click below
click below
Normal Size Small Size show me how
CUT5 9.1
Computers: Understanding Tech 5e 9.1
Term | Definition |
---|---|
cybercrime | Crime committed using a computer. |
threat | The estimated severity of a security breach. For example, the risk of having all customer credit card numbers stolen is a severe threat. |
vulnerability | The likelihood of a security breach of systems or data occurring. For example, if the likelihood of a hacker stealing all the user passwords on a system is very low, the system is not very vulnerable to that risk. |
hacker | A computer expert that seeks programming, security, and system challenges by attempting to gain access to systems and sites for which he or she is not authorized. |
cracker | A hacker with malicious or criminal intent. |
cyberwar | Groups of international hackers attacking sites in the countries where the rival hackers live. |
system backdoor | An all-access login for a system created by the original programmers for testing purposes. A backdoor should be removed before the software is released, but is sometimes forgotten until a hacker finds and exploits it. |
spoofing | Fooling another computer by altering the address that the system automatically puts on every message sent. The address is changed to one the receiving computer is programmed to accept as a trusted source. |
industrial espionage | Stealing corporate information. |
rogue hotspot | A service that seems to be a wireless access point but is actually a computer set up to capture user data. |
war driving | Using a motorized vehicle and a laptop to cruise streets in search of vulnerable networks. Using a GPS, antenna, and software, hackers can collect information on wireless access points or break into networks. |
denial of service (DoS) attack | An attempt to deny legitimate users of a website access by flooding the server with repeated requests from automated programs. |
identity theft | A hacking crime that involves the theft of personal information used to impersonate an individual. |
phishing | Simulating an email or website with whom the user has an established relationship in order to gain the user’s login information. |