Definitions of cyber security threats and attacks
• Account Hijacking – Using someone else's personal information to access current financial accounts or create new ones
• Adware – Software that displays advertising banners or pop-up windows
• Backdoor – A method of accessing a computer system undetected for either illegitimate or legitimate access
• BlackHat – A person who compromises a computer system's security without authorization, typically maliciously
• Bluebugging – Use of Bluetooth to illegitimately access sensitive information on mobile devices
• Bluejacking – Using Bluetooth to send unsolicited messages to nearby Bluetooth-enabled devices
• Bluejacking – Using Bluetooth to send unsolicited messages to nearby Bluetooth-enabled devices
• Bluesnarfing – Stealing information from mobile devices using a wireless connection
• BruteForceAttack – Figuring out a password by trying every possible combination of letters, numbers, and symbols
• BufferOverflow – A type of vulnerability in software that allows attackers to go inside the system and damage it
• Chanslash – Fan fiction that involves underage characters in romantic pairings
• ClickFraud – The imitation of clicking on web advertisements to increase ad revenue for the Web site owner
• Cookie – Information, usually in a file, about someone’s Internet activities, such as the date of the last visit to a Web site, preferences, etc.
• Cracking – Trying to get into computer systems in order to steal, corrupt, or illegitimately view data
• Crimeware – A special type of malware used to commit financial crimes
• Cross-siteScripting (XSS) – A vulnerability of dynamic Web content where a malicious user may embed code into a Web site that may cross over to a victim's computer
• CyberEspionage – The use of software tools to obtain secret or private government or business information
• Cyberbullying – Using the Internet to harass, intimidate, embarrass, or demean others
• Cyberpiracy – Using the Internet to copy a digital document without authorization
• Cyberstalking – Using the Internet to threaten or make unwanted advances towards someone else
• Cyberterrorism – Threat, harm or extortion via the Internet
• Cyberwoozling – The unauthorized gathering of data from visitors of a Web site
• DataTheft – The unauthorized taking or interception of computer-based information
• DigitalWallet – The electronic equivalent of a wallet for e-commerce transactions
• DirectoryTraversalAttack – Attacks that access restricted files by combing through a computer's directories
• Distributed Denial of Service (DDoS) – Interfering with a computer system by sending more Internet traffic to it than it can handle
• Eavesdropping – Method of secretly listening in on a conversation
• Exploit – A piece of software that targets vulnerabilities in installed software in order to take over a computer
• FakeAnti-spyware – Harmful programs disguised as anti-spyware
• Flaming – Posting messages that are deliberately hostile and insulting
• Griefer – Individuals who play multiplayer online games with the intent to harass other players
• Hacking – Trying to get into computer systems in order to steal, corrupt, or illegitimately view data
• Hoax – Phony email warning about a computer virus or other threat
• IJacking – Theft of a laptop by snatching it from an owner's hands
• IPSpoofing – Using fake computer identification to communicate with another machine, usually for malicious purposes
• IdentityTheft – When someone uses your personal information to commit fraud
• Intrusion – Getting into someone's computer without their permission
• Keylogger – A device or software that records keystrokes entered by a user, usually to secretly monitor and/or maliciously use this information
• LaptopTheft – Stealing of laptop computers, typically from public places where they are left behind or unattended
• Lurking – Hanging out on Internet bulletin boards or chat rooms without posting
• Malware – Programs that are designed to harm your computer
• Man in the Middle Attack – Intercepting communications between two parties without either party knowing about it
• Misinformation – Incorrect or misleading information on Web sites
• OnlineGambling – The placing of bets using the Internet
• OnlineGrooming – Working to gain the trust of children and young people, often with the goal of a sexual relationship, though the use of cyber technology like the Internet or mobile phone
• Packet Sniffer – A program that reads or snoops on network traffic
• Password Cracking – Trying to figure out someone else's computer password to get past a security system
• Pharming – Redirecting users from legitimate Web sites they are trying to visit to fraudulent Web sites
• Phishing – Using fake Web sites to trick you into giving away personal information
• Pin Cracking – A procedure for breaking into Bluetooth devices by determining the personal identification number (PIN) used for secure transmissions
• Plagiarism – Using content that has been created by others without giving them due credit
• Port Scanning – Trying to find open ports on a computer in order to gain access to it
• SMS Spam – Junk mail sent to mobile phones
• Sexting – A slang term for the sending of sexually explicit or suggestive content between mobile devices
• Smurfing – In gaming, targeting players below your skill level; Also, a type of Denial of Service attack
• SocialEngineering – Using manipulation and deceit to trick victims into giving out confidential information
• Spam – Unwanted email used mainly for advertising
• SpoofingCard – A communication service that allows you to choose what phone number displays on caller ID when someone receives a call from you
• Spyware – Software that sends information from your computer to a third party without your consent
• Trojan Horse – A malicious program disguised as legitimate software
• Trolling – A person who posts rude or offensive messages on the Internet with the intent to disrupt a discussion or upset its participants
• Virus – A self-replicating program that spreads by inserting copies of itself into other code or documents
• Vishing – Using fake phone numbers to trick you into giving away personal information
• WarDriving – Driving around with a computer to find and access wireless networks
• Worm – A self-replicating, self-spreading malicious program
• ZeroDayAttack – An attack against a computer application even before a vulnerability or fix for it has been announced
• ZombieMachine – A computer that an attacker has taken control of using malware
|