10.08.2013 Views

NESTA Crime Online - University of Brighton Repository

NESTA Crime Online - University of Brighton Repository

NESTA Crime Online - University of Brighton Repository

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

26) Spyware: is computer s<strong>of</strong>tware that is installed surreptitiously on a personal<br />

computer to intercept or take partial control over the user's interaction with the<br />

computer, without the user's informed consent. Spyware programs can collect various<br />

types <strong>of</strong> personal information, such as Internet surfing habit, sites that have been<br />

visited, but can also interfere with user control <strong>of</strong> the computer in other ways, such as<br />

installing additional s<strong>of</strong>tware, redirecting web browser activity, accessing websites<br />

blindly that will cause more harmful viruses, or diverting advertising revenue to a third<br />

party. Some are now starting to record mouse movements in a bid to foil the latest<br />

security measures.<br />

27) Trojan: like the wooden horse <strong>of</strong> legend this is a type <strong>of</strong> program or message<br />

that looks benign but conceals a malicious payload. Many <strong>of</strong> the attachments on virus-<br />

bearing e-mail messages carry Trojans.<br />

28) Virus: is a computer program that can copy itself and infect a computer without<br />

permission or knowledge <strong>of</strong> the user. The term ‘virus’ is also commonly used, albeit<br />

erroneously, to refer to many different types <strong>of</strong> malware and adware programs. It<br />

usually requires action to successfully infect a victim (for example, open an attachment<br />

in an infected e-mail).<br />

29) Vishing: is the criminal practice <strong>of</strong> using social engineering over the telephone,<br />

most <strong>of</strong>ten using features facilitated by Voice over IP (VoIP), to gain access to private<br />

personal and financial information for the purpose <strong>of</strong> financial reward. The term is a<br />

combination <strong>of</strong> ‘voice’ and phishing.<br />

30) Whitehat hacker: a hacker that uses his or her skills for positive ends and <strong>of</strong>ten<br />

to thwart malicious hackers. Many whitehat security pr<strong>of</strong>essionals spend their time<br />

looking for and closing the bugs in code that blackhats are keen to exploit.<br />

31) Worm: self-propelled malicious program that scours the web seeking new<br />

victims – in the past this has been used to distinguish it from a virus that requires user<br />

action to compromise a machine. Worms can infect and take over computers without<br />

any help, bar lax security, from a victim.<br />

32) Zombie: another name for a hijacked computer that is a member <strong>of</strong> a botnet.<br />

Page 96

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!