Adware — Adware is software designed to pressure pre-chosen advertisements to show on your system.
Attack —An assault is an action that is carried out on a machine to get its access and extract sensitive information.
Backdoor – A back door, or entice door, is a hidden
access to a computing device or software program that bypasses security
measures, which include logins and password protections.
Bot – A bot is a software that automates an action
so that it could be performed again and again at a far higher charge for
a more sustained period than a human operator should do it. For
example, sending HTTP, FTP or Telnet at a higher rate or calling script
to create gadgets at a higher fee.
Botnet — A botnet, also known as zombie army, is a
set of computers controlled without their owners’ information. Botnets
are used to send unsolicited mail or make denial of carrier assaults.
Brute force attack — A brute pressure attack is an
automated and the most effective type of technique to benefit access to a
machine or website. It attempts different aggregate of usernames and
passwords, time and again again, until it gets in.
Buffer Overflow — Buffer Overflow is a flaw that
happens when more statistics is written to a block of reminiscence, or
buffer, than the buffer is allotted to hold.
Clone phishing — Clone phishing is the amendment of
an existing, legitimate e-mail with a false link to trick the recipient
into offering private records.
Cracker – A cracker is person who modifies the
software program to get admission to the functions that are considered
undesirable via the person cracking the software, especially replica
protection functions.
Denial of service assault (DoS) — A denial of
service (DoS) assault is a malicious try to make a server or a network
aid unavailable to customers, typically by quickly interrupting or
postponing the offerings of a host connected to the Internet.
DDoS – Distributed denial of service assault.
Exploit Kit – An exploit kit is software gadget
designed to run on internet servers, with the reason of figuring out
software program vulnerabilities in purchaser machines speaking with it
and exploiting located vulnerabilities to upload and execute malicious
code on the client.
Exploit — Exploit is a bit of software program, a
chunk of facts, or a series of instructions that takes advantage of a
bug or vulnerability to compromise the security of a pc or community
system.
Firewall —A firewall is a filter designed to hold
undesirable intruders out of doors a pc machine or community while
allowing safe verbal exchange between systems and users on the internal
of the firewall.
Keystroke logging — Keystroke logging is the method
of monitoring the keys which might be pressed on a computer (and which
touchscreen points are used). It is virtually the map of a pc/human
interface. It is utilized by grey and black hat hackers to report login
IDs and passwords. Keyloggers are typically secreted onto a device the
usage of a Trojan introduced through a phishing email.
Logic bomb — A virus secreted into a device that
triggers a malicious action when sure situations are met. The most
common version is the time bomb.
Malware — Malware is an umbrella term used to refer
to a range of sorts of hostile or intrusive software program, including
pc viruses, worms, Trojan horses, ransomware, spyware, adware,
scareware, and other malicious programs.
Master Program — A master program is the program a
black hat hacker makes use of to remotely transmit instructions to
infected zombie drones, normally to carry out Denial of Service assaults
or unsolicited mail attacks.
Phishing — Phishing is an electronic mail fraud
approach in which the culprit sends out valid-looking emails, in an try
to gather non-public and financial statistics from recipients.
Phreaker – Phreakers are taken into consideration
the original laptop hackers and they’re folks that smash into the
telephone network illegally, normally to make free longdistance phone
calls or to tap cellphone lines.
Rootkit — Rootkit is a stealthy sort of software,
usually malicious, designed to hide the lifestyles of positive
approaches or applications from regular methods of detection and enable
persisted privileged get right of entry to a computer.
Shrink Wrap code – A Shrink Wrap code assault is an act of exploiting holes in unpatched or poorly configured software.
Social engineering — Social engineering implies
deceiving someone with the purpose of acquiring sensitive and nonpublic
information, like credit score card info or consumer names and
passwords.
Spam — A Spam is genuinely an unsolicited e mail,
also called junk electronic mail, despatched to a massive number of
recipients without their consent.
Spoofing – Spoofing is a technique used to benefit
unauthorized access to computers, whereby the intruder sends messages to
a computer with an IP deal with indicating that the message is coming
from a relied on host.
Spyware — Spyware is software program that aims to
acquire facts about a person or agency with out their understanding and
that can ship such facts to another entity without the consumer’s
consent, or that asserts manipulate over a computer without the
consumer’s understanding.
SQL Injection – SQL injection is an SQL code
injection technique, used to assault information-pushed applications, in
which malicious SQL statements are inserted into an entry subject for
execution (e.G. To dump the database contents to the attacker).
Threat – A chance is a likely threat that can
exploit an existing bug or vulnerability to compromise the safety of a
pc or network machine.
Trojan — A Trojan, or Trojan Horse, is a malicious
program disguised to seem like a valid application, making it tough to
differentiate from packages which can be supposed to be there designed
with an goal to destroy documents, alter statistics, thieve passwords or
different information.
Virus — A virus is a worm or a bit of code which is
able to copying itself and usually has a detrimental effect, which
include corrupting the device or destroying statistics.
Vulnerability —A vulnerability is a weak spot which allows a hacker to compromise the safety of a laptop or network machine.
Worms – A worm is a self-replicating virus that doesn’t alter files but is living in active memory and duplicates itself.
Cross-site Scripting – Cross-website scripting (XSS)
is a sort of computer safety vulnerability generally discovered in net
applications. XSS allows attackers to inject purchaser-facet script into
net pages considered through different customers.
Zombie Drone – A Zombie Drone is defined as a
hi-jacked laptop this is getting used anonymously as a soldier or
‘drone’ for malicious activity, for example, distributing undesirable
unsolicited mail e-mails.
Encryption – is a process of encoding a message or
information to make it unreadable and secretive. This ensures that the
concerned information is concealed only to the authorized parties.
Often, encryption is employed by hackers to extort money by unleashing
ransomware on computer systems, thus locking out victims and encrypting
their files. The decryption key is provided only when a certain ransom
is paid.