Anonymous
a well-known network of individuals who are involved in hacktivism
Black hats
individuals focused on taking advantage of security problems for personal
gain
Copyright infringement
the use of protected works without permission
Cracking
breaching security to access computer networks
Cyberbullying
the use of electronic technologies to intimidate another person
Cybercrime
crime that makes use of the computers and the internet
Cyberspy
an individual responsible for gaining secret information and providing it to
another interested party
Cyberstalking
following and harassing another person online or via electronic technologies
Cyberterrorists
individuals and groups who make malicious cyberattacks for political
reasons
Cybertheft
theft through the use of computers and the internet
Cybervandalism
cyberattacks designed to maliciously modify content or programs
Cyberwarfare
cyberattacks that interfere with another government or organization for
political or military reasons
Cyberwarriors
individuals involved in causing or preventing cyberattacks against a
government or organization
Cyberespionage
the use of computers and the internet to spy on governments or organizations
Denial-of-service attack (DoS)
a cyberattack that causes a device or network to be unavailable often by overloading it
Gray hates
individuals that may not be as ethical as white hats but not as malicious as
black hats
Hacking
the use of technical skills to address problems or to take advantage of
problems
Hacktivist
a person who maliciously uses computer skills to advance a political view or movement
Identity theft
the illegal use of another person’s information for one’s own gain
Industrial espionage
theft of information from a company through spying
Infrastructure
the interconnected networks, devices, systems, and facilities that are
central to the operation of society
Intellectual property
works or concepts that are considered the property of the individuals or organizations who create them
Internet activism
efforts to advance a political view or movement through the use of technology
Just war theory
the view that war should only be undertaken when there are compelling reasons to do so
Logic bombs
malicious code that waits for specific circumstances to activate
Malvertising
malicious advertising designed to spread malware
Malware
software that maliciously interferes with normal operations of a computer or
computer system
Noncombatant immunity
the view that civilians should be protected from harm during a conflict
Offensive (proactive) security
measures taken to to prevent security breaches
Pharming
redirecting a user to a fake version of a reputable website
Phising
fraudulent attempts to induce a person to reveal personal information based
on appearing to be a legitimate organization
Reactive security
responses to security threats after a breach has occurred
Salami slice fraud
the stealing of small fractions of money
Skimming
the use of an electronic device to steal personal information
Spyware
software that gathers information about a user and may gain control of a
user’s device
The dark web
a collection of websites that is not accessible through typical search engines and browsers
Trojan horse
a type of malware that misleads the user into thinking that the program is safe
United States Cyber Command (USCYBERCOM)
a grouping within the military that focuses on defending U.S. military networks from cyberattacks
Vigilante justice
attempts to punish others that are conducted outside of the legitimate criminal justice system
Virus
a type of malware designed to spread from one user to another
Warez
illegally copied works distributed online
Website defacement
a cyberattack in which a website is maliciously changed without the website owner’s permission
Whistleblower
an individual who speaks up when they have knowledge of illegal or unethical activities within an organization
White hats
individuals who work with an organization to identify security problems
Wikileaks
an organization that serves as a platform for anonymously publishing
confidential information and other secrets
Worm
a type of malware that spreads malicious code by replicating on its own