Six Hacking Terms You Should Know, GDM Xerox

Six Hacking Terms You Should Know

700 250 admin
  • 0

Data beaches happen almost every day. In today’s connected world, every business is at risk and it’s important to educate yourself about the risks. There are plenty of trade websites, newsletters and blogs where you can learn about today’s threats. Like every industry, IT security professionals have a language they use when discussing these issues.

If you’re new to IT, or just educating yourself, here are six common hacking terms you should know when conversing with your IT security team.

  • Denial of Service (DoS) – DoS attacks are used to lock resources like a network or website by flooding them with rapid requests that can’t be serviced. This effectively shuts down the resource by crashing the network or website.
  • Dictionary Attack – This is a sophisticated version of the brute force password attack. Hackers will run literally thousands, or even millions of randomly generated passwords in order to break through a network’s password security.
  • Logic Bomb – A logic bomb is triggered by a specific event or sequence of events. Hacked systems are loaded with software that is waiting for a specific event, date, or series of actions to begin the attack.
  • Malware – Malware is short for malicious software. It is a program that is designed to disrupt a computer or network with malicious intent.
  • Phishing – The most common type of cyber attack,  a common example includes those emails from international lotteries that tell you you’ve won, and then ask you to pay the taxes on your winnings in return for a cheque. Often sent from a trusted email address which was attacked by a virus that hijacked the address book.
  • Zero-Day Attack – A common term, a zero-day attack uses a flaw in an application or OS to gain access and control a systems resources. “Zero-Day” refers to the day the first attack occurred.

There are new threats coming online every single day. Regardless of your industry, you need to stay informed and on top of IT trends, risks and vulnerabilities to mitigate your risks of attack. Contact us to learn more.

Printer Security Assessment

Leave a Reply

Your email address will not be published.