Cybersecurity-Internet of Things Terms
Smart Cities
A smart city is an urban area that uses different types of electronic data collection sensors to supply information which is used to manage assets and resources efficiently.
Chat Room
An area on the Internet or other computer network where users can communicate, typically limiting communication to a particular topic.
Smart Home
Home automation or domotics is building automation for a home, called a smart home or smart house. A home automation system will control lighting, climate, entertainment systems, and appliances. It may also include home security such as access control and alarm systems.
Smishing
In computing, SMS phishing or smishing is a form of criminal activity using social engineering techniques. Phishing is the act of attempting to acquire personal information such as passwords and details by masquerading as a trustworthy entity in an electronic communication.
Personal Identifiable Information(PII)
Information that can be used on its own or with other information to identify, contact, or locate a single person, or to identify an individual in context.
Spam
Irrelevant or inappropriate messages sent on the Internet to a large number of recipients.
Mouse-trapping
Mousetrapping is a technique used by some websites to keep visitors from leaving their website, either by launching an endless series of pop-up ads or by re-launching their website in a window that cannot be easily close
Phishing
Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details, often for malicious reasons, by disguising as a trustworthy entity in an electronic communication.
Social Engineering
Psychological manipulation of people into performing actions or divulging confidential information
Ransomware
Ransomware is a type of malicious software from cryptovirology that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid.
Adware
Software that automatically displays or downloads advertising material (often unwanted) when a user is online.
Cyberstalking
The use of the Internet or other electronic means to stalk or harass an individual, group, or organization. It may include false accusations, defamation, slander and libel.
Digital Footprint
A digital footprint is a trail of data you create while using the Internet. It includes the websites you visit, emails you send, and information you submit to online services.
Antivirus Software
A program or set of programs that are designed to prevent, search for, detect, and remove software viruses, and other malicious software like worms, trojans, adware, and more.
Smart Devices
A smart device is an electronic device, generally connected to other devices or networks via different wireless protocols such as Bluetooth, NFC, Wi-Fi, LiFi, 3G, etc., that can operate to some extent interactively and autonomously.
Spyware
A software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
Malware
A software that is intended to damage or disable computers and computer systems.
Spoofing
A spoofing attack is a situation in which a person or program successfully masquerades as another by falsifying data, to gain an illegitimate advantage.
Whaling
A whaling attack, also known as whaling phishing or a whaling phishing attack, is a specific type of phishing attack that targets high-profile employees, such as the CEO or CFO, in order to steal sensitive information from a company, as those that hold higher positions within the company typically have complete access to sensitive data.
Spear Phishing
Spear phishing is an email or electronic communications scam targeted towards a specific individual, organization or business. Although often intended to steal data for malicious purposes, cybercriminals may also intend to install malware on a targeted user's computer.
Pharming
The fraudulent practice of directing Internet users to a bogus website that mimics the appearance of a legitimate one, in order to obtain personal information such as passwords, account numbers, etc.
Vishing
The fraudulent practice of making phone calls or leaving voice messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as bank details and credit card numbers.
Internet of Things
The interconnection via the Internet of computing devices embedded in everyday objects, enabling them to send and receive data.
Flaming
The online act of posting insults, often laced with profanity or other offensive language on social networking sites. These insults may turn into flame wars where two or more individuals unite to exchange or unite against a third party with verbal attacks.
Data Mining
The process of discovering patterns in large data sets involving methods at the intersection of machine learning, statistics, and database systems.
Social Media Mining
The process of discovering patterns in large data sets involving methods at the intersection of machine learning, statistics, and database systems.
Cat Phishing
Catphishing is when a fraudster fabricates an identity and tricks someone via cyber communication into a phony emotional or romantic relationship—usually for financial gain to the scammer—because eventually he'll hit the victim up for money.