목록Study/Cyber Security Terms (7)
TH3 6R3@T H@CK
1. Worm Malware that can reproduce itself for the purposes of spreading itself to other computers in the network. Particularly nasty, worms can either be simply a means of slowing down a system by eating up resources, or by committing exploits such as installing back doors or stealing data. 2. Cloud You already utilize cloud computing if you use Gmail for email, Google Drive for document storage..
1. Trojan Horse Yet another form of malware, this one a misleading computer program that looks innocent, but in fact allows the hacker into your system via a back door, allowing them to control your computer. 2. Virus Malware which changes, corrupts, or destroys information, and is then passed on to other systems, usually by otherwise benign means → ?(e.g. sending an email). In some cases, a vir..
1. Ransomware A form of malware that hijacks your system and encrypts your files, denying you access to them until you send money to unlock everything. In other words, it kidnaps your computer and holds it for ransom, hence the clever name. 2. Spoofing Sadly, this has nothing to do with Weird AI Yankovic doing a parody version of a popular song. Rather, it's when a hacker changes the IP address ..
1. Malware A portmanteau of "malicious" and "software", describing a wide variety of bad software used to infect and/or damage a system. Ransomware, worms, viruses, and trojans are all considered malware. It most often delivered via spam emails. 2. Man in the Middle Attack An attack on the "middleman", in this case, defined as the WI-Fi system that connects users to the Internet. Hackers who com..
1. Exploit A means of attack on a computer system, either a series of commands, malicious software, or piece of infected data. Note that in this context, "exploit" is a noun, not a verb, as in "The hacker used a malware exploit to gain accesss to the credit card's server." 2. Firewall Any technology, be it software or hardware, used to keep intruders out. 3. Hacker, Black Hat Any hacker who atte..
1. DDoS The acronym stands for Distributed Denial of Service and is a favorite Black Hat tool. Using multiple hosts and users, hackers bombard a website with a tidal wave of requests to such an extent that it locks up the system and forces it to temporarily shut down. 2. Domain A series of computers and associated peripherals(routers, printers, scanners), that are all connected as one entity. 3...
1. Authentication The process of identifying a user's identity, making sure that they can have access to the system and/or files. This can be accomplished either by a password, retina scan, or fingerprint scan, sometimes even a combination of the above. 2. Botnet A combination of the words "robot" and "network", a botnet is a network of computers that have been infected with a virus, and now are..