Logo
Pattern

Discover published sets by community

Explore tens of thousands of sets crafted by our community.

Cyber Thriller Terminology

30

Flashcards

0/30

Still learning
StarStarStarStar

Malware

StarStarStarStar

Software designed to disrupt, damage, or gain unauthorized access to a computer system. Novel Title: 'Malware Manifest by cyber_writer.'

StarStarStarStar

Ransomware

StarStarStarStar

A type of malware that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid. Novel Title: 'Ransomware Reckoning by coder_cliffhanger.'

StarStarStarStar

Worm

StarStarStarStar

A standalone malware computer program that replicates itself in order to spread to other computers, often using a computer network to spread itself. Novel Title: 'The Worm's Web by viral_tale_virtuoso.'

StarStarStarStar

Honeypot

StarStarStarStar

A security mechanism that's set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems, often resembling a decoy server to attract attackers. Novel Title: 'Honeypot Hazard by decoy_drama.'

StarStarStarStar

Brute Force Attack

StarStarStarStar

A trial-and-error method used to obtain information such as a user password or personal identification number (PIN). Novel Title: 'Brute Force Breakthrough by cybercrime_chronicler.'

StarStarStarStar

Spear Phishing

StarStarStarStar

An email-targeted attack that uses personalized information to trick the recipient into clicking on a malicious link or providing confidential information. Novel Title: 'Spear Phishing Strategy by cyberplot_crafter.'

StarStarStarStar

Cryptocurrency

StarStarStarStar

A digital or virtual currency that uses cryptography for security and is typically decentralized. Novel Title: 'The Cryptocurrency Conundrum by blocks_and_chains.'

StarStarStarStar

VPN

StarStarStarStar

A Virtual Private Network extends a private network across a public network and enables users to send and receive data as if their computing devices were directly connected to the private network. Novel Title: 'VPN Vendetta by net_privacy_novelist.'

StarStarStarStar

White Hat Hacker

StarStarStarStar

An ethical computer hacker, or a computer security expert, who specializes in penetration testing and other testing methodologies to ensure the security of an organization's information systems. Novel Title: 'White Hat Wars by benevolent_hacker.'

StarStarStarStar

Logic Bomb

StarStarStarStar

A piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met. Novel Title: 'Logic Bomb Lunacy by trigger_tale_techie.'

StarStarStarStar

Backdoor

StarStarStarStar

A method of bypassing normal authentication procedures and gaining access to a system, often hidden from end users and system administrators. Novel Title: 'Backdoor Breach by covert_code_writer.'

StarStarStarStar

Deep Web

StarStarStarStar

Portion of the internet that is not indexed by standard search engines, typically requiring special browsers or authorization to access. Novel Title: 'Deep Web Dossier by shadow_navigate_novelist.'

StarStarStarStar

Firewall

StarStarStarStar

A network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies. Novel Title: 'Firewall Fighters by digital_defense_author.'

StarStarStarStar

Two-factor Authentication

StarStarStarStar

A security process in which the user provides two different authentication factors to verify themselves to better protect both the user's credentials and the resources the user can access. Novel Title: 'The Two-Factor Trap by multi_auth_thriller.'

StarStarStarStar

Rootkit

StarStarStarStar

A set of software tools that enable an unauthorized user to gain control of a computer system without being detected. Novel Title: 'Rootkit Rebellion by stealth_software_scribe.'

StarStarStarStar

Trojan Horse

StarStarStarStar

A type of malware that is often disguised as legitimate software. Users are typically tricked by some form of social engineering into loading and executing it on their systems. Novel Title: 'Trojan Horse Takedown by tech_thriller_tale.'

StarStarStarStar

Black Hat Hacker

StarStarStarStar

A hacker who violates computer security for personal gain or maliciousness. Novel Title: 'Black Hat Betrayal by cybercrime_creator.'

StarStarStarStar

Phishing

StarStarStarStar

The fraudulent practice of sending emails purporting to be from reputable companies to induce individuals to reveal personal information. Novel Title: 'The Phishing Game by your_favorite_author.'

StarStarStarStar

Encryption

StarStarStarStar

The process of converting information or data into a code, especially to prevent unauthorized access. Novel Title: 'The Encryption Enigma by cryptic_coder.'

StarStarStarStar

Spoofing

StarStarStarStar

A fraudulent or malicious practice in which communication is sent from an unknown source disguised as a source known to the receiver. Novel Title: 'Spoofing Spree by deceit_drama_author.'

StarStarStarStar

Zero-Day Exploit

StarStarStarStar

A cyber attack that occurs on the same day a weakness is discovered in software, before the developer has made a fix available. Novel Title: 'Zero-Day Countdown by cyber_race_author.'

StarStarStarStar

Penetration Testing

StarStarStarStar

A method for gaining assurance in the security of an IT system by attempting to breach some or all of that system's security, using the same tools and techniques an attacker might use. Novel Title: 'Pen Test Peril by security_saga.'

StarStarStarStar

Social Engineering

StarStarStarStar

The use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes. Novel Title: 'The Social Engineer's Apprentice by your_deceptive_mind.'

StarStarStarStar

Gray Hat Hacker

StarStarStarStar

A hacker who may sometimes violate ethical standards or principles, but does not have the malicious intent typically associated with black hat hackers. Novel Title: 'Gray Hat Game by ethical_edge_writer.'

StarStarStarStar

Air Gap

StarStarStarStar

A security measure that involves isolating a computer or network and preventing it from establishing an external connection. Novel Title: 'Air Gap Apocalypse by isolation_intrigue.'

StarStarStarStar

DDoS Attack

StarStarStarStar

A distributed denial-of-service attack, where multiple compromised computer systems attack a target, such as a server, website or other network resource, and cause a denial of service for users. Novel Title: 'DDoS Dominion by net_wars_novelist.'

StarStarStarStar

Dark Web

StarStarStarStar

Part of the World Wide Web that is only accessible by means of special software, allowing users and website operators to remain anonymous or untraceable. Novel Title: 'Dark Web Deceit by incognito_author.'

StarStarStarStar

Botnet

StarStarStarStar

A network of private computers infected with malicious software and controlled as a group without the owners' knowledge, e.g., to send spam messages. Novel Title: 'The Botnet Syndicate by hacker_scribe.'

StarStarStarStar

Sandboxing

StarStarStarStar

A security mechanism for separating running programs, usually in an effort to mitigate system failures or software vulnerabilities from spreading. Novel Title: 'The Sandboxing Spectrum by virtual_verse.'

StarStarStarStar

Keylogger

StarStarStarStar

A type of surveillance software that has the capability to record every keystroke you make to a log file, usually encrypted. Novel Title: 'The Keylogger's Code by stealth_stories.'

Know
0
Still learning
Click to flip
Know
0
Logo

© Hypatia.Tech. 2024 All rights reserved.