My work:
Blended Threat
A blended threat is a software exploit that gives you a bunch of attacks like many worm, a trojan horse, and a computer virus.
Difference between a "hacker" and a "cracker"
A hacker is a person that is intensely interested in the workings of any computer operating system. They are usually programmers and they know a lot about operating systems and programming languages.
A cracker is a person who breaks into a system. Crackers can get unauthorized content and destroy vital data.
White Hat vs. Black Hat vs. Gray Hat
A white hat is a computer and network expert who attacks a security system.
A black hat is a person who compromises the security of a computer system without permission from an authorized party.
DEFCON
Defcon is a convention for hackers. They meet up and have contest involving hacking.
Computer Forensics
Computer Forensics is a branch of digital forensic science pertaining to legal evidence found in computers and digital storage media.
P2P or Peer-to-peer sharing
In a P2P network, the "peers" are computer systems which are connected to each other via the Internet. Files can be shared directly between systems on te network without the need of a central server.
Cyberwar or Cyberterrorism
Using computers to disrupt the activities of the enemy country.
Denial of Service or DoS attack
A DoS attack is to make a machine or network resource unavailable to its users.
Security Hole
Short coming of a computer program that allows unauthorized users to gain access to a system or network, and to interfere with its operations and data.
Security Patch
A software patch that is intended to correct a vulnerability to hacking or viral infection.
Antivirus Programs
They are programs that prevent you from getting a virus on your computer. I
Firewall
It limits the data that can pass through it and protects a networked server can pass through it and protects a networked server or client machine from damage by unauthorized users.
Identity Theft
Its a person that steals someones identity and uses their credit card and everything about themselves.
Packet Sniffer
A sniffer program that targets packets of data transmitted over the Internet.
Suraj's work:
Port Scanning
The act of systematically scanning a computers port. A port being the place where information goes in and out of the computer. Port scanning identifies open doors to your computer.
Cookie
Cookie is a small amount of data generated by a website or web browser. Its purpose is to remember information about you such as login info.
Cache
Stores recently used information so that it could be quickly accessed at a later time. Most common types of cache are: browser cache, disk cache, memory cache and processor cache.
Encryption
Scrambled or coded information that can be only be read and decoded by someone with access to the key. Encryption is used in secure websites and data transfer.
Spam
Generally refers to junk e-mail or irrelevant information.
Spoofing
Refers to tricking or deceiving the computer systems or other computer users. Usually done by hiding ones identity or through bogus accounts.
Scams
Term used to describe any fraud or scheme that takes money or other goods from an unsuspected person.
Phishing
What phishers do is try to steal your personal information usually sending out legit looking e-mails from websites such as Ebay or Paypal and making you fill in your account information. Phishing is a con game that scammers use to collect your personal information from unsuspecting users.
Web Beacon
A often transparent graphic image that is placed on a website or in a email and is used to monitor the behavior of the user that is using the website or who is sending the email.
Cyberbullying
Usually happens through cellphone and internet communication like physical bullying it targets younger or weaker people through the internet by threatening, harassing, embarrassing or humiliating people online.
Cyberstalking
The constant and repeated use of electronic communication to harass or frighten someone, for example by sending threatening emails.
Throw Away Email
An account obtained for one sole purpose that requires a valid email address but the email is never used or looked at again.
Piracy and Copyright Infringement
Piracy is committed when commercial content is downloaded or copied without being paying for it. Or when content is downloaded from unauthorized sources. Copyright Infringement is a violation of a individual or organizations copyright, it targets the unauthorized use of copyrighted material
Dakota's work:
Netizen
A user of the internet, a habitual or avid one
Malware
Software that is intended to damage or disable computers and computer systems
Computer viruses
A software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer; "a
true virus cannot spread to another computer without human assistance", By far one of the most common ways a computer becomes infected is the user accepts what he or she sees on the screen without reading the prompt or understand what it's asking.
Payload
The term used to describe the malicious activity that is the result of an activated computer virus. While not all viruses have a payload, some payloads will perform destructive actions.
Worms
A program or algorithm that replicates itself over a computer network and usually performs malicious actions, such as using up the computer's resources and possibly shutting the system down.
Trojan horses
A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive.
Zombie
A computer that has been implanted with a daemon that puts it under the control of a malicious hacker without the knowledge of the computer owner. Zombies are used by malicious hackers to launch DoS attacks.
Networks
A network is a group of two or more computer systems linked together. Computers on a network are sometimes called nodes. Computers and devices that allocate resources for a network are called servers.
Data Grabbers
A device that captures data. The term is used most often to describe devices that can capture full-motion video from a television or video camera and covert it to digital form for storage on a computers disk.
Data Mining
A class of database applications that look for hidden patterns in a group of data that can be used to predict future behaviour. For example, data mining software can help retail companies find customers with common interests.
PUP
PUP or PUPs is a term used to describe unwanted programs such as trojans, spyware and adware, along with other malware which may compromise your privacy. Some antivirus and PC security software packages, like McAfee VirusScan, will scan for and protect your system against PUPs.
Spyware
Any software that covertly gathers user information through the user's internet connection without his or her knowledge, usually for advertising purposes. Spyware applications are typically bundled as a hidden component of freeware or shareware programs that can be downloaded from the Internet; however, it should be noted that the majority of shareware and freeware applications do not come with spyware.
Adware
Adware is the common name used to describe software that is given to the user with advertisements embedded in the application.
Keystroke Loggers
The pressing of a key. The efficiency of software programs is sometimes measured by the number of keystrokes it requires to perform a specific function.
Source:
http://en.wikipedia.org/wiki/Blended_threat
https://ca.answers.yahoo.com/question/index?qid=20060912204431AA5xm4f
http://www.examiner.com/article/the-types-of-hackers-black-hat-white-hat-or-a-grey-hat-hacker-which-type-are-you
https://www.defcon.org/
http://www.techterms.com/definition/p2p
http://en.wikipedia.org/wiki/Dos_attack
http://www.businessdictionary.com/definition/security-hole.html
http://www.google.ca/search?client=safari&rls=en&q=what+is+a+securty+patch&ie=UTF-8&oe=UTF-8&gfe_rd=ctrl&ei=3sg5U9CuEIvLmAKo4oH4BQ&gws_rd=cr
http://www.google.ca/search?client=safari&rls=en&q=what+is+a+securty+patch&ie=UTF-8&oe=UTF-8&gfe_rd=ctrl&ei=3sg5U9CuEIvLmAKo4oH4BQ&gws_rd=cr#q=what+is+a+antivirus+program&rls=en
http://www.google.ca/search?client=safari&rls=en&q=identity+thief&ie=UTF-8&oe=UTF-8&gfe_rd=cr&ei=3Mo5U96zBO7EmAL-wYDYAw#q=+what+is+a+identity+thief&rls=en
http://www.google.ca/search?client=safari&rls=en&q=identity+thief&ie=UTF-8&oe=UTF-8&gfe_rd=cr&ei=3Mo5U96zBO7EmAL-wYDYAw#q=+what+is+a+packet+sniffer&rls=en
http://www.techterms.com
http://www.webopedia.com
http://dictionary.reference.com/
http://www.webopedia.com/sgsearch/results?cx=partner-pub-8768004398756183%3A6766915980&cof=FORID%3A10&ie=UTF-8&q=blended+threat
https://www.google.ca/#q=definition
Blended Threat
A blended threat is a software exploit that gives you a bunch of attacks like many worm, a trojan horse, and a computer virus.
Difference between a "hacker" and a "cracker"
A hacker is a person that is intensely interested in the workings of any computer operating system. They are usually programmers and they know a lot about operating systems and programming languages.
A cracker is a person who breaks into a system. Crackers can get unauthorized content and destroy vital data.
White Hat vs. Black Hat vs. Gray Hat
A white hat is a computer and network expert who attacks a security system.
A black hat is a person who compromises the security of a computer system without permission from an authorized party.
DEFCON
Defcon is a convention for hackers. They meet up and have contest involving hacking.
Computer Forensics
Computer Forensics is a branch of digital forensic science pertaining to legal evidence found in computers and digital storage media.
P2P or Peer-to-peer sharing
In a P2P network, the "peers" are computer systems which are connected to each other via the Internet. Files can be shared directly between systems on te network without the need of a central server.
Cyberwar or Cyberterrorism
Using computers to disrupt the activities of the enemy country.
Denial of Service or DoS attack
A DoS attack is to make a machine or network resource unavailable to its users.
Security Hole
Short coming of a computer program that allows unauthorized users to gain access to a system or network, and to interfere with its operations and data.
Security Patch
A software patch that is intended to correct a vulnerability to hacking or viral infection.
Antivirus Programs
They are programs that prevent you from getting a virus on your computer. I
Firewall
It limits the data that can pass through it and protects a networked server can pass through it and protects a networked server or client machine from damage by unauthorized users.
Identity Theft
Its a person that steals someones identity and uses their credit card and everything about themselves.
Packet Sniffer
A sniffer program that targets packets of data transmitted over the Internet.
Suraj's work:
Port Scanning
The act of systematically scanning a computers port. A port being the place where information goes in and out of the computer. Port scanning identifies open doors to your computer.
Cookie
Cookie is a small amount of data generated by a website or web browser. Its purpose is to remember information about you such as login info.
Cache
Stores recently used information so that it could be quickly accessed at a later time. Most common types of cache are: browser cache, disk cache, memory cache and processor cache.
Encryption
Scrambled or coded information that can be only be read and decoded by someone with access to the key. Encryption is used in secure websites and data transfer.
Spam
Generally refers to junk e-mail or irrelevant information.
Spoofing
Refers to tricking or deceiving the computer systems or other computer users. Usually done by hiding ones identity or through bogus accounts.
Scams
Term used to describe any fraud or scheme that takes money or other goods from an unsuspected person.
Phishing
What phishers do is try to steal your personal information usually sending out legit looking e-mails from websites such as Ebay or Paypal and making you fill in your account information. Phishing is a con game that scammers use to collect your personal information from unsuspecting users.
Web Beacon
A often transparent graphic image that is placed on a website or in a email and is used to monitor the behavior of the user that is using the website or who is sending the email.
Cyberbullying
Usually happens through cellphone and internet communication like physical bullying it targets younger or weaker people through the internet by threatening, harassing, embarrassing or humiliating people online.
Cyberstalking
The constant and repeated use of electronic communication to harass or frighten someone, for example by sending threatening emails.
Throw Away Email
An account obtained for one sole purpose that requires a valid email address but the email is never used or looked at again.
Piracy and Copyright Infringement
Piracy is committed when commercial content is downloaded or copied without being paying for it. Or when content is downloaded from unauthorized sources. Copyright Infringement is a violation of a individual or organizations copyright, it targets the unauthorized use of copyrighted material
Dakota's work:
Netizen
A user of the internet, a habitual or avid one
Malware
Software that is intended to damage or disable computers and computer systems
Computer viruses
A software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer; "a
true virus cannot spread to another computer without human assistance", By far one of the most common ways a computer becomes infected is the user accepts what he or she sees on the screen without reading the prompt or understand what it's asking.
Payload
The term used to describe the malicious activity that is the result of an activated computer virus. While not all viruses have a payload, some payloads will perform destructive actions.
Worms
A program or algorithm that replicates itself over a computer network and usually performs malicious actions, such as using up the computer's resources and possibly shutting the system down.
Trojan horses
A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive.
Zombie
A computer that has been implanted with a daemon that puts it under the control of a malicious hacker without the knowledge of the computer owner. Zombies are used by malicious hackers to launch DoS attacks.
Networks
A network is a group of two or more computer systems linked together. Computers on a network are sometimes called nodes. Computers and devices that allocate resources for a network are called servers.
Data Grabbers
A device that captures data. The term is used most often to describe devices that can capture full-motion video from a television or video camera and covert it to digital form for storage on a computers disk.
Data Mining
A class of database applications that look for hidden patterns in a group of data that can be used to predict future behaviour. For example, data mining software can help retail companies find customers with common interests.
PUP
PUP or PUPs is a term used to describe unwanted programs such as trojans, spyware and adware, along with other malware which may compromise your privacy. Some antivirus and PC security software packages, like McAfee VirusScan, will scan for and protect your system against PUPs.
Spyware
Any software that covertly gathers user information through the user's internet connection without his or her knowledge, usually for advertising purposes. Spyware applications are typically bundled as a hidden component of freeware or shareware programs that can be downloaded from the Internet; however, it should be noted that the majority of shareware and freeware applications do not come with spyware.
Adware
Adware is the common name used to describe software that is given to the user with advertisements embedded in the application.
Keystroke Loggers
The pressing of a key. The efficiency of software programs is sometimes measured by the number of keystrokes it requires to perform a specific function.
Source:
http://en.wikipedia.org/wiki/Blended_threat
https://ca.answers.yahoo.com/question/index?qid=20060912204431AA5xm4f
http://www.examiner.com/article/the-types-of-hackers-black-hat-white-hat-or-a-grey-hat-hacker-which-type-are-you
https://www.defcon.org/
http://www.techterms.com/definition/p2p
http://en.wikipedia.org/wiki/Dos_attack
http://www.businessdictionary.com/definition/security-hole.html
http://www.google.ca/search?client=safari&rls=en&q=what+is+a+securty+patch&ie=UTF-8&oe=UTF-8&gfe_rd=ctrl&ei=3sg5U9CuEIvLmAKo4oH4BQ&gws_rd=cr
http://www.google.ca/search?client=safari&rls=en&q=what+is+a+securty+patch&ie=UTF-8&oe=UTF-8&gfe_rd=ctrl&ei=3sg5U9CuEIvLmAKo4oH4BQ&gws_rd=cr#q=what+is+a+antivirus+program&rls=en
http://www.google.ca/search?client=safari&rls=en&q=identity+thief&ie=UTF-8&oe=UTF-8&gfe_rd=cr&ei=3Mo5U96zBO7EmAL-wYDYAw#q=+what+is+a+identity+thief&rls=en
http://www.google.ca/search?client=safari&rls=en&q=identity+thief&ie=UTF-8&oe=UTF-8&gfe_rd=cr&ei=3Mo5U96zBO7EmAL-wYDYAw#q=+what+is+a+packet+sniffer&rls=en
http://www.techterms.com
http://www.webopedia.com
http://dictionary.reference.com/
http://www.webopedia.com/sgsearch/results?cx=partner-pub-8768004398756183%3A6766915980&cof=FORID%3A10&ie=UTF-8&q=blended+threat
https://www.google.ca/#q=definition