Words Definitions
ABDUL,Jabirl and Ijaaz
ABDUL,Jabirl and Ijaaz
- Netizen - A person who uses the internet a lot, derived from the word internet and citizen
- Malware - Short for Malicious Software and is used to disrupt computer software, gather sensitive information, or gain access to private computers
- Computer Virus - It is a type of malware when sent it replicates itself into computer software and when it is complete the computer becomes infected
- Payload - The part of the malware which performs the malicious act
- Worms - A computer malware that multiplies itself on the internet and spreads through the internet too
- Trojan Horse - A non-replicating malware that hides itself in something that looks good in an advertisement but end up destroying your computer
- Zombie or Bot - When your computer is under control by a hacker and can use it for sending malicious emails and the users never know
- Bot Armies or Networks - A group of computers set up to send spam and viruses without the owner realizing it
- Data Grabber - A malware that mines through your data and takes important stuff
- Data Mining - Is the computational process of discovering patterns in large data sets
- PUPs (Potentially unwanted programs) - An unwanted program that tags along with something you download that includes spyware, adware and dialers.
- Spyware - A software that aids in gathering information without the owners knowledge
- Adware - Or advertisement supported software, as a malware it is in a form of a pop-up
- Keystroke Logging - The action of capturing what the person typed on their computer without their realization
- Blended Threat: A blended threat is software exploit, which in turn involves a combination of attacks against different vulnerabilities. For example, many worn, a trojan horse and a computer virus exploit multiple techniques to attack and propagate. It is a kind of computer threat.
- Difference between a "hacker" and a "cracker":(Hacker) A person who uses computers to gain unauthorized access to data or a hacker is someone who seeks and exploits weaknesses in a computer system or computer network.
(Cracker) A person who attempts or breaks into a secure computer system, with the intent of stealing or destroying
information or disabling the system - White hat vs. black hat vs. gray hat:(White Hat) A white hat hacker is a computer security specialist who breaks into protected systems and networks to test and asses their security. White hat hackers use their skills to improve security by exposing vulnerabilities before malicious hackers (known as black hat hackers) can detect and exploit them.(Black Hat) A black hat hacker is a person who attempts to find computer security vulnerabilities and exploit them for personal financial gain or other malicious reasons
This differs from white hat hackers, which are security specialists employed to use hacking methods to find security flaws that black hat hackers may exploit.
(Grey Hat) Grey hat hackers perform illegal hacking activities to show off their skills, rather than to achieve personal gain. - DEFCON: DEFCON" (DEFense CONdition), the term for the defense readiness condition of the U.S. Armed Forces, DEF CON includes lectures on cracking computers and networks and contests to see who can break a code the fastest.
- Computer Forensics: computer forensics is the analysis of computer data to determine who did what when.
- P2P or Peer-to-peer sharing: A network of personal computers, each of which acts as both client and sever, so that each can exchange files and email directly with every other computer on the network. Each computer can access any of the others, although access can be restricted to those files that a computer's user chooses to make available. Peer-to-peer networks are less expensive than client/server networks but less efficient when large amounts of data need to be exchanged.
- Cyberwar or cyberterrorism: Cyberwarfare is any virtual conflict initiated as a politically motivated attack on an enemy's computer and information systems. Waged via the Internet, these attacks disable financial and organizational systems by stealing or altering classified data to undermine networks, websites and services.
- Denial of Service or DoS attack: A denial of service (DoS) attack is a malicious attempt to make a server or a network resource unavailable to users, usually by temporarily interrupting or suspending the services of a host connected to the Internet.
- Security Hole: Shortcoming of a computer program (software code) that allows unauthorized users(hackers) to gain access to system or network, and to interfere with its operations and data.
- Security Patch: A security patch is a change applied to an asset to correct the weakness described by a vulnerability. This corrective action will prevent successful exploitation and remove or mitigate a threat’s capability to exploit a specific vulnerability in an asset.
- Antivirus Programs: A utility that searches a hard disk for viruses and removes any that are found. Most antivirus programs include an auto-update feature that enables the program to download profiles of new viruses so that it can check for the new viruses as soon as they are discovered.
- Firewall: A firewall is a software or hardware-based network security system that controls the incoming and outgoing network traffic by analyzing the data packets and determining whether they should be allowed through or not
- Identity Theft: Stealing the identity of others by using their credit card, drivers license, social security or other personal identification numbers. With "true name" identity theft, the thief uses the information to open new accounts. With "account takeover" identity theft, the thief uses the information to access existing accounts.
- Packet sniffer: A packet sniffer is a utility that has been used since the original release of Ethernet. Packet sniffing allows individuals to capture data as it is transmitted over a network. Packet sniffer programs are commonly used by network professionals to help diagnose network issues and are also used by malicious users to capture unencrypted data like passwords and usernames in network traffic. Once this information is captured, the user can then gain access to the system or network.
- Port scanning: A port scanner is a software program designed to go through a large listing of interesting ports or all available network ports and probe each port to see if it is available or open and accepting packets.
- Piracy and copyright infringement: it is the use of works protected by copyright law without permission, infringing certain exclusive rights granted to the copy right holder
- Throwaway email account: refers to an alternative way of sharing and managing email addressing. DEA sets up a new, unique email address for every contact or entity, making a point-to-point connection between the sender and the recipient. Subsequently, if anyone compromises the address or utilises it in connection email abuse, the address-owner can easily cancel (or "dispose" of) it without affecting any of his other contacts
- Cyber stalking: is the use of the Internet or other electronic means to stalk or harass an individual, a group of individuals, or an organization. It may include the making of false accusations or statements of fact (as in defamation), monitoring, making threats, identity theft, damage to data or equipment, the solicitation of minors for sex, or gathering information that may be used to harass. The definition of "harassment" must meet the criterion that a reasonable person, in possession of the same information, would regard it as sufficient to cause another reasonable person distress
- Cyber bullying: is the use of Information Technology to harm or harass other people in a deliberate, repeated, and hostile manner. According to U.S. Legal Definitions, Cyber-bullying could be limited to posting rumors or gossips about a person in the internet bringing about hatred in other’s minds; or it may go to the extent of personally identifying victims and publishing materials severely defaming and humiliating them
- Web bug or web beacon: is an object that is embedded in a web page or email and is usually invisible to the user but allows checking that a user has viewed the page or email. Web beacon is an object that is embedded in a Web page or e-mail and is usually invisible to the user but allows checking that a user has viewed the page or e-mail. Alternative names are Web bug, tracking bug, pixel tag, and clear gif
- Phishing: is the act of attempting to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication
- Scams: scams are a type of fraud and one of the most common types of confidence trick. There are many variations on this type of scam, including advance-fee fraud, Fifo's Fraud, Spanish Prisoner Scam, the black money scam and the Detroit-Buffalo scam
- Spoofing: is the creation of email messages with a forged sender address - something which is simple to do because the core protocols do no authentication. Spam and phishing emails typically use such spoofing to mislead the recipient about the origin of the message
- Spam: also known as junk mail or unsolicited bulk email (UBE) is a subset of electronic spam involving nearly identical messages sent to numerous recipients by email. Clicking on links in spam email may send users to phishing web sites or sites that are hosting malware. Spam email may also include malware as scripts or other executable file attachments. Definitions of spam usually include the aspects that email is unsolicited and sent in bulk.
- Encryption: is the process of encoding messages or information in such a way that only authorized parties can read it.
- Cache: is a component that transparently stores data so that future requests for that data can be served faster. The data that is stored within a cache might be values that have been computed earlier or duplicates of original values that are stored elsewhere.
- Cookie: also known as an HTTP cookie, web cookie, or browser cookie, is a small piece of data sent from a website and stored in a user's web browser while the user is browsing that website. Every time the user loads the website, the browser sends the cookie back to the server to notify the website of the user's previous activity.
- Port scanning: a technique used by computer hackers by which an individual sends requests via a worm or other program to various networked computer ports in an effort to ascertain whether particular machines have vulnerabilities that would leave them susceptible to external intrusion