Terms to Know
Crimes
Hackers Terms to Know
Cybercrime
Terms Identified by Classmates
100
A hidden fragment of computer code which propagates by inserting itself into or modifying other programs.
What is computer virus?
100
Repeatedly sending message that include threats of harm or are highly intimidating; engaging in other online activities that make a person afraid for his or her safety.
What is cyber-stalking?
100
A program that allows the user to take control of a person’s phone. Not only can the user make calls, he can send messages, essentially do whatever the phone is capable of doing. The program user can also listen in on conversations made on the phone.
What is blue bugging?
100
Cybercriminals can gain access to individual computers to peek through files, website browsing history, access passwords, or possibly even save files to your machine. This type of fraud is known as computer trespass1. In many cases, computer trespassing is accomplished by luring people to click on attachments or download files. For instance, a recent Black Friday scam sent victims an e-mail that was apparently from Apple, promising a $50 iTunes gift card if they downloaded a particular file. The file actually allowed its creators to access passwords and other sensitive information on computers that downloaded it.
What is computer trespassing?
100
The act of using a portable data storage device such as an iPod digital audio player to illicitly download large quantities of confidential data by directly plugging it into a computer where the data is held, and which may be on the inside of a firewall.
What is pod slurping?
200
A malware program that can be used by a black hat cracker to remotely take control of a system so it can be used as a zombie drone for further attacks, like spam emails or Denial of Service attacks, without a user’s knowledge.
What is Zombie/Zombie Drone?
200
Electronic forms of money include wire transfers and data transferred between financial accounts with credit, debit, or smart cards.
What is money laudering?
200
Programs that are created to avoid antivirus detection, usually by encryption that hinders detection. They can install themselves onto a disk or a hard drive. They typically do not duplicate themselves as worms do.
What is droppers?
200
Researchers at Columbia University recently discovered a serious security flaw in certain printers, as well. Many printers automatically update their software when accepting a print job, connecting to the Internet to download the latest print drivers. Researchers believe that criminals could exploit this process by having printers download malicious files to trespass on networks the printers are connected to, or even to make the printers overheat and catch fire.
What is hardware hijacking?
200
Stealthier and involves examination network to determine the operating system. It usually goes undetected by an IDS or other security system. It was used to infer the remote machine's operating system.
What is passive stack fingerprints?
300
A malware program that it is installed on a system through various means, including the same methods that allows viruses to be injected into a system. .
What is root kit?
300
The result of hacking is to cause violence against persons or property, or at least cause enough harm to generate fear.
What is cyber-terrorism?
300
A malicious program that has not been updated through or reported to any security scanners, making it practically invisible.
What is zero day threat?
300
Posted obscene or cruel messages to the victim on social media sites like Facebook, uploaded embarrassing videos of them to sites like YouTube, or impersonated someone else to toy with their emotions.
What is cyberbullying?
300
It involves the use of misdirection in order to deceive victims. Black hats cover their tracks by altering or faking IP addresses or emails to lure unsuspecting victims into linking into a site that may infect their systems.
What is spoofing?
400
The act of driving around in a vehicle with the purpose of finding an open, unsecured Wi-Fi wireless network.
What is wardriving?
400
The unlawful misappropriation of money or other things of value, by the person to whom the property was entrusted (typically an employee), for his or her own purpose.
What is embezzlement?
400
A malicious program designed to execute at a predetermined time or date. They are often set to trigger on special days like holidays. It can steal, delete, and corrupt system information.
What is time bomb?
400
Messages can be used to trick people into giving up sensitive personal information (known as “phishing”), or as carriers for computer worms and viruses.
What is spam?
400
A small packet of information from a visited webserver stored on your system by your computer’s browser.
What is cookie?
500
A malicious program that is designed to execute at a specific time or date.
What is time bomb?
500
The intentional misrepresentation of information or identity to deceive others, the unlawful use of a credit or debit card or ATM, or the use of electronic means to transmit deceptive information, in order to obtain money or other things of value. Fraud may be committed by someone inside or outside the business.
What is fraud?
500
The disruption, degradation, or exhaustion of an Internet connection or e-mail service that results in an interruption of the normal flow of information.
What is denial of service?
500
involves large-scale attacks on computers, websites, and networks. Jamming or hijacking a satellite or phone network, which can be done through computers, is one example of information warfare. Hijacked computers can then be turned into “zombies” that spread malicious code, or paralyze a website by repeatedly trying to gain access—what’s known as a DDoS attack. DDoS stands for “distributed denial of service”, and is basically the use of many computers to swamp a targeted website so that it cannot operate.
What is information warfare?
500
Gaining unauthorized access to a computer system via another’s user’s legitimate connection. An example would be seeing an open computer because the authorized user had to use the restroom. The issue comes into place when a person who does not have access to secret computer projections uses this specific open computer to look at the files.
What is piggyback?
M
e
n
u