Please enable JavaScript.
Coggle requires JavaScript to display documents.
Definitions (Electrical power (Brownout: A long-term decreasing in the…
Definitions
Via E-mails
Advance-fee fraud (AFF): A form of social engineering, typically conducted via e-mail, in which an organization or some third party indicates that the recipient is due a big amount of money and needs only a small advance fee or personal banking information to facilitate the transfer.
-
Spam: Unsolicited commercial e-mail, typically for advertisin
By the owner
Back door or Trap door or Maintenance hook:
(1) A malware that provides access to a system by bypassing normal access controls.
(2) An intentional bypass way left by a system designer to facilitate development.
Penetration tester: An information security professional with authorization to attempt to gain system access to identify and recommend resolutions for vulnerabilities in those systems.
Disruption
Availability disruption: An interruption in service, which causes an adverse event within an organization.
Distributed denial-of-service (DDoS): A DoS attack in which a coordinated stream of requests against a target from many locations at the same time using bots or zombies.
Denial-of-service (DoS) attack: An attack that attempts to overwhelm a computer ability to handle incoming communications and prohibiting legitimate users from accessing those systems.
-
Booting
Boot virus or Boot sector virus: type of virus that targets the boot sector or Master Boot Record (MBR) of a computer system’s hard drive
Passwords
Brute force password attack: An attempt to guess a password by attempting every possible combination of characters and numbers in it.
Rainbow table: A table of hash values and their corresponding plaintext values that can be used to look up password values if an attacker is able to steal a system’s encrypted password file.
Competition
Competitive intelligence: The collection and analysis of information about the business competitors through legal and ethical means to gain competitive advantage.
Industrial espionage or corporate spying: The collection and analysis of information about the business competitors, often through illegal or unethical means, to gain an unfair competitive advantage.
Copyright
Cracking: Attempting to reverse-engineer, or bypass a password or other access controls
Cracker: A hacker who intentionally removes software copyright protection designed to prevent unauthorized duplication or use.
Intellectual property (IP): The creation, ownership, and control of original ideas as well as the representation of those ideas.
Software piracy: The unauthorized duplication, installation, or distribution of copyrighted computer software, which is a violation of intellectual property.
Political Aims
Cyberwarfare: Formally offensive operations conducted by a government or state against information or systems of another government or state
Cyberactivist or Hacktivist: A hacker who seeks disrupt systems to protest policies, or actions of an organization or government agency.
-