a vulnerability intentionally left in the security of a computer system or its software by its designers
data that has been encrypted
looking through trash for access codes or other sensitive information
the process of taking over a live connection between two users so that the attacker can masquerade as one of the users
using a password or user ID obtained in one attack to commit another attack
a device that records the telephone numbers of calls received by a particular telephone
a person who combines phone phreaking with computer hacking
a person who hacks telephone systems, usually for the purpose of making free phone calls
slang for pirated software
The payload is the part of the malware program that actually executes its designed task.
An individual who does not possess, or just doesn’t use, their own skills and know-how to hack or crack a computer system or network, but uses a pre-written program or piece of code, a script, to do the dirty work. While they may not possess the computing talent, they can be just as dangerous!
is the act of driving around in a vehicle with the purpose of finding an open, unsecured Wi-Fi wireless network
Parallel websites that allow children to get around filtering software and access sites that have been blocked
A hostile, strongly worded message that may contain obscene language.
An attack in which an unauthorized actor, often a nation-state, employs highly sophisticated technology and/or tactics to gain and maintain surreptitious access to a network.
Advanced Persistent Threat
The exploitation of computers and computer networks as a means of protest to promote political ends.
Phony email, usually an alert about a non-existent threat, that is passed throughout a system by a large number of individuals who believe it to be true – and that overwhelms the system as a result
Redirecting users from a legitimate site to a bogus one; information entered on the phony site is captured for fraudulent purposes
Creates access points in a computer for a cybercriminal, so that they can enter undetected
Making small, undetectable changes over an extended period of time
Scam software that appears to be legitimate, to encourage download
Phishing using text messages rather than emails
Accessing a secure network by changing the remote computer’s IP address to that of a computer with special privileges
Tricking a user (through an email or phone call) into entering credit card information into a bogus voice response system; information entered into the phony system is captured for fraudulent purposes
Changing the appearance of a website and/or reducing its usability, usually by replacing the legitimate website with a phony one
Cross-site scripting attack. Malware injected into a trusted site, presented through a hyperlink
is a distributed denial-of-service attack in which large numbers of Internet Control Message Protocol (ICMP) packets with the intended victim’s spoofed source IP are broadcast to a computer network using an IP broadcast address. Most devices on a network respond to this by sending a reply to the source IP address. This can slow down the victim’s computer to the point where it becomes impossible to work on
is defined as deliberately trying to change or alter a system’s logic, data, or control information to cause the system to perform unauthorized functions or services.
is defined as any communication between a single sender and a single receiver over a network. The term exists in contradiction to multicast, communication between a single sender and multiple receivers, and any cast, communication between any sender and the nearest of a group of receivers in a network.
is marking areas, usually on sidewalks with chalk, that receive wireless signals to advertise an open Wi-Fi network. It was inspired by hobo symbols and were conceived by a group of friends in June 2002. They were publicised by Matt Jones who designed the set of icons and produced a downloadable document containing them.
is a computer network authentication protocol and is ticket-based allowing nodes to communicate over a non-secure. Massachusetts Institute of Technology (MIT) developed to protect network services provided by the Project Athena. This protocol is based on the earlier Needham–Schroeder symmetric key protocol. These protocol messages are protected against snooping and replay attacks.
A virus or physical device that logs information sent to a visual display to capture private or personal information.
Server that acts as an intermediary between users and others servers, validating user requests.
Malware from someone who appears to be a trusted user of a site
Flooding a network or website or network with requests, making it impossible for legitimate users to access the site