-
cybercriminals who infiltrate systems and collect data for illegal resale
data harvesters
-
criminals that purchase assets from data harvesters to be used for illegal financial gain - might buy goods using stolen credit cards or create false accounts
cash-out fraudsters
-
hordes of surreptitiously infiltrated computers, controlled remotely
botnets
-
an attack where a firm's computer systems are flooded with thousands of seemingly legitimate requests, the sheer volume of which will slow or shut down the site's use
DDoS (distributed denial of service) attacks
-
protester seeking to make a political point by leveraging technology tools, often through system infiltration, defacement, or damage
hacktivists
-
a term that may be applied to either 1) someone who breaks into a computer or 2) to a particularly clever programmer
hacker
-
a term that may be applied to either 1) breaking into a computer system or 2) to a particularly clever solution
hack
-
someone who uncovers computer weaknesses without exploiting them - contributes to improving system security
white hat hackers
-
computer criminals
black hat hackers
-
when a firm employs a group to act like bad actors in an attempt to uncover weaknesses before they are exploited
red team
-
defensive security professionals responsible for maintaining internal network defenses against cyberattacks and threats
blue team
-
cons executed using technology in order to acquire sensitive information or trick someone into installing malicious software
phishing
-
phishing attacks that specifically target a given organization or group of users
spear phishing
-
email transmissions and packets that have been altered to forge or disguise their origin or identity
spoofed
-
new attacks that haven't been clearly identified and haven't been incorporated into security screening systems
zero-day exploits
-
sophisticated media (audio, image, video) created by AI that attempts to look or sound like a real person or event
deepfakes
-
pejorative term for an unsophisticated hacker that relies on scripts or downloaded programs to perpetrate hacking, rather than develop original exploits
script kiddies
-
measure and analyze human body characteristics for identification or authentication
biometrics
-
a type of security that requires two separate forms of identification order to gain access
2FA (two-factor authentication)
-
when identity is proven by presenting more than one item for proof of credentials
multi-factor authentication
-
adds biometrics to multi-factor authentication at the point of purchase alongside fingerprint readers and facial recognition
voice-print
-
scrambled character images to thwart automated account setup or ticket buying attempts
CAPTCHAs
-
seeks to compromise a computing system without permission
malware
-
infect other software of files
viruses
-
take advantage of security vulnerability to automatically spread
worms
-
attempt to sneak in by masquerading as something they're not
trojans
-
used in click fraud, sending spam, executing 'dictionary' password cracking attempts, and to decipher accounts that use CAPTCHAs
zombie networks
-
installed without full user consent or knowledge, later serve unwanted advertisements
malicious adware
-
monitors user actions, network traffic, or scans for files
spyware
-
records user keystrokes
keylogger
-
records pixels that appear on a user's screen to identify proprietary information
screen capture
-
captures data from a card's magnetic strip
card skimmer
-
malicious code that scans for sensitive data
RAM scraping/storage scanning software
-
malware that encrypts user's files with demands that a user pay to regain control of their data and/or device
ransomware
-
attacks combining multiple malware or hacking exploits
blended threats
-
when the network itself is a source of compromise
network threats
-
combing through trash to identify valuable assets
dumpster diving
-
gaining compromising info through observation
shoulder surfing
-
scrambling data using a code, thereby hiding it from those who do not have the unlocking key
encryption
-
code that unlocks encryption
key
-
exhausts all possible password combinations to break into an account
brute-force attacks
-
two key system used for securing electronic transmissions
public key encryption
-
trusted third party that provides authentication services in public key encryption schemes
certificate authority
-
control network traffic, block unauthorized traffic
firewalls
-
monitor network use for hacking attempts and take preventive action
intrusion detection systems
-
tempting, bogus targets meant to lure hackers
honeypots
-
deny the entry of specific IP addresses and other entities
blacklists
-
permit communication only with approved entities or in an approved manner
whitelists
-
internet services that foster collaboration and information sharing
Web 2.0
-
content that is created, shared, and commented on by a broader community of users
social media
-
collaboration between users to create content, products, and services
peer production
-
participants share access to products and services, rather than having ownership
collaborative consumption
-
the positive influence created when someone finds out that others are doing something
social proof
-
short for 'web log' - an online publication that keeps a running chronology of entries
blogs
-
a website that anyone can edit directly from within the browser
wikis
-
online community that allows users to establish a personal profile, link to other profiles, share content, and communicate with members via messaging, posts
electronic social network
-
short, asynchronous messaging system
microblogging
-
an online community that allows users to establish a personal profile and communicate with others
social networks
-
information or applications that spread rapidly between users
viral
-
a person capable of swaying a target audience
influencer
-
idea that a group of individuals, often consisting of untrained amateurs, will collectively have more insight than a single or small group of trained professionals
wisdom of crowds
-
polling a diverse crowd and aggregating opinions in order to form a forecast of an eventual outcome
prediction market
-
the act of taking a job traditionally performed by a designated agent and outsourcing it to an undefined, generally large group of people in the form of an open call
crowdsourcing/open innovation
|
|