Term
| 1. Address Resolution Protocol: |
|
Definition
| Sending fake ARP messages to an Ethernet LAN. ARP is a computer networking protocol for determining a network hosts hardware address only its IP or network |
|
|
Term
|
Definition
| Software that collects and forwards data to advertising companies or causes banner ads to pop us as the internet is surfed |
|
|
Term
|
Definition
| Taking control of a phone to make calls send texts etc. |
|
|
Term
|
Definition
| Stealing contact lists, images, and other data |
|
|
Term
|
Definition
| A network of hijacked computers. Bot herders use hijacked computers for various computer attacks |
|
|
Term
| 6. Buffer Overflow attack: |
|
Definition
| Inputting so much data that the input buffer overflows. |
|
|
Term
|
Definition
| Displaying an incorrect number on the recipient Caller ID display |
|
|
Term
|
Definition
| Verifying credit card validity, buying and selling credit cards |
|
|
Term
|
Definition
| Planting a chip that records transaction data in a legitimate credit card reader |
|
|
Term
| 10. Cross-Site scripting: |
|
Definition
| Exploit web page security vulnerabilities to bypass browser security mechanism and create a malicious link that injects unwanted code into a website |
|
|
Term
|
Definition
| Using computer technology to harm another person |
|
|
Term
|
Definition
| Requiring a company to pay money to keep an extortionist from harming a computer or a person |
|
|
Term
|
Definition
| Changing data before, during, or after it is entered into the system |
|
|
Term
|
Definition
| Unauthorized copying of company data |
|
|
Term
| 15. Denial of Service attack: |
|
Definition
| An attack designed to make computer resources unavailable to its users |
|
|
Term
|
Definition
| Using software to guess company addresses, send employees blank e-mails, and add unreturned messages to spammer’s e-mail |
|
|
Term
|
Definition
| Sniffing the ID of a Domain Name System request and replaying before the real DNS sever |
|
|
Term
|
Definition
| Listening to private voice or data |
|
|
Term
|
Definition
| Making a sender address and other parts of an e-mail header appear as though the e-mail originated from different source |
|
|
Term
|
Definition
| A wireless network with the same name as another wireless access point. |
|
|
Term
|
Definition
| Unauthorized access, modification, or use of computer systems, usually by means of a PC |
|
|
Term
|
Definition
| Creating Internet Protocol packets with a forged IP address to hide the sender’s identity or to impersonate another computer system |
|
|
Term
|
Definition
| Assuming someone’s identity by illegally obtaining confidential information such a social security number |
|
|
Term
| 24. Internet auction fraud: |
|
Definition
| Using an internet auction site to commit fraud |
|
|
Term
| 25. Internet Misinformation: |
|
Definition
| Using the information to spread false or misleading information |
|
|
Term
| 26. Internet pump an dump fraud: |
|
Definition
| Using internet to pump the price of a stock and then dump it |
|
|
Term
|
Definition
| Using spyware to record a user’s keystrokes |
|
|
Term
|
Definition
| Inserting a sleeve into an ATM so that it will not ejecting the victim’s card pretending to help the victim as a means to discover his or her PIN and then using the card and PIN to drain the account |
|
|
Term
| 29. Logic bombs and time bombs: |
|
Definition
| Software that sits idle until a specified circumstance or time triggers it |
|
|
Term
|
Definition
| Software that can be used to do harm |
|
|
Term
|
Definition
| Hacker placing himself between a client and a host to intercept network traffic |
|
|
Term
|
Definition
| Accessing a system by pretending to be an authorized user |
|
|
Term
|
Definition
| Inspecting information packets as they travel the Internet |
|
|
Term
|
Definition
| Redirecting traffic to a spoofed web site to obtain confidential information |
|
|
Term
|
Definition
| Communications that request recipients to disclose confidential information by responding to an e-mail or visiting a web page |
|
|
Term
|
Definition
| Using somebody else’s website |
|
|
Term
|
Definition
| Using a flash drive or iPod to steal information |
|
|
Term
|
Definition
| Acting under false pretenses to gain confidential information |
|
|
Term
|
Definition
| Software that conceals processes, files, network connections and system data from the operating system |
|
|
Term
|
Definition
| Truncating interest calculations at two decimal places and placing truncated amounts in the perpetrators account |
|
|
Term
|
Definition
| Stealing tiny slices of money over time |
|
|
Term
|
Definition
| Malicious software of no benefit that is sold using scare tactics |
|
|
Term
|
Definition
| Double-swiping a credit card or covertly swiping it in a card reader that records data for later |
|
|
Term
|
Definition
| Using short message to change the name or number a text message appears to come from |
|
|
Term
|
Definition
| A spam blog that promotes web sites to increase the Google page rank |
|
|
Term
|
Definition
| Software that monitors computing habits and sends that data to someone else |
|
|
Term
|
Definition
| Sending electronic data that looks like it’s from somebody else |
|
|
Term
| 48. Typosquatting/URL Hijacking: |
|
Definition
| Getting a name of a url one or two letters off from legit site. |
|
|
Term
|
Definition
| Executable code that attaches itself to software replicates itself and spreads to other systems or files, triggered by a predetermined event. |
|
|
Term
|
Definition
| Voice phishing in which e-mail recipients are asked to call a phone number and divulge confidential information |
|
|
Term
|
Definition
| Similar to virus, a program rather than a code segment hidden in a host program and actively transmit it to other systems. |
|
|