Social Engineering
Types of Viruses
Uh Oh
ID Theft
Misc
100

unwanted email-sent with intent to be malicious

Spam

100

a type of malware program that substitutes itself as a legitimate program

trojan horse virus

100

You find out that Target has had their records compromised and you know that you have used your credit card there. Your information has been stolen due to Target experiencing this....

Data Breach

100

 A small device that scans a credit card and stores the information contained in the magnetic strip

skimmer

100

software code that gives access to a program or service the circumvents normal security protections.  Often installed through a trojan horse

backdoor

200

a computer network of zombies under he control of an attacker

Bot Net

200

Self replicating program designed to carry out unauthorized activity.  Can spread themselves from one computer to another without any assistance.  

Computer Worm

200

You accidentally go to a website that looks just like your bank but then you notice the address is PNNCBank.com  instead of PNCBank.com  This misspelled domain is an example of this technique used by ID thieves.

Typosquatting

200

stealing identities to commit fraud involving health insurances by making false claims.

medical identity theft

200

a combination of the term malicious and software

malware

300

an attack that sends an email or other message that falsely claims to be from a legitimate company in an attempt to trick the user into surrendering private info.  

phishing

300

an attack that bombards servers and web sites with traffic that shuts down other websites

DDOS (Denial of Service)

300

You receive a text message stating that you are one of 5 people that have been chosen to win a free ipad.  All you need to do is click on the link and fill out some important information about you yourself and you do.  You are now a victim of

smishing

300

Untrustworthy access to the internet provided by a business.  Can easily be hacked.

Public Wi-Fi

300
You see this on the internet and click on it because you can't resist-"This heartwarming story about a boy and his dog will make you cry, but you won't believe how it ended". This is called...

clickbait

400

someone who uncovers computer weaknesses without exploiting them and helps improve the security system. 

white hat hacker

400

program that is capable of copying itself and typically has a detrimental effect on the system.  It can NOT be spread without human interaction

Virus

400

You are a crook and you have been baited to a website that appears to have an easy target but then ends up giving away your identity.  You just used a decoy called a...

honeypot

400

software that enables a user to obtain covert information about another user to acquire things like logins and passwords.

spyware

400

When malicious code is injected into a popular public web pages of sites that people visit.  This code usually leads to a virus download.

watering hole

500

scammers post an attention grabbing story for the purpose of cultivating followers. Once the page has a high following it replaces the original content-usually malicious 

like-pharming

500

type of software designed to block access the computer system until a sum of money is paid.  

ransomware

500

You find out that someone hacked into your home network and is using your wireless home security camera to monitor when you are home.  Your device is part of this which are all devices connected to the world wide web.

Internet of Things

500

a unique identifier issued by the government to all individuals that when stolen can easily allow theifs to steal your identity.

Social Security Number

500

service provided by web hosting firms that allow people leniency in the content they put on their servers allowing spammers and ID theft rings to provide illegal information. 

bullet proof hosting