unwanted email-sent with intent to be malicious
Spam
a type of malware program that substitutes itself as a legitimate program
trojan horse virus
You find out that Target has had their records compromised and you know that you have used your credit card there. Your information has been stolen due to Target experiencing this....
Data Breach
A small device that scans a credit card and stores the information contained in the magnetic strip
skimmer
software code that gives access to a program or service the circumvents normal security protections. Often installed through a trojan horse
backdoor
a computer network of zombies under he control of an attacker
Bot Net
Self replicating program designed to carry out unauthorized activity. Can spread themselves from one computer to another without any assistance.
Computer Worm
You accidentally go to a website that looks just like your bank but then you notice the address is PNNCBank.com instead of PNCBank.com This misspelled domain is an example of this technique used by ID thieves.
Typosquatting
stealing identities to commit fraud involving health insurances by making false claims.
medical identity theft
a combination of the term malicious and software
malware
an attack that sends an email or other message that falsely claims to be from a legitimate company in an attempt to trick the user into surrendering private info.
phishing
an attack that bombards servers and web sites with traffic that shuts down other websites
DDOS (Denial of Service)
You receive a text message stating that you are one of 5 people that have been chosen to win a free ipad. All you need to do is click on the link and fill out some important information about you yourself and you do. You are now a victim of
smishing
Untrustworthy access to the internet provided by a business. Can easily be hacked.
Public Wi-Fi
clickbait
someone who uncovers computer weaknesses without exploiting them and helps improve the security system.
white hat hacker
program that is capable of copying itself and typically has a detrimental effect on the system. It can NOT be spread without human interaction
Virus
You are a crook and you have been baited to a website that appears to have an easy target but then ends up giving away your identity. You just used a decoy called a...
honeypot
software that enables a user to obtain covert information about another user to acquire things like logins and passwords.
spyware
When malicious code is injected into a popular public web pages of sites that people visit. This code usually leads to a virus download.
watering hole
scammers post an attention grabbing story for the purpose of cultivating followers. Once the page has a high following it replaces the original content-usually malicious
like-pharming
type of software designed to block access the computer system until a sum of money is paid.
ransomware
You find out that someone hacked into your home network and is using your wireless home security camera to monitor when you are home. Your device is part of this which are all devices connected to the world wide web.
Internet of Things
a unique identifier issued by the government to all individuals that when stolen can easily allow theifs to steal your identity.
Social Security Number
service provided by web hosting firms that allow people leniency in the content they put on their servers allowing spammers and ID theft rings to provide illegal information.
bullet proof hosting