Security Threats Definitions

  • C

    car hacking

    Car hacking is the manipulation of the code in a car's electronic control unit (ECU) to exploit a vulnerability and gain control of other ECU units in the vehicle.  

  • D

    device attack

    A device attack is an exploit in which the attacker takes advantage of a vulnerable device to gain network access.

  • E

    embedded device hacking

    Embedded device hacking is the exploiting of vulnerabilities in embedded software to gain control of the device. Attackers have hacked embedded systems to spy on the devices, to take control of them or simply to disable (brick) them.

  • I

    IoT botnet (Internet of Things botnet)

    An IoT botnet (Internet of Things botnet) is a group of hacked computers, smart appliances and Internet-connected devices that have been co-opted for illicit purposes.

  • IoT security (Internet of Things security)

    IoT security is the area of endeavor concerned with safeguarding connected devices and networks in the Internet of things (IoT). A major concern is to make sure that security remains an important part of product design for all networked devices.

  • M

    man-in-the-middle attack (MitM)

    A man-in-the-middle attack is one in which the attacker secretly intercepts and relays messages between two parties who think they are communicating directly with each other.

  • meet-in-the-middle attack

    Meet-in-the-middle is a type of attack that can exponentially reduce the number of brute force permutations required to decrypt text that has been encrypted by more than one key. Such an attack makes it much easier for an intruder to gain access to data.

  • R

    RFID skimming

    RFID skimming is the wireless interception of information from RFID chip-based debit, credit and ID cards and other documents, such as passports. The purpose of RFID skimming may be simple theft or more complex identity theft. Most typically, thieves use an NFC-enabled device that records unencrypted data from the card's RFID chip, which is broadcast into the air.

  • RFID virus

    An RFID (radio-frequency identification) virus is malicious code inserted into an RFID tag to alter or corrupt data in an RFID system.

  • S

    smart meter hack

    A smart meter hack is the unauthorized access of such a device or its data transmissions for the purpose of obtaining or altering communications between it and the responsible utility.

  • T

    Thing hacking

    Thing hacking is an attack that exploits a vulnerability in a connected non-computing device – a Thing, in the Internet of Things -- to gain control of the device or access to a network it connects to.

  • thingbot

    A thingbot is something with an embedded system and an Internet connection that has been coopted by a hacker as a part of a botnet. A thing, in this context, could be just about anything but a computing device.

-ADS BY GOOGLE

SearchCIO

SearchSecurity

SearchNetworking

SearchDataCenter

SearchDataManagement

Close