A+ GRADED. Buy Quality Materials!
Virus
Software written with malicious intent to cause annoyance or damage.
Adware
Software that generates ads that install themselves on a computer when a person
downloads some other program from the Internet.
Spyware
Software that comes hidden in free downloadable software and tracks online
movements, mines the information stored on a computer, or uses a computer's CPU
and storage for some task the user knows nothing about.
Social Engineering
Using one's social skills to trick people into revealing access credentials or other
information valuable to the attacker
Dumpster Diving
Looking through people's trash, another way hackers obtain information.
Identity Theft
The forging of someone's identity for the purpose of fraud
Phishing
Technique to gain personal information for the purpose of identity theft, usually by
means of fraudulent email.
Spear Phishing
A phishing expedition in which the emails are carefully designed to target a particular
person or organization
Phishing Expedition
A masquerading attack that combines spam with spoofing.
Vishing
A phone scam that attempts to defraud people by asking them to call a bogus telephone
number to "confirm" their account information.
Pharming
Reroutes requests for legitimate websites to false websites
Zombie
A program that secretly takes over another computer for the purpose of launching
attacks on other computers
Authentication
A method for confirming users' identities
Authorization
The process of giving someone permission to do or have something.
Time Bombs
Computer viruses that wait for a specific date before executing instructions.
Content Filtering