IDSC - Test E

  1. cybercriminals who infiltrate systems and collect data for illegal resale
    data harvesters
  2. criminals that purchase assets from data harvesters to be used for illegal financial gain - might buy goods using stolen credit cards or create false accounts
    cash-out fraudsters
  3. hordes of surreptitiously infiltrated computers, controlled remotely
    botnets
  4. an attack where a firm's computer systems are flooded with thousands of seemingly legitimate requests, the sheer volume of which will slow or shut down the site's use
    DDoS (distributed denial of service) attacks
  5. protester seeking to make a political point by leveraging technology tools, often through system infiltration, defacement, or damage
    hacktivists
  6. a term that may be applied to either 1) someone who breaks into a computer or 2) to a particularly clever programmer
    hacker
  7. a term that may be applied to either 1) breaking into a computer system or 2) to a particularly clever solution
    hack
  8. someone who uncovers computer weaknesses without exploiting them - contributes to improving system security
    white hat hackers
  9. computer criminals
    black hat hackers
  10. when a firm employs a group to act like bad actors in an attempt to uncover weaknesses before they are exploited
    red team
  11. defensive security professionals responsible for maintaining internal network defenses against cyberattacks and threats
    blue team
  12. cons executed using technology in order to acquire sensitive information or trick someone into installing malicious software
    phishing
  13. phishing attacks that specifically target a given organization or group of users
    spear phishing
  14. email transmissions and packets that have been altered to forge or disguise their origin or identity
    spoofed
  15. new attacks that haven't been clearly identified and haven't been incorporated into security screening systems
    zero-day exploits
  16. sophisticated media (audio, image, video) created by AI that attempts to look or sound like a real person or event
    deepfakes
  17. pejorative term for an unsophisticated hacker that relies on scripts or downloaded programs to perpetrate hacking, rather than develop original exploits
    script kiddies
  18. measure and analyze human body characteristics for identification or authentication
    biometrics
  19. a type of security that requires two separate forms of identification order to gain access
    2FA (two-factor authentication)
  20. when identity is proven by presenting more than one item for proof of credentials
    multi-factor authentication
  21. adds biometrics to multi-factor authentication at the point of purchase alongside fingerprint readers and facial recognition
    voice-print
  22. scrambled character images to thwart automated account setup or ticket buying attempts
    CAPTCHAs
  23. seeks to compromise a computing system without permission
    malware
  24. infect other software of files
    viruses
  25. take advantage of security vulnerability to automatically spread
    worms
  26. attempt to sneak in by masquerading as something they're not
    trojans
  27. used in click fraud, sending spam, executing 'dictionary' password cracking attempts, and to decipher accounts that use CAPTCHAs
    zombie networks
  28. installed without full user consent or knowledge, later serve unwanted advertisements
    malicious adware
  29. monitors user actions, network traffic, or scans for files
    spyware
  30. records user keystrokes
    keylogger
  31. records pixels that appear on a user's screen to identify proprietary information
    screen capture
  32. captures data from a card's magnetic strip
    card skimmer
  33. malicious code that scans for sensitive data
    RAM scraping/storage scanning software
  34. malware that encrypts user's files with demands that a user pay to regain control of their data and/or device
    ransomware
  35. attacks combining multiple malware or hacking exploits
    blended threats
  36. when the network itself is a source of compromise
    network threats
  37. combing through trash to identify valuable assets
    dumpster diving
  38. gaining compromising info through observation
    shoulder surfing
  39. scrambling data using a code, thereby hiding it from those who do not have the unlocking key
    encryption
  40. code that unlocks encryption
    key
  41. exhausts all possible password combinations to break into an account
    brute-force attacks
  42. two key system used for securing electronic transmissions
    public key encryption
  43. trusted third party that provides authentication services in public key encryption schemes
    certificate authority
  44. control network traffic, block unauthorized traffic
    firewalls
  45. monitor network use for hacking attempts and take preventive action
    intrusion detection systems
  46. tempting, bogus targets meant to lure hackers
    honeypots
  47. deny the entry of specific IP addresses and other entities
    blacklists
  48. permit communication only with approved entities or in an approved manner
    whitelists
  49. internet services that foster collaboration and information sharing
    Web 2.0
  50. content that is created, shared, and commented on by a broader community of users
    social media
  51. collaboration between users to create content, products, and services
    peer production
  52. participants share access to products and services, rather than having ownership
    collaborative consumption
  53. the positive influence created when someone finds out that others are doing something
    social proof
  54. short for 'web log' - an online publication that keeps a running chronology of entries
    blogs
  55. a website that anyone can edit directly from within the browser
    wikis
  56. online community that allows users to establish a personal profile, link to other profiles, share content, and communicate with members via messaging, posts
    electronic social network
  57. short, asynchronous messaging system
    microblogging
  58. an online community that allows users to establish a personal profile and communicate with others
    social networks
  59. information or applications that spread rapidly between users
    viral
  60. a person capable of swaying a target audience
    influencer
  61. idea that a group of individuals, often consisting of untrained amateurs, will collectively have more insight than a single or small group of trained professionals
    wisdom of crowds
  62. polling a diverse crowd and aggregating opinions in order to form a forecast of an eventual outcome
    prediction market
  63. the act of taking a job traditionally performed by a designated agent and outsourcing it to an undefined, generally large group of people in the form of an open call
    crowdsourcing/open innovation
Author
gabeernst
ID
366182
Card Set
IDSC - Test E
Description
Updated