Cybernaut

Tools of the of Trade

by Joe Miranda



Algorithm: A set of computational procedures that performs a mathematical transformation,

Back door (or trap door): A set of instructions that allows entry into a system, usually by unauthorized personnel. This technique bypasses routine passwords and procedures. Back doors are sometimes used by legitimate operators for quick access to deep parts of a system.

Data manipulation: The simplest form of hacking. It involves a computer operator changing data in an account. Usually, it is done by someone who is authorized access the account.

Disinfectant: Any number of programs that detect and eliminate hostile programs in a system.

Data encryption: An algorithm by which data is converted to an unintelligible alphanumeric sequence. Unencrypted data is referred to as "plain text." Encrypted data is "cipher text."

Decryption: The conversion of cipher text back to plain text,

Hacker (or cracker): Originally, a "hacker" was anyone who pushed the envelope of computer programs, The term was later used to refer to people conducting illegal activities via computer. In recent years, the term hacker has been rehabilitated to its original meaning, and "cracker" applied to that subset of hackers involved in illegal activities. ICE (Intrusion Countermeasure Electronics): A term popularized by cyberpunk writer William Gibson, It refers to assorted programs designed to protect the integrity and security of a computer system. key: A combination or pattern of characters that serves as a secret parameter, thereby allowing the encryption/decryption of data. There are two types of keys: private, in which both the sender and receiver use the same key and require both to maintain the secrecy of the key. and public, in which there are two separate keys-the enciphering key, which is public domain, and the deciphering key, which is kept secret by the users.

Logic bomb (or time bomb): A set of unauthorized instructions designed to sabotage a system. The logic bomb is usually intended to take effect some time after it has been inserted into a system. It may be triggered by the passing of a prespecified date and time in the system's internal clock; or it may be triggered by an event, such as a counter recording a certain number of prespecified transactions. The usual effect of a logic bomb is to erase data or cause a system to "crash" (shut down).

Masquerade: This term describe the hacker's taking on the guise of someone else to gain access to restricted areas/files It can be done physically, by assuming a false identity; it can also be done electronically, by using a stolen password. One variant of masquerade is ''piggybacking," which involves an unauthorized operator's using a terminal that the legitimate operator has failed to turn off.

Salami slicing (or data reduction): A way to steal from a financial account by making incremental deductions. The program deducts a minuscule amount of cash from many accounts over a period of time, depositing the funds into another account set up by the hacker, Another way it is done is by rounding interest percentages down (instead of to the nearest whole number). The idea is that the incremental amounts will go unnoticed but that, when added up, will accumulate to a considerable amount of cash.

Password An alphanumeric string that is used to gain access to a protected system.

Scavenging: Either physically (rooting through trash, for example, to find written passwords and other items that have been thrown out) or electronically hunting through files to find information that is useful is gaining access to secure areas,

Trojan horse: A set of unauthorized instructions clandestinely inserted into a program. The trojan horse allows the program to run normally while gaining some sort of advantage for the hacker.

Virus: A program that can reproduce itself by sharing software programs. The virus program attaches itself to another program and, when that program is intruded into another system, it reproduces itself and infects the new system. Results of a virus may be similar to a logic bomb.

Worm: Similar to a Virus, but usually transmitted via a communications network. Worms do not attach themselves to a program; they survive independently.

More Cybernaut The New Frontier


Back to Table of Contents Competitive Edge #11
Back to Competitive Edge List of Issues
Back to Master Magazine List
© Copyright 1996 by One Small Step, Inc.
This article appears in MagWeb (Magazine Web) on the Internet World Wide Web.
Other military history articles and gaming articles are available at http://www.magweb.com