sturgeonventures.com

Website:https://www.sturgeonventures.com
Upvotes received0
Downvotes received0
Karma:0 (upvotes-downvotes)



0 earned Badges

No badges were found



Definitions (42)

1

0 Thumbs up   0 Thumbs down

Bot


A bot, or robot, is a technology that is developed to perform an automated task. Malicious bots can be used to bombard websites or other applications multiple times per second to try and over-ride the security gateways.
Source: sturgeonventures.com

2

0 Thumbs up   0 Thumbs down

cracking


Also known as hacking
Source: sturgeonventures.com

3

0 Thumbs up   0 Thumbs down

Data diddling


Can be known as false data entry, is the unauthorised editing of information whilst being entered into a computer. Examples of data diddling include counterfeiting, alterations to security clearance, changing grades or credit ratings.
Source: sturgeonventures.com

4

0 Thumbs up   0 Thumbs down

Data leakage


Also known as data loss. Usually unapproved and sometimes illegal loss of information that is transferred elsewhere. This could be due to physical removal (USB sticks/CDs, printouts), memorised information through to data hiding (within digital images for example).
Source: sturgeonventures.com

5

0 Thumbs up   0 Thumbs down

denial of service


A DoS attack is a purposeful blocking or flooding of an internet service with useless traffic. The ill intended gains from such activity could be blackmail or fraud – e.g. blocking access to banking systems for credit card fraud.
Source: sturgeonventures.com

6

0 Thumbs up   0 Thumbs down

DNS cache poisoning


Also known as DNS (Domain Name System) Spoofing
Source: sturgeonventures.com

7

0 Thumbs up   0 Thumbs down

DNS Cache Poisoning


Also known as DNS (Domain Name System) Spoofing
Source: sturgeonventures.com

8

0 Thumbs up   0 Thumbs down

Easter egg


An illegitimate and unexpected function within a computer programme. Called an Easter Egg as they can be hard to find.
Source: sturgeonventures.com

9

0 Thumbs up   0 Thumbs down

Exploit


A way of manipulating a weakness or vulnerability in a computer programme or script. The end result being that the system is taken control of by a third party.
Source: sturgeonventures.com

10

0 Thumbs up   0 Thumbs down

hacking


Also known as cracking
Source: sturgeonventures.com


To view all 42 definitions, please sign in.