Cybersecurity-Internet of Things Terms

Ace your homework & exams now with Quizwiz!

Smart Cities

A smart city is an urban area that uses different types of electronic data collection sensors to supply information which is used to manage assets and resources efficiently.

Smart Home

Home automation or domotics is building automation for a home, called a smart home or smart house. A home automation system will control lighting, climate, entertainment systems, and appliances. It may also include home security such as access control and alarm systems.

Personal Identifiable Information(PII)

Information that can be used on its own or with other information to identify, contact, or locate a single person, or to identify an individual in context.

Spam

Irrelevant or inappropriate messages sent on the Internet to a large number of recipients.

Phishing

Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details, often for malicious reasons, by disguising as a trustworthy entity in an electronic communication.

Social Engineering

Psychological manipulation of people into performing actions or divulging confidential information

Ransomware

Ransomware is a type of malicious software from cryptovirology that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid.

Adware

Software that automatically displays or downloads advertising material (often unwanted) when a user is online.

Digital Footprint

A digital footprint is a trail of data you create while using the Internet. It includes the websites you visit, emails you send, and information you submit to online services.

Whaling

A whaling attack, also known as whaling phishing or a whaling phishing attack, is a specific type of phishing attack that targets high-profile employees, such as the CEO or CFO, in order to steal sensitive information from a company, as those that hold higher positions within the company typically have complete access to sensitive data.

Spear Phishing

Spear phishing is an email or electronic communications scam targeted towards a specific individual, organization or business. Although often intended to steal data for malicious purposes, cybercriminals may also intend to install malware on a targeted user's computer.

Pharming

The fraudulent practice of directing Internet users to a bogus website that mimics the appearance of a legitimate one, in order to obtain personal information such as passwords, account numbers, etc.

Antivirus Software

A program or set of programs that are designed to prevent, search for, detect, and remove software viruses, and other malicious software like worms, trojans, adware, and more.

Smart Devices

A smart device is an electronic device, generally connected to other devices or networks via different wireless protocols such as Bluetooth, NFC, Wi-Fi, LiFi, 3G, etc., that can operate to some extent interactively and autonomously.

Spyware

A software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.

Malware

A software that is intended to damage or disable computers and computer systems.

Spoofing

A spoofing attack is a situation in which a person or program successfully masquerades as another by falsifying data, to gain an illegitimate advantage.

Chat Room

An area on the Internet or other computer network where users can communicate, typically limiting communication to a particular topic.

Smishing

In computing, SMS phishing or smishing is a form of criminal activity using social engineering techniques. Phishing is the act of attempting to acquire personal information such as passwords and details by masquerading as a trustworthy entity in an electronic communication.

Mouse-trapping

Mousetrapping is a technique used by some websites to keep visitors from leaving their website, either by launching an endless series of pop-up ads or by re-launching their website in a window that cannot be easily close

Vishing

The fraudulent practice of making phone calls or leaving voice messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as bank details and credit card numbers.

Internet of Things

The interconnection via the Internet of computing devices embedded in everyday objects, enabling them to send and receive data.

Flaming

The online act of posting insults, often laced with profanity or other offensive language on social networking sites. These insults may turn into flame wars where two or more individuals unite to exchange or unite against a third party with verbal attacks.

Data Mining

The process of discovering patterns in large data sets involving methods at the intersection of machine learning, statistics, and database systems.

Social Media Mining

The process of discovering patterns in large data sets involving methods at the intersection of machine learning, statistics, and database systems.

Cyberstalking

The use of the Internet or other electronic means to stalk or harass an individual, group, or organization. It may include false accusations, defamation, slander and libel.

Cat Phishing

Catphishing is when a fraudster fabricates an identity and tricks someone via cyber communication into a phony emotional or romantic relationship—usually for financial gain to the scammer—because eventually he'll hit the victim up for money.


Related study sets

Media Lab "Reading Gram Stained Smears From Cultures"

View Set

Preventing poor outcomes leadership case

View Set

Chapter 9: Climate Classification

View Set

Environmental Sustainability - What's the Answer?

View Set

FAFSA Undergrad Entrance Counselling

View Set

NURS 215 - Exam 3 - Chapters 20, 22, 24, and 25

View Set