10 Hacking Terms You Need to Know, Hughes Office Equipment

10 Hacking Terms You Need to Know

  • 0

Phishing, DoS, logic bomb – cyber threat terminology can be confusing and hard to keep track of in the ever-changing security landscape. But it’s important to understand the latest threats so you can develop a comprehensive security protocol.

Here are some definitions to help:

  1. Back door: A back door is a hole in the software that allows a user to bypass the typical security process. This can be left by coders for troubleshooting, or created by malware and it can be exploited by hackers to compromise your system.
  2. Denial of service (DoS): This type of attack aims to disable your website or network by flooding it with bogus requests, tying up your resources so service is denied to legitimate users. A distributed denial of service attack (DDos) uses a network of infected computers to carry out the attack.
  3. Dictionary attack: A dictionary attack is a brute force method of guessing your password by systematically trying common words and phrases to get into your account.
  4. Logic bomb: When a cyber attack is programmed to be triggered by a specific event or series of events (such as at a date/time), it is called a logic bomb.
  5. Malware: Malware is malicious software. It is a broad term for any type of software that can cause harm to your computer or network.
  6. Man in the middle: A man in the middle attack occurs when data is intercepted when being transferred between two computers.
  7. Phishing: Phishing is a type of attack usually done by email that appears to be sent from a legitimate source asking the user to provide login or sensitive data, or click on a compromised link. Spear phishing is a more carefully targeted type of phishing attack.
  8. Social engineering: Hackers know the end user is the most vulnerable point in your network and uses social engineering to get the user to allow the hacker into the network. This can be done via phishing or other means.
  9. Visual hacking: Visual hacking is done in person rather than by technology, and consists of viewing sensitive data left out in your office space, such as on the print tray or someone’s monitor.
  10. Zero-day attack: This type of attack uses previously unknown holes in a program and exploits it.

It’s hard to defend against what you don’t understand, and cyber threats are no different. By staying up on the latest lingo surrounding hacking, you can better protect your business.

To learn more about keeping your data safe, contact us and schedule a no-obligation technology assessment.

tech-assessment

Leave a Reply

Your email address will not be published.