Java Games: Flashcards, matching, concentration, and word search.

Social Engineering Activity 1

AB
AdwareWhile browsing the Internet, you notice that the browser display pop-ups that are targeted towards recent keyboard searches you have performed.
BackdoorMechanism for gaining access to a computer that bypasses or subverts the normal method of authorization
BotnetOrganized group of compromised computers
Browser HijackerThe Browser Hijacker Virus is usually contracted by voluntarily downloading something, and this virus will re-direct you to a different website to usually increase the websites revenue from their advertisements.
Computer wormSelf-replicating program designed to carry out some unauthorized activity on a victim's computer. Worms can spread themselves from one computer to another without any assistance from victims.
Denial of service (dos)An attack that attempts to consume network resources so that the network or its devices cannot respond to legitimate requests.
EncryptionFor security, data is translated into a secret code according to a set of rules in a special 'key'. To convert the data back into plain text, the receiver must also have the key
HackerA person who secretly gains access to computers and files without permission.
Hoaxan act intended to trick or deceive, a fraud; to trick, deceive
Keystoke LoggerRecoding the keys struck on a keyboard
Malwaresoftware designed to infiltrate or damage a computer system without the user's informed consent
Mouse TrappingKeeping visitors from leaving a website by locking them into a window, opening multiple windows on the desktop or re-launching their website in a window that can't be closed is
PharmingReroutes requests for legitimate websites to false websites
PhishingAn attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information
Pop-upan advertisement that opens in a new window when a web page is being viewed
PretextingInvented scenerio.
ScarewareIt is a malware tactic that manipulates users into believing they need to download or buy malicious, sometimes useless, software.
SmishingA type of phishing which uses SMS messages as opposed to emails to target individuals.
Social EngineeringA method of deceiving users into divulging private information, social engineering takes advantage of our natural tendency to trust one another rather than rely solely on technological means to steal information. Often associated with phishing, pharming, spam, and other Internet-based scams.
Spamunwanted e-mail (usually of a commercial nature sent out in bulk)
Spear-PhishingA more targeted attempt to steal sensitive information and typically focuses on a specific individual or organization.
SpywareA computer program which is installed without permission, sometimes through a virus or sometimes as part of the installation of a program. It works by collecting information and sending it back to another source. The information collected could include the websites you have been visiting or what you have been downloading. This can be used for marketing purposes but also for fraud.
TailgatingIt involves someone following an employee into a restricted area.
Trojan Horse VirusA type of malware program that substitutes itself as a legitimate program.
VirusA piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
VishingIt refers to phishing scams that take place over the phone.
Watering HoleWatering hole is a computer attack strategy in which an attacker guesses or observes which websites an organization often uses and infects one or more of them with malware.
Whaling attackIt is an attempt to steal sensitive information and is often targeted at senior management or other high-profile targets such as politicians or celebrities.
ZombieA compromised computer whose owner is unaware the computer is being controlled remotely by an outsider



This activity was created by a Quia Web subscriber.
Learn more about Quia
Create your own activities