Term
|
Definition
Computing that occurs beyond the edges of a trusted network. |
|
|
Term
|
Definition
Someone who engages in cracking |
|
|
Term
|
Definition
The act of illegally hacking into a computer system without the permission of the system's owned |
|
|
Term
|
Definition
A term orginally meant to refer to a programmer or someone who is skilled at computers and code writing. The term has evolved and is sometimes used as a more perjorative term to describe a cracker |
|
|
Term
|
Definition
Hacker or cracker who is motivated by patriotism, nationalism, or some other deeply held civic belief and who may either secure networks from cyber criminals or disrupt services, thereby creating fear among "enemy" populations and communities. |
|
|
Term
|
Definition
When a host computer or device is surreptitiously loaded via various routes, including infected attachments or from visiting malicious web sites. The objective of malware is to activate functionality on the device that is not sanctioned by the device owner. Malware can take many forms:
- Viruses
- Trojans
- Worms
- Rootkits
|
|
|
Term
|
Definition
Cracking the phone network to make free long-distance calls, for example. Also refers to security cracking, especially (but not exclusively) on communications networks. |
|
|
Term
|
Definition
Supervisory Control and Data Acquisition - systems design to run critical infrastructure |
|
|
Term
|
Definition
A subset of hacking enthusiasts who, having little knowledge or experience, find and run scripts that others have made available through various media. Script kiddies are universally despised by experienced programmers. |
|
|
Term
|
Definition
A computer worm that seeded malware-infected USB drives in cars parked outside Iranian nuclear plants with goal of breaking into the centrifuges |
|
|
Term
|
Definition
A script that tells a modem to dial a range of phone numbers and then identifies those that are connected to remote computers. The phone number range is defined by the user, then the program proceeds to dial these numbers, one after the other, attempting to establish a remote connection. |
|
|