Term
1. Address Resolution Protocol: |
|
Definition
Sending fake ARP messages to an Ethernet LAN. ARP is a computer networking protocol for determining a network hosts hardware address only its IP or network |
|
|
Term
|
Definition
Software that collects and forwards data to advertising companies or causes banner ads to pop us as the internet is surfed |
|
|
Term
|
Definition
Taking control of a phone to make calls send texts etc. |
|
|
Term
|
Definition
Stealing contact lists, images, and other data |
|
|
Term
|
Definition
A network of hijacked computers. Bot herders use hijacked computers for various computer attacks |
|
|
Term
6. Buffer Overflow attack: |
|
Definition
Inputting so much data that the input buffer overflows. |
|
|
Term
|
Definition
Displaying an incorrect number on the recipient Caller ID display |
|
|
Term
|
Definition
Verifying credit card validity, buying and selling credit cards |
|
|
Term
|
Definition
Planting a chip that records transaction data in a legitimate credit card reader |
|
|
Term
10. Cross-Site scripting: |
|
Definition
Exploit web page security vulnerabilities to bypass browser security mechanism and create a malicious link that injects unwanted code into a website |
|
|
Term
|
Definition
Using computer technology to harm another person |
|
|
Term
|
Definition
Requiring a company to pay money to keep an extortionist from harming a computer or a person |
|
|
Term
|
Definition
Changing data before, during, or after it is entered into the system |
|
|
Term
|
Definition
Unauthorized copying of company data |
|
|
Term
15. Denial of Service attack: |
|
Definition
An attack designed to make computer resources unavailable to its users |
|
|
Term
|
Definition
Using software to guess company addresses, send employees blank e-mails, and add unreturned messages to spammer’s e-mail |
|
|
Term
|
Definition
Sniffing the ID of a Domain Name System request and replaying before the real DNS sever |
|
|
Term
|
Definition
Listening to private voice or data |
|
|
Term
|
Definition
Making a sender address and other parts of an e-mail header appear as though the e-mail originated from different source |
|
|
Term
|
Definition
A wireless network with the same name as another wireless access point. |
|
|
Term
|
Definition
Unauthorized access, modification, or use of computer systems, usually by means of a PC |
|
|
Term
|
Definition
Creating Internet Protocol packets with a forged IP address to hide the sender’s identity or to impersonate another computer system |
|
|
Term
|
Definition
Assuming someone’s identity by illegally obtaining confidential information such a social security number |
|
|
Term
24. Internet auction fraud: |
|
Definition
Using an internet auction site to commit fraud |
|
|
Term
25. Internet Misinformation: |
|
Definition
Using the information to spread false or misleading information |
|
|
Term
26. Internet pump an dump fraud: |
|
Definition
Using internet to pump the price of a stock and then dump it |
|
|
Term
|
Definition
Using spyware to record a user’s keystrokes |
|
|
Term
|
Definition
Inserting a sleeve into an ATM so that it will not ejecting the victim’s card pretending to help the victim as a means to discover his or her PIN and then using the card and PIN to drain the account |
|
|
Term
29. Logic bombs and time bombs: |
|
Definition
Software that sits idle until a specified circumstance or time triggers it |
|
|
Term
|
Definition
Software that can be used to do harm |
|
|
Term
|
Definition
Hacker placing himself between a client and a host to intercept network traffic |
|
|
Term
|
Definition
Accessing a system by pretending to be an authorized user |
|
|
Term
|
Definition
Inspecting information packets as they travel the Internet |
|
|
Term
|
Definition
Redirecting traffic to a spoofed web site to obtain confidential information |
|
|
Term
|
Definition
Communications that request recipients to disclose confidential information by responding to an e-mail or visiting a web page |
|
|
Term
|
Definition
Using somebody else’s website |
|
|
Term
|
Definition
Using a flash drive or iPod to steal information |
|
|
Term
|
Definition
Acting under false pretenses to gain confidential information |
|
|
Term
|
Definition
Software that conceals processes, files, network connections and system data from the operating system |
|
|
Term
|
Definition
Truncating interest calculations at two decimal places and placing truncated amounts in the perpetrators account |
|
|
Term
|
Definition
Stealing tiny slices of money over time |
|
|
Term
|
Definition
Malicious software of no benefit that is sold using scare tactics |
|
|
Term
|
Definition
Double-swiping a credit card or covertly swiping it in a card reader that records data for later |
|
|
Term
|
Definition
Using short message to change the name or number a text message appears to come from |
|
|
Term
|
Definition
A spam blog that promotes web sites to increase the Google page rank |
|
|
Term
|
Definition
Software that monitors computing habits and sends that data to someone else |
|
|
Term
|
Definition
Sending electronic data that looks like it’s from somebody else |
|
|
Term
48. Typosquatting/URL Hijacking: |
|
Definition
Getting a name of a url one or two letters off from legit site. |
|
|
Term
|
Definition
Executable code that attaches itself to software replicates itself and spreads to other systems or files, triggered by a predetermined event. |
|
|
Term
|
Definition
Voice phishing in which e-mail recipients are asked to call a phone number and divulge confidential information |
|
|
Term
|
Definition
Similar to virus, a program rather than a code segment hidden in a host program and actively transmit it to other systems. |
|
|