Hacking

|| || || || || || || || ||
 * Air Gap || A security measure often taken for computers and computer networks that must be extraordinarily secure. It consists of ensuring that a secure network is completely physically, electrically, and electromagnetically isolated from insecure networks, such as the public Internet or an insecure local area network. ||
 * Backdoor || A method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected. The backdoor may take the form of an installed program ||
 * Botnet || a collection of software agents, or robots, that run autonomously and automatically. The term is most commonly associated with IRC bots and more recently malicious software, but it can also refer to a network of computers using distributed computing software.
 * Distributed Denial of Service (DDoS) || It occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers. These systems are compromised by attackers using a variety of methods.
 * Keylogging || the action of tracking (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored.
 * Social Engineering || The act of manipulating people into performing actions or divulging confidential information, rather than by breaking in or using technical cracking techniques. While similar to a confidence trick or simple fraud, the term typically applies to trickery or deception for the purpose of information gathering, fraud, or computer system access; in most cases the attacker never comes face-to-face with the victim. ||
 * Zero Day Exploit || A computer threat that tries to exploit computer application vulnerabilities that are unknown to others or undisclosed to the software developer. Zero-day exploits are used or shared by attackers before the developer of the target software knows about the vulnerability. ||
 * Cracker || coined in an effort to distinguish between those adhering to the historical use of the term "hack" within the programmer community and those performing computer break-ins. ||
 * Zombie || a computer connected to the Internet that has been compromised by a hacker, computer virus or trojan horse. Generally, a compromised machine is only one of many in a botnet, and will be used to perform malicious tasks of one sort or another under remote direction.
 * Time Bomb || A computer program that has been written so that it will stop functioning after a predetermined date or time is reached.
 * Data Execution Prevention (DEP) || A security feature that is intended to prevent an application or service from executing code from a non-executable memory region. DEP runs in two modes: hardware-enforced DEP for CPUs that can mark memory pages as nonexecutable, and software-enforced DEP with a limited prevention for CPUs that do not have hardware support. ||
 * Fuzzing || A software testing technique that provides invalid, unexpected, or random data to the inputs of a program. ||
 * Identity Theft || A form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. The victim of identity theft can suffer adverse consequences if he or she is held accountable for the perpetrator's actions
 * Data Theft || An increasingly growing problem primarily perpetrated by office workers with access to technology. Employees often feel they have some right to the information and are inclined to copy and/or delete part of it when they leave the company, or misuse it while they are still in employment. ||
 * Spoofing || A situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining an illegitimate advantage.
 * Threat || a possible danger that might exploit a vulnerability and is a potential for violation of security, which exists when there is a circumstance, capability, action, or event that could breach security and cause harm. ||
 * Trojan || malware that appears to perform a desirable function for the user prior to run or install but instead facilitates unauthorized access of the user's computer system.
 * Dictionary Attack || A technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by searching likely possibilities. A dictionary attack uses a targeted technique of successively trying all the words in an exhaustive list called a dictionary, derived from a list of words for example a dictionary or a bible. ||
 * Denial of Service (DoS) || An attempt to make a computer resource unavailable to its intended users and consists of the concerted efforts of a person or people to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely.
 * Intrusion Detection System (IDS) || A device or software application that monitors network and/or system activities for malicious activities or policy violations and produces reports by identifying possible incidents, logging information about them, attempting to stop them, reporting them to security administrators and identifying problems with security policies, documenting existing threats, and deterring individuals from violating security policies

||

|| ||
 * Malware || A software designed to secretly access a computer system without the owner's informed consent and is hostile, intrusive, or annoying software or program code ||
 * Packet Sniffer || A computer program or a piece of computer hardware that can intercept and log traffic passing over a digital network or part of a network. As data streams flow across the network, the sniffer captures each packet and, if needed, decodes and analyzes its content according to the appropriate RFC or other specifications. ||
 * Rainbow Table Attack || An attack used in recovering the plaintext password from a password hash generated by a hash function, often a cryptographic hash function, making attacks against hashed passwords feasible. ||
 * Rootkit || A software that enables continued privileged access to a computer while actively hiding its presence from administrators by subverting standard operating system functionality, other applications and by hiding applications that appropriate computing resources or steal passwords without the knowledge of administrators and users of affected systems. Rootkits can target firmware, a hypervisor, the kernel, or—most commonly—user-mode applications. ||
 * Spyware || A type of malware that can be installed on computers and collects little bits of information at a time about users without their knowledge. The presence of spyware is typically hidden from the user, and can be difficult to detect.
 * Virus || A computer program that can copy itself and infect a computer. A true virus can spread from one computer to another (in some form of executable code) when its host is taken to the target computer. ||
 * Worm || A self-replicating malware computer program that uses a computer network to send copies of itself to other nodes and it may do so without any user intervention.
 * Privelege Escalation || The act of exploiting a bug, design flaw or configuration oversight in an operating system or software application to gain elevated access to resources that are normally protected from an application or user. The result is that an application with more privileges than intended by the application developer or system administrator can perform unauthorized actions ||
 * Phishing || The criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. ||
 * Vulnerability || A weakness which allows an attacker to reduce a system's information assurance. Vulnerability is the intersection of three elements: a system susceptibility or flaw, attacker access to the flaw, and attacker capability to exploit the flaw. ||
 * Whaling || If someone going after a specific target and formulating messages to appeal specifically to that target. In many cases, the person being whaled is a high profile executive who stands to lose more than the average person. ||