click below
click below
Normal Size Small Size show me how
ITECH Ch 19
Term | Definition |
---|---|
Biometrics | Technologies that measure and analyze human body characteristics for identification or authentication |
Black hat hackers | A computer criminal |
Blacklists | Programs that deny the entry or exit of specific IP addresses, products, Internet domains, and other communication restrictions. |
Botnets | Hordes of surreptitiously infiltrated computers, linked and controlled remotely, also known as zombie networks. |
Brute-force attacks | An attack that exhausts all possible password combinations in order to break into an account. |
CAPTCHAs | An acronym standing for completely automated public Turing test to tell computers and humans apart |
Cash-out fraudsters | Criminals who purchase assets from data harvesters to be used for illegal financial gain |
Certificate authority | A trusted third party that provides authentication services in public key encryption schemes. |
Data harvesters | Cybercriminals who infiltrate systems and collect data for illegal resale |
Distributed denial of service (DDoS) | An attack where a firm's computer systems are flooded with thousands of seemingly legitimate requests, the sheer volume of which will slow or shut down the site's use. |
Dumpster diving | Combing through trash to identify valuable assets. |
Encryption | Scrambling data using a code or formula, known as a cipher, such that it is hidden from those who do not have the unlocking key. |
Firewalls | A system that acts as a control for network traffic, blocking unauthorized traffic while permitting acceptable use. |
Hack | A term that may, depending on the context, refer to either 1) breaking into a computer system, or 2) a particularly clever solution. |
Hacker | A term that, depending on the context, may be applied to either 1) someone who breaks into computer systems, or 2) to a particularly clever programmer. |
Hacktivists | A protester seeking to make a political point by leveraging technology tools, often through system infiltration, defacement, or damage. |
Honeypots | A seemingly tempting, but bogus target meant to draw hacking attempts. |
Intrusion detection systems | A system that monitors network use for potential hacking attempts. Such a system may take preventative action to block, isolate, or identify attempted infiltration, and raise further alarms to warn security personnel. |
Key (encryption) | Code that unlocks encryption. |
Multi-factor authentication | When identity is proven by presenting more than one item for proof of credentials. Multiple factors often include a password and some other identifier |
Phishing | A con executed using technology, typically targeted at acquiring sensitive information or tricking someone into installing malicious software. |
Public key encryption | A two-key system used for securing electronic transmissions. One key distributed publicly is used to encrypt (lock) data, but it cannot unlock data. Unlocking can only be performed with the private key |
Shoulder surfing | Gaining compromising information through observation (as in looking over someone's shoulder). |
Spoofed | Term used in security to refer to forging or disguising the origin or identity. E-mail transmissions and packets that have been altered to seem as if they came from another source. |
Voice-print | Technology that identifies users via unique characteristics in speech. |
White hat hackers | Someone who uncovers computer weaknesses without exploiting them. The goal of the white hat hacker is to improve system security. |
Whitelists | Highly restrictive programs that permit communication only with approved entities and/or in an approved manner. |
Zero-day exploits | Attacks that are so new that they haven't been clearly identified, and so they haven't made it into security screening systems. |