Wednesday, December 9, 2009

Computer "Tip of the Day" 12-09-09

BAD GUYS
HACKERS AND CRACKERS: Individuals who break into systems with malicious intent, destroy data, steal copyrighted software or confidential information, and perform other destructive or illegal acts with computers and networks.

VULNERABILITIES AND EXPLOITS: Your computer is vulnerable when a hardware or software flaw makes it possible to compromise its security and smooth operation. An exploit is a software application or program that takes advantage of a vulnerability to attack your system.

SNIFFING: Listening in on a network in order to capture and steal sensitive information.

SPOOFING: An attack in which a person or program you shouldn't trust masquerades as a person or program you do trust. For example, an attacker forges an email address in order to make you believe it's from someone you know and trust.

PHISHING: A widespread form of Internet fraud that aims to steal valuable information such as credit card and social security numbers and usernames and passwords, by sending you misleading emails designed to lure you into visiting phony or rigged websites.

IDENTITY THEFT: Cybercriminals steal identities by overhearing conversations on cellphones, intercepting faxes and emails, hacking into computers, employing telephone and email scams, and phishing the users of online services.

SOCIAL ENGINEERING: Deceptions by criminals posing as someone you trust in order to get you to divulge sensitive information.

No comments:

Post a Comment