Sei sulla pagina 1di 9

 Hacking is seeking and exploiting weaknesses

in a computer system or computer network


 Hacker/Lame Scripter
 Cracking is the more appropriate term for
breaking into computers
 Computer Criminal or Computer Security Expert
 Invasion of privacy is a legal term. It is used to
describe a circumstance where an individual or
organization knowingly intrudes upon a
person. The intrusion occurs when the person
has a reasonable expectation of privacy, such as
in a bathroom or locker room. An invasion of
privacy is considered to be a tort.
 [A tort, in common law jurisdictions, is a civil
wrong that unfairly causes someone else to suffer
loss or harm resulting in legal liability for the person
who commits the tortious act, called a tortfeasor]
 A computer virus is a malware that, when
executed, replicates by reproducing itself or
infecting other programs by modifying them.
Infecting computer programs can include as well,
data files, or the boot sector of the hard drive.
When this replication succeeds, the affected areas
are then said to be "infected“
 Viruses often perform some type of harmful
activity on infected hosts, such as acquisition
of hard disk space or CPU time, accessing private
information, corrupting data, displaying political
or humorous messages on the user's screen,
spamming their contacts, logging their keystrokes,
or even rendering the computer useless
 A computer worm is a standalone malware
computer program that replicates itself in order
to spread to other computers. Often, it uses a
computer network to spread itself, relying on
security failures on the target computer to
access it. Unlike a computer virus, it does not
need to attach itself to an existing program.
 A denial-of-service (DoS) attack is an attempt
to make a machine or network resource
unavailable to its intended users, such as to
temporarily or indefinitely interrupt or
suspend services of a host connected to the
Internet
 A Trojan horse or Trojan is a type of malware that is often
disguised as legitimate software. Trojans can be employed
by cyber-thieves and hackers trying to gain access to users'
systems. Users are typically tricked by some form of social
engineering into loading and executing Trojans on their
systems. Once activated, Trojans can enable cyber-
criminals to spy on you, steal your sensitive data, and gain
backdoor access to your system.
 These actions can include:
 Deleting data
 Blocking data
 Modifying data
 Copying data
 Disrupting the performance of computers or computer networks
 Unlike computer viruses and worms , Trojans are not able to
self-replicate.
 A zombie is a computer connected to the
Internet that has been compromised by a
hacker, computer virus or trojan horse and can
be used to perform malicious tasks of one sort
or another under remote direction
 To send (a message) indiscriminately to multip
le mailing lists, individuals, or newsgroups.
 the sending of multiple unsolicited e-
mails or text messages, usually for marketing
purposes
 A technique used to gain unauthorized access
to computers, whereby the intruder sends
messages to a computer with an IP address
indicating that the message is coming from a
trusted host

Potrebbero piacerti anche