Term
|
Definition
An attack on an ifnroation system that teks adcantage of a particular system vulnerability. |
|
|
Term
|
Definition
An attackthat takes place before the security community or software developers knows about the culnerabukuty or has been able to repair it. |
|
|
Term
|
Definition
A piece of programming code, usually disguised as something else that causes a computer to behace in an unexpected and usually undesirable manner. |
|
|
Term
|
Definition
A harmful program that resides in the active memory of the computer and duplicates itself. |
|
|
Term
|
Definition
A program in which malicious code is hidden inside a seemingly harless program. |
|
|
Term
|
Definition
A type of Trojan horse that executes when it is triggered by a specific event. |
|
|
Term
|
Definition
A large group of computer controlled centrally from one or more remote locations by hackers, without the knowledge or consent of their owners. |
|
|
Term
Distributed Denial of Service Attact (DDoS) |
|
Definition
An attack in which a malicious hacker takes over computers on the internet and causes them to flood a target site with demands for data and other small tasks |
|
|
Term
|
Definition
A set of programs that enable its user to gain administrator level access to a computer without the end user's consent or knowledge. |
|
|
Term
|
Definition
The abuse of e-mail systems to send unsolicited e-mail to large numbers of people. |
|
|
Term
Completely Automated Public Turing Test to Tell Computer and Humans Apart (CAPTCHA) |
|
Definition
Software that generates and greades tests that humans can pass but all but the most sophisticated computer programs cannot. |
|
|
Term
|
Definition
The act of using e-mail fraudulently to try to get the recipient to reveal personal data |
|
|
Term
|
Definition
A cariation of phishing in which the phisher send fraudulent e-mails to a certain organization's employees. The phony e-mails are designed to look like they come from high level executives withing the organization. |
|
|
Term
|
Definition
Someone who tests the limitations of information systems out of intellectual curiosity to see if he or she can gain access. |
|
|
Term
|
Definition
A technically inept hacker. |
|
|
Term
|
Definition
A technically inept hacker. |
|
|
Term
|
Definition
Someone who breaksinto other people's networks and systems to cause harm. |
|
|
Term
|
Definition
Cooperation between two or more people often an employee and a company outsider to commit fraud. |
|
|
Term
|
Definition
Someone who uses illegal means to obtain trade secrets from competitors of their firm. |
|
|
Term
|
Definition
Legally obtained information gathered to help a company gain an advatage over its rivals. |
|
|
Term
|
Definition
An individual motivated by the ptential for monetary gain who hacks into corporate computers to steal often by transferring money from one account to anoter to anoter. |
|
|
Term
|
Definition
A form of debit or credit card that contains a moemory chip that is updated with encrypted data every time the card is used. |
|
|
Term
|
Definition
Hacking to achieve a political or social goal. |
|
|
Term
|
Definition
An individual who lauches comuter based attacks against other computer or network in an attempt to intimidate or coerce a government in order to adcance certain political or social objectives. |
|
|
Term
|
Definition
A method of computing that delivers secure, private, and reliable computer experiences baded on sound business practices. |
|
|
Term
|
Definition
The process of assessing security related risks from other internal and external threats to an organization's computers and networks. |
|
|
Term
|
Definition
A concept in computer security that recognizes that managers muse user their judgement to ensure that the cose of contorl dose not exceed the system's benefits or the risks involved. |
|
|
Term
|
Definition
A witten statement that defines an organization's security requirements as well as the controls and sanctions needed to meet those requirements. |
|
|
Term
Virtual Private Network (VPN) |
|
Definition
A technology that uses the internet to relay communications maintaining privacy through security procedures and tunneling protocols which encrypt data at the sending end and decrypt it at the receving end. |
|
|
Term
|
Definition
A hardware or software device that serves as a barrier between an organization's network and the internet a firewall also limits access to the company's network based on the organizations's internet usage policy. |
|
|
Term
Intrusion Percention Systems (IPs) |
|
Definition
A network security device that prevents an attack by blocking viruses, malfored packets and other threats from getting into the prtected network. |
|
|
Term
|
Definition
Software that regularly scans a computer's memory and disk drives for viruses. |
|
|
Term
|
Definition
A specific sequence of bytes that indicates to antivirus software that a specific virus is present. |
|
|
Term
|
Definition
A process that evaluates whether an organization has a well considered security policy in place and if it is being followed |
|
|
Term
Intrusion Detection System |
|
Definition
Software and our hardware that monitors systems and network resouces and activities and notifies network security personnel when it identifies possible intrusions from outsed the organization or misuse from within the organization. |
|
|