Cyber Crime
Security
Malwares
Security Terms
Principles
100

A scam where a hacker poses as a legitimate business or organization in order to fool the victim into giving them sensitive personal information or inducing them to click a link or attachment that ends up delivering malware.

Phishing

100

It is a software designed to detect and destroy computer viruses.

Antivirus

100

Malware that can reproduce itself for the purposes of spreading itself to other computers in the network.

Worm

100

Two or more computers connected together to share resources (such printers and CDs), exchange files, or enable electronic communications.

Network 

100

Information about persons should not be collected or processed illegally.

Principle of lawfulness and fairness

200

Any hacker who attempts to gain unauthorized access to a system with the intent to cause mischief, damage, or theft.

Black Hat Hacker

200

It is a series of numbers allocated to computers routers  servers, and pretty much anything connected to the Internet, including websites. It functions very similarly to a standard address.

IP Address

200

This malware is a misleading computer program that looks innocent, but in fact allows the hacker into your system via a back door, allowing them to control your computer.

Trojan Horse

200

This strategy relies on user manipulation and human psychology.

Social engineering

200

All data collected should be complete and true to its origin and form.

Principle of accuracy

300

These attacks are generally performed by amatures who don‟t have any predefined motives to perform the cyber attack.

Unstructured attacks

300

Any technology, be it software or hardware, used to keep intruders out.

Firewall

300

It bombards users with endless ads and pop-up windows and causes a nuisance to the user experience.

Adware

300

The process of identifying a user’s identity, making sure that they can have access to the system and/or files.

Authentication

300

All data collected shall be declared for its intended utilization.

Principle of purpose-specification

400

It is a cyber attack in which the network is choke and often collapsed by flooding it with useless traffic and thus preventing the legitimate network traffic.

Denial of Service attack (DoS)

400

Coding used to protect your information from hackers.

Encryption

400

A form of malware that hijacks your system and encrypts your files, denying you access to them until you send money to unlock everything.

Ransomeware

400

It provides additional, revised or updated code for an operating system or application.

Patch

400

Appropriate measures should be taken to protect the files against both natural dangers, such as accidental loss or destruction, and human dangers, such as unauthorized access, fraudulent misuse of data or contamination by computer viruses.

Principle of security

500

It is an attack which proceeds with small increments and final add up to lead to a major attack.

Salami attack

500

It is a string of characters that allows access to a computer system or service.

Password

500

It is the use of online ads to distribute malicious programs.

Malvertising

500

It means that the data is only available to authorized parties.

Confidentiality

500

Everyone who offers proof of identity has the right to know whether information concerning him/ her is being processed and to obtain it in an intelligible form, without undue delay or expense, and to have appropriate rectifications or erasures made in the case of unlawful, unnecessary or inaccurate entries and, when it is being communicated, to be informed of the addressees.

Principle of interested-person access