SlideShare a Scribd company logo
1 of 10
Download to read offline
Security Terminologies
Lecture 3
Essential Security Terminologies
• Asset : Organizational resource being protected.
• Access: ability to use, manipulate, modify, or affect another subject or
object.
• Attack: Act that causes damage to information or system.
• Control, safeguard or countermeasure : security mechanisms,
policies or procedures
• Exploit: An exploit is a way to take advantage of a vulnerability in
software. Typically, software updates patch these vulnerabilities,
which is why it’s so important to update both your software and
OS.
Essential Security Terminologies (cont’d)
• Exposure :single instance of being open to damage
• Hacking :to illegally gain access to a computer or system
• Risk :the probability that something can happen
• Security Blueprint: the plan for the implementation of new security
measures in the organization
• Security Model: collection of specific security rules that represents the
implementation of a security policy
• Threats: a category of objects, persons, or other entities that represents a
potential danger to an asset
• Threat Agent :a specific instance or component of a more general threat
• Vulnerability: weaknesses or faults in a system or protection mechanism
that expose information to attack or damage.
Essential Security Terminologies (cont’d)
• Adware : A type of malware that primarily exists to barrage the user with
advertisements. Common when you search the web for “free” software.
• Denial-of-Service Attack: A denial-of-service attack (DoS attack) occurs
when an attacker tries to make a service unreachable to legitimate users by
flooding it with illegitimate requests. Often, this comes as a distributed
denial-of-service attack (DDoS), where many different sources create the
flood of traffic.
• DDoS attacks can temporarily shut down websites, credit card payment
services, and similar. When a server suddenly receives millions of requests
per second, it simply can’t keep up with the traffic. This is similar to a large
group of people cramming the door of a store so that normal customers
can’t get in.
Essential Security Terminologies (cont’d)
• Botnet: A botnet refers to a group of
computers under control of an
attacker. Owners of the controlled
computers usually have no idea
they’re being controlled. With the
power of multiple machines, an
attacker can use a botnet to send
large amounts of spam, or perform a
distributed denial-of-service attack
• Command and control Centre
(C&C): is a computer that controls
the botnet
Essential Security Terminologies (cont’d)
• Encryption: encoding information so people who aren’t authorized to see
it have no way to access it.
• Firewall: is a barrier that shields a device or network from dangerous
traffic. It allows you to filter what kind of traffic can come in and go out of a
network. Firewalls can be either software (like the built-in Windows
firewall) or hardware.
• Hacker: is someone who seeks to exploit computer systems. Typically,
you’ll hear about white-hat and black-hat hackers. A white-hat hacker is
honest and works with companies to find and address vulnerabilities
before someone malicious can. A black-hat hacker tries to exploit
vulnerabilities to make money or similar.
Essential Security Terminologies (cont’d)
• Malware : (a combination of “malicious” and “software”) is a catch-all term
for dangerous programs. It encompasses viruses, worms, Trojans, spyware,
and other sorts of nasty software.
• Trojan horse: A piece of malware that often allows a hacker to gain remote
access to a computer through a “back door”.
• Worm: A piece of malware that can replicate itself in order to spread the
infection to other connected computers.
• Virus: is a type of malware that spreads by infecting other files. This contrasts
with other forms of standalone malware.
Essential Security Terminologies (cont’d)
• Spyware: is a type of malware that, as it sounds, is designed to spy on the
user. Due to its nature, spyware usually hides out of view and collects data
about the user’s computer and what he does. It then sends this data to
another server, perhaps to build advertising.
• Ransomware: is a type of malware that encrypts all the files on a computer
and demands payment to unlock them.
• Spam: refers to unwanted content online. Usually this means email spam—
junk messages for shady products and other nonsense. Spam is relatively
harmless, but often includes links to dangerous websites.
Essential Security Terminologies (cont’d)
• Zero-Day: A zero-day vulnerability is one that the software developer or
manufacturer isn’t aware of. A zero-day attack then, is something attackers
launch to exploit a vulnerability before the company even knows about it.
Because no user has received a patch on “day zero”, the vulnerability will
almost always succeed. Thus, these attacks are quite dangerous until they
are patched.
• Phishing: is an attempt to steal personal information by masquerading as a
legitimate entity. Often this involves a fake email that appears to come
from your bank, Apple, Google, etc. It claims that you need to confirm
some information by clicking a link, but doing so takes you to a fake
website. If you enter your info here, you’re handing it over to attackers.
Useful link
• https://www.sans.org/security-resources/glossary-of-terms/

More Related Content

Similar to Lecture 3 Security terminologies.pdf

Attack on computer
Attack on computerAttack on computer
Attack on computerRabail khan
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedBule Hora University
 
CH1- Introduction to malware analysis-v2.pdf
CH1- Introduction to malware analysis-v2.pdfCH1- Introduction to malware analysis-v2.pdf
CH1- Introduction to malware analysis-v2.pdfWajdiElhamzi3
 
Materi Keamanan Siber Prinsip Keamanan Jaringan.pptx
Materi Keamanan Siber Prinsip Keamanan Jaringan.pptxMateri Keamanan Siber Prinsip Keamanan Jaringan.pptx
Materi Keamanan Siber Prinsip Keamanan Jaringan.pptxBernad Bear
 
Computer virus
Computer virusComputer virus
Computer virussajeena81
 
Cyber Security Introduction.pptx
Cyber Security Introduction.pptxCyber Security Introduction.pptx
Cyber Security Introduction.pptxANIKETKUMARSHARMA3
 
Cyber Security Introduction.pptx
Cyber Security Introduction.pptxCyber Security Introduction.pptx
Cyber Security Introduction.pptxSohamChakraborty61
 
Cyber Security Introduction project comprehensive
Cyber Security Introduction project comprehensiveCyber Security Introduction project comprehensive
Cyber Security Introduction project comprehensivesidraasif9090
 
Malware Detection By Machine Learning Presentation.pptx
Malware Detection By Machine Learning  Presentation.pptxMalware Detection By Machine Learning  Presentation.pptx
Malware Detection By Machine Learning Presentation.pptxalishapatidar2021
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanannewbie2019
 
토토어택: Understanding the Threat and complete guide
토토어택: Understanding the Threat and complete guide토토어택: Understanding the Threat and complete guide
토토어택: Understanding the Threat and complete guidePak Plants
 
The Threat Landscape & Network Security Measures
The Threat Landscape & Network Security MeasuresThe Threat Landscape & Network Security Measures
The Threat Landscape & Network Security MeasuresCarl B. Forkner, Ph.D.
 
Introduction to Ethical Hacking pdf file
Introduction to Ethical Hacking pdf fileIntroduction to Ethical Hacking pdf file
Introduction to Ethical Hacking pdf filedebmajumder741249
 

Similar to Lecture 3 Security terminologies.pdf (20)

Attack on computer
Attack on computerAttack on computer
Attack on computer
 
System tThreats
System tThreatsSystem tThreats
System tThreats
 
Lecture 3.pptx
Lecture 3.pptxLecture 3.pptx
Lecture 3.pptx
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganised
 
CH1- Introduction to malware analysis-v2.pdf
CH1- Introduction to malware analysis-v2.pdfCH1- Introduction to malware analysis-v2.pdf
CH1- Introduction to malware analysis-v2.pdf
 
Computer security
Computer securityComputer security
Computer security
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Materi Keamanan Siber Prinsip Keamanan Jaringan.pptx
Materi Keamanan Siber Prinsip Keamanan Jaringan.pptxMateri Keamanan Siber Prinsip Keamanan Jaringan.pptx
Materi Keamanan Siber Prinsip Keamanan Jaringan.pptx
 
Computer virus
Computer virusComputer virus
Computer virus
 
Cyber Security Introduction.pptx
Cyber Security Introduction.pptxCyber Security Introduction.pptx
Cyber Security Introduction.pptx
 
Cyber Security Introduction.pptx
Cyber Security Introduction.pptxCyber Security Introduction.pptx
Cyber Security Introduction.pptx
 
Cyber Security Introduction project comprehensive
Cyber Security Introduction project comprehensiveCyber Security Introduction project comprehensive
Cyber Security Introduction project comprehensive
 
Malware Detection By Machine Learning Presentation.pptx
Malware Detection By Machine Learning  Presentation.pptxMalware Detection By Machine Learning  Presentation.pptx
Malware Detection By Machine Learning Presentation.pptx
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
토토어택: Understanding the Threat and complete guide
토토어택: Understanding the Threat and complete guide토토어택: Understanding the Threat and complete guide
토토어택: Understanding the Threat and complete guide
 
The Threat Landscape & Network Security Measures
The Threat Landscape & Network Security MeasuresThe Threat Landscape & Network Security Measures
The Threat Landscape & Network Security Measures
 
Introduction to Ethical Hacking pdf file
Introduction to Ethical Hacking pdf fileIntroduction to Ethical Hacking pdf file
Introduction to Ethical Hacking pdf file
 
Thur Venture
Thur VentureThur Venture
Thur Venture
 
Venture name Basics
Venture name BasicsVenture name Basics
Venture name Basics
 
Venture name Basics
Venture name BasicsVenture name Basics
Venture name Basics
 

Recently uploaded

(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 

Recently uploaded (20)

(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 

Lecture 3 Security terminologies.pdf

  • 2. Essential Security Terminologies • Asset : Organizational resource being protected. • Access: ability to use, manipulate, modify, or affect another subject or object. • Attack: Act that causes damage to information or system. • Control, safeguard or countermeasure : security mechanisms, policies or procedures • Exploit: An exploit is a way to take advantage of a vulnerability in software. Typically, software updates patch these vulnerabilities, which is why it’s so important to update both your software and OS.
  • 3. Essential Security Terminologies (cont’d) • Exposure :single instance of being open to damage • Hacking :to illegally gain access to a computer or system • Risk :the probability that something can happen • Security Blueprint: the plan for the implementation of new security measures in the organization • Security Model: collection of specific security rules that represents the implementation of a security policy • Threats: a category of objects, persons, or other entities that represents a potential danger to an asset • Threat Agent :a specific instance or component of a more general threat • Vulnerability: weaknesses or faults in a system or protection mechanism that expose information to attack or damage.
  • 4. Essential Security Terminologies (cont’d) • Adware : A type of malware that primarily exists to barrage the user with advertisements. Common when you search the web for “free” software. • Denial-of-Service Attack: A denial-of-service attack (DoS attack) occurs when an attacker tries to make a service unreachable to legitimate users by flooding it with illegitimate requests. Often, this comes as a distributed denial-of-service attack (DDoS), where many different sources create the flood of traffic. • DDoS attacks can temporarily shut down websites, credit card payment services, and similar. When a server suddenly receives millions of requests per second, it simply can’t keep up with the traffic. This is similar to a large group of people cramming the door of a store so that normal customers can’t get in.
  • 5. Essential Security Terminologies (cont’d) • Botnet: A botnet refers to a group of computers under control of an attacker. Owners of the controlled computers usually have no idea they’re being controlled. With the power of multiple machines, an attacker can use a botnet to send large amounts of spam, or perform a distributed denial-of-service attack • Command and control Centre (C&C): is a computer that controls the botnet
  • 6. Essential Security Terminologies (cont’d) • Encryption: encoding information so people who aren’t authorized to see it have no way to access it. • Firewall: is a barrier that shields a device or network from dangerous traffic. It allows you to filter what kind of traffic can come in and go out of a network. Firewalls can be either software (like the built-in Windows firewall) or hardware. • Hacker: is someone who seeks to exploit computer systems. Typically, you’ll hear about white-hat and black-hat hackers. A white-hat hacker is honest and works with companies to find and address vulnerabilities before someone malicious can. A black-hat hacker tries to exploit vulnerabilities to make money or similar.
  • 7. Essential Security Terminologies (cont’d) • Malware : (a combination of “malicious” and “software”) is a catch-all term for dangerous programs. It encompasses viruses, worms, Trojans, spyware, and other sorts of nasty software. • Trojan horse: A piece of malware that often allows a hacker to gain remote access to a computer through a “back door”. • Worm: A piece of malware that can replicate itself in order to spread the infection to other connected computers. • Virus: is a type of malware that spreads by infecting other files. This contrasts with other forms of standalone malware.
  • 8. Essential Security Terminologies (cont’d) • Spyware: is a type of malware that, as it sounds, is designed to spy on the user. Due to its nature, spyware usually hides out of view and collects data about the user’s computer and what he does. It then sends this data to another server, perhaps to build advertising. • Ransomware: is a type of malware that encrypts all the files on a computer and demands payment to unlock them. • Spam: refers to unwanted content online. Usually this means email spam— junk messages for shady products and other nonsense. Spam is relatively harmless, but often includes links to dangerous websites.
  • 9. Essential Security Terminologies (cont’d) • Zero-Day: A zero-day vulnerability is one that the software developer or manufacturer isn’t aware of. A zero-day attack then, is something attackers launch to exploit a vulnerability before the company even knows about it. Because no user has received a patch on “day zero”, the vulnerability will almost always succeed. Thus, these attacks are quite dangerous until they are patched. • Phishing: is an attempt to steal personal information by masquerading as a legitimate entity. Often this involves a fake email that appears to come from your bank, Apple, Google, etc. It claims that you need to confirm some information by clicking a link, but doing so takes you to a fake website. If you enter your info here, you’re handing it over to attackers.