smurfing – In gaming, targeting players below your skill level; Also, a type of Denial of Service attack

SocialEngineering – Using manipulation and deceit to trick victims into giving out confidential information

Spam – Unwanted email used mainly for advertising

SpoofingCard – A communication service that allows you to choose what phone number displays on caller ID when someone receives a call from you

Spyware – Software that sends information from your computer to a third party without your consent

Trojan Horse – A malicious program disguised as legitimate software

Trolling – A person who posts rude or offensive messages on the Internet with the intent to disrupt a discussion or upset its participants

Virus – A self-replicating program that spreads by inserting copies of itself into other code or documents

Vishing – Using fake phone numbers to trick you into giving away personal information

WarDriving – Driving around with a computer to find and access wireless networks

Worm – A self-replicating, self-spreading malicious program

ZeroDayAttack – An attack against a computer application even before a vulnerability or fix for it has been announced

ZombieMachine – A computer that an attacker has taken control of using malware








Home | About SACfIS | Services | Training | Consulting | Research | Press Room | Contact us |