Chapter 9 Flashcards Preview

Business Information Management > Chapter 9 > Flashcards

Flashcards in Chapter 9 Deck (28)
Loading flashcards...
1

botnet

a network of private computers infected with malicious software and controlled as a group without the owners' knowledge

2

Distributed Denial of Service attack

many hacked computers send a large number of simultaneous request to the server, causing servers to become overloaded and crash

3

hacktivism

people want to make a political statement by using technological means

4

data harvesters

criminals who only steal data to resell them

5

cash-out fraudster

someone who buys data from a data harvester

6

white hat hacker

good natured hacker

7

black hat hacker

cybercriminal

8

social engineering

forger who impersonates an identity of a person or company in which people or companies are fooled

9

spear phishing attack

when there is a focus on a specific target group

10

spoofed message

messages which pretend to be from a friend

11

zero-day exploits

attacks that are so new that they have not been processed in security systems yet

12

biometrics

technologies that measure human characteristics

13

SQL injection technique

people can be registered and removed from the file of a website

14

intrusion detection system

help to stop these types of criminals (SQL injection technique criminals) because this type of software specialises in identifying unauthorised behavior

15

malware

malicious software that searches for weak spots in a security system

16

worm

damages other software or files whereby the worm independently finds its way

17

trojan

malware that tries to penetrate by pretending to be something else

18

malicious adware

programs that provide unwanted advertisements

19

CAPTCHA's

tasks you must perform to prove that you are a human and not a computer

20

RAM scraping or storage scanning software

a code that scans the computer memory to find sensitive data

21

ransomware

users must pay money to regain access to these files

22

blended threat

when multiple types of malware to plan an attack are used

23

brute force attack

trying all passwords to enter an account

24

public key encryption

there is public key that is used when locking data. People that have a separate, private key that they can use to access the data

25

certificate authority

party that authenticates the encryption by means of the public key

26

dumpster diving

searching waste for valuable data

27

shoulder surfing

valuable data is gathered by observing people

28

patch

software update that improves security shortcomings