Explore tens of thousands of sets crafted by our community.
Cyber Thriller Terminology
30
Flashcards
0/30
Malware
Software designed to disrupt, damage, or gain unauthorized access to a computer system. Novel Title: 'Malware Manifest by cyber_writer.'
Ransomware
A type of malware that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid. Novel Title: 'Ransomware Reckoning by coder_cliffhanger.'
Worm
A standalone malware computer program that replicates itself in order to spread to other computers, often using a computer network to spread itself. Novel Title: 'The Worm's Web by viral_tale_virtuoso.'
Honeypot
A security mechanism that's set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems, often resembling a decoy server to attract attackers. Novel Title: 'Honeypot Hazard by decoy_drama.'
Brute Force Attack
A trial-and-error method used to obtain information such as a user password or personal identification number (PIN). Novel Title: 'Brute Force Breakthrough by cybercrime_chronicler.'
Spear Phishing
An email-targeted attack that uses personalized information to trick the recipient into clicking on a malicious link or providing confidential information. Novel Title: 'Spear Phishing Strategy by cyberplot_crafter.'
Cryptocurrency
A digital or virtual currency that uses cryptography for security and is typically decentralized. Novel Title: 'The Cryptocurrency Conundrum by blocks_and_chains.'
VPN
A Virtual Private Network extends a private network across a public network and enables users to send and receive data as if their computing devices were directly connected to the private network. Novel Title: 'VPN Vendetta by net_privacy_novelist.'
White Hat Hacker
An ethical computer hacker, or a computer security expert, who specializes in penetration testing and other testing methodologies to ensure the security of an organization's information systems. Novel Title: 'White Hat Wars by benevolent_hacker.'
Logic Bomb
A piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met. Novel Title: 'Logic Bomb Lunacy by trigger_tale_techie.'
Backdoor
A method of bypassing normal authentication procedures and gaining access to a system, often hidden from end users and system administrators. Novel Title: 'Backdoor Breach by covert_code_writer.'
Deep Web
Portion of the internet that is not indexed by standard search engines, typically requiring special browsers or authorization to access. Novel Title: 'Deep Web Dossier by shadow_navigate_novelist.'
Firewall
A network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies. Novel Title: 'Firewall Fighters by digital_defense_author.'
Two-factor Authentication
A security process in which the user provides two different authentication factors to verify themselves to better protect both the user's credentials and the resources the user can access. Novel Title: 'The Two-Factor Trap by multi_auth_thriller.'
Rootkit
A set of software tools that enable an unauthorized user to gain control of a computer system without being detected. Novel Title: 'Rootkit Rebellion by stealth_software_scribe.'
Trojan Horse
A type of malware that is often disguised as legitimate software. Users are typically tricked by some form of social engineering into loading and executing it on their systems. Novel Title: 'Trojan Horse Takedown by tech_thriller_tale.'
Black Hat Hacker
A hacker who violates computer security for personal gain or maliciousness. Novel Title: 'Black Hat Betrayal by cybercrime_creator.'
Phishing
The fraudulent practice of sending emails purporting to be from reputable companies to induce individuals to reveal personal information. Novel Title: 'The Phishing Game by your_favorite_author.'
Encryption
The process of converting information or data into a code, especially to prevent unauthorized access. Novel Title: 'The Encryption Enigma by cryptic_coder.'
Spoofing
A fraudulent or malicious practice in which communication is sent from an unknown source disguised as a source known to the receiver. Novel Title: 'Spoofing Spree by deceit_drama_author.'
Zero-Day Exploit
A cyber attack that occurs on the same day a weakness is discovered in software, before the developer has made a fix available. Novel Title: 'Zero-Day Countdown by cyber_race_author.'
Penetration Testing
A method for gaining assurance in the security of an IT system by attempting to breach some or all of that system's security, using the same tools and techniques an attacker might use. Novel Title: 'Pen Test Peril by security_saga.'
Social Engineering
The use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes. Novel Title: 'The Social Engineer's Apprentice by your_deceptive_mind.'
Gray Hat Hacker
A hacker who may sometimes violate ethical standards or principles, but does not have the malicious intent typically associated with black hat hackers. Novel Title: 'Gray Hat Game by ethical_edge_writer.'
Air Gap
A security measure that involves isolating a computer or network and preventing it from establishing an external connection. Novel Title: 'Air Gap Apocalypse by isolation_intrigue.'
DDoS Attack
A distributed denial-of-service attack, where multiple compromised computer systems attack a target, such as a server, website or other network resource, and cause a denial of service for users. Novel Title: 'DDoS Dominion by net_wars_novelist.'
Dark Web
Part of the World Wide Web that is only accessible by means of special software, allowing users and website operators to remain anonymous or untraceable. Novel Title: 'Dark Web Deceit by incognito_author.'
Botnet
A network of private computers infected with malicious software and controlled as a group without the owners' knowledge, e.g., to send spam messages. Novel Title: 'The Botnet Syndicate by hacker_scribe.'
Sandboxing
A security mechanism for separating running programs, usually in an effort to mitigate system failures or software vulnerabilities from spreading. Novel Title: 'The Sandboxing Spectrum by virtual_verse.'
Keylogger
A type of surveillance software that has the capability to record every keystroke you make to a log file, usually encrypted. Novel Title: 'The Keylogger's Code by stealth_stories.'
© Hypatia.Tech. 2024 All rights reserved.