Tech Dictionary
Found 74 records.
Air Gap
Hacking
A security measure where a computer or network is physically isolated from unsecured networks, such as the internet
APT (Advanced Persistent Threat)
Hacking
A prolonged and targeted cyberattack in which an intruder gains access to a network and remains undetected for an extended period
Backdoor
Hacking
A hidden method for bypassing normal authentication or encryption in a computer system
Black Hat
Hacking
A hacker who violates computer security for little reason beyond maliciousness or for personal gain
Blue Box
Hacking
An electronic device used by phreakers to emulate the 2600 Hz tone used by telephone operators to control switches, allowing free calls
Botnet
Hacking
A number of Internet-connected devices, each of which is running one or more bots
Brick
Hacking
To render an electronic device non-functional, often due to a failed firmware update or modification
Brute Force
Hacking
A trial and error method used by application programs to decode encrypted data such as passwords or Data Encryption Standard (DES) keys
Buffer Overflow
Hacking
A specific type of security vulnerability where a program writes data past the end of a buffer, potentially corrupting data, crashing the program, or executing malicious code
Cipher
Hacking
A secret or disguised way of writing; a code
Clickjacking
Hacking
A malicious technique of tricking a user into clicking on something different from what the user perceives
Cookie Poisoning
Hacking
The modification of a cookie (personal information) by an attacker to gain unauthorized information about the user or to execute a task on behalf of the user
Cracking
Hacking
The act of breaking into a computer system or software, often to remove copy protection or gain unauthorized access
An attack that forces an end user to execute unwanted actions on a web application in which they are currently authenticated
Cyberespionage
Hacking
The practice of obtaining secrets without the permission of the holder of the information from individuals, competitors, rivals, groups, governments and enemies
Cyberwarfare
Hacking
The use of computer technology to disrupt the activities of a state or organization
Dark Web
Hacking
A part of the internet that isn't indexed by search engines and requires specific software, configurations, or authorization to access
A cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users
Deep Web
Hacking
Parts of the World Wide Web whose contents are not indexed by standard web search-engines
Doxing
Hacking
The practice of researching and publicly broadcasting private or identifying information about an individual or organization
Dumpster Diving
Hacking
The practice of sifting through commercial or residential waste to find items that have been discarded by their owners, often to find sensitive information
Encryption
Hacking
The process of converting information or data into a code, especially to prevent unauthorized access
Evil Twin
Hacking
A fraudulent Wi-Fi access point that appears to be legitimate but is set up to eavesdrop on wireless communications
Exploit
Hacking
A piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability
Firewall
Hacking
A network security device that monitors and filters incoming and outgoing network traffic