"Anonymous", "a well-known network of individuals who are involved in hacktivism" "Black hats", "individuals focused on taking advantage of security problems for personal gain" "Copyright infringement", "the use of protected works without permission" "Cracking", "breaching security to access computer networks" "Cyberbullying", "the use of electronic technologies to intimidate another person" "Cybercrime", "crime that makes use of the computers and the internet" "Cyberspy", "an individual responsible for gaining secret information and providing it to another interested party" "Cyberstalking", "following and harassing another person online or via electronic technologies" "Cyberterrorists", "individuals and groups who make malicious cyberattacks for political reasons" "Cybertheft", "theft through the use of computers and the internet" "Cybervandalism", "cyberattacks designed to maliciously modify content or programs" "Cyberwarfare", "cyberattacks that interfere with another government or organization for political or military reasons" "Cyberwarriors", "individuals involved in causing or preventing cyberattacks against a government or organization" "Cyberespionage", "the use of computers and the internet to spy on governments or organizations" "Denial-of-service attack (DoS)", "a cyberattack that causes a device or network to be unavailable often by overloading it" "Gray hates", "individuals that may not be as ethical as white hats but not as malicious as black hats" "Hacking", "the use of technical skills to address problems or to take advantage of problems" "Hacktivist", "a person who maliciously uses computer skills to advance a political view or movement" "Identity theft", "the illegal use of another person’s information for one’s own gain" "Industrial espionage", "theft of information from a company through spying" "Infrastructure", "the interconnected networks, devices, systems, and facilities that are central to the operation of society" "Intellectual property", "works or concepts that are considered the property of the individuals or organizations who create them" "Internet activism", "efforts to advance a political view or movement through the use of technology" "Just war theory", "the view that war should only be undertaken when there are compelling reasons to do so" "Logic bombs", "malicious code that waits for specific circumstances to activate" "Malvertising", "malicious advertising designed to spread malware" "Malware", "software that maliciously interferes with normal operations of a computer or computer system" "Noncombatant immunity", "the view that civilians should be protected from harm during a conflict" "Offensive (proactive) security", "measures taken to to prevent security breaches" "Pharming", "redirecting a user to a fake version of a reputable website" "Phising", "fraudulent attempts to induce a person to reveal personal information based on appearing to be a legitimate organization" "Reactive security", "responses to security threats after a breach has occurred" "Salami slice fraud", "the stealing of small fractions of money" "Skimming", "the use of an electronic device to steal personal information" "Spyware", "software that gathers information about a user and may gain control of a user’s device" "The dark web", "a collection of websites that is not accessible through typical search engines and browsers" "Trojan horse", "a type of malware that misleads the user into thinking that the program is safe" "United States Cyber Command (USCYBERCOM)", "a grouping within the military that focuses on defending U.S. military networks from cyberattacks" "Vigilante justice", "attempts to punish others that are conducted outside of the legitimate criminal justice system" "Virus", "a type of malware designed to spread from one user to another" "Warez", "illegally copied works distributed online" "Website defacement", "a cyberattack in which a website is maliciously changed without the website owner’s permission" "Whistleblower", "an individual who speaks up when they have knowledge of illegal or unethical activities within an organization" "White hats", "individuals who work with an organization to identify security problems" "Wikileaks", "an organization that serves as a platform for anonymously publishing confidential information and other secrets" "Worm", "a type of malware that spreads malicious code by replicating on its own"
Download CSV