Glossary


Definitions

  • 2-factor authentication - authentication of an individual using two pieces of information derived from what they are, what they know or what they have, such as password + fingerprint or swipe card + PIN
  •  
  • Authentication Server - The device used to authenticate the consumer's MSK token and Passcode
  •  
  • Authentication - the process by which the rights of an individual are determined by the presentation of that individual's credentials
  •  
  • Brute force - the attack mechanism that tries all possible combinations
  •  
  • Consumer - A person who uses a website
  •  
  • Cardholder - the person holding the credit card
  •  
  • DoS - an attack profile that swamps the target web site with enough information to prevent other users from gaining access
  •  
  • DoS - an attack profile that locks out users from the target web site by sending too many failed attempts preventing users from gaining access
  •  
  • Encryption breaking - cracking an encryption process using mathematical mechanisms, rainbow tables or brute force
  •  
  • Key-logger - the attack process whereby the keystrokes of the victim are surreptitiously captured and replayed to perpetrate a crime
  •  
  • Man-in-the-middle - an attack process whereby the attackers insert themselves between the victim and the target website and simulate connections to both
  •  
  • Merchant - a company that wishes to deliver products or services via the web
  •  
  • Passcode - A string of alphanumeric characters that is known only to the consumer
  •  
  • Phishing 1.0 - Enticing the consumers to use bogus websites to access personal information thereby revealing their credentials
  •  
  • Phishing 2.0 - Enticing the consumers to use a Proxy site (Man-in-the-middle) to access personal information thereby revealing their credentials
  •  
  • Rainbow tables - a complete set of all possible keys and their encrypted strings used to achieve quick lookups to break encryption
  •  
  • SDLC - the Software Development Life Cycle, the controlled process under which products are developed
  •  
  • SHA - (Secure Hash Algorithm) a hash algorithm, used in various formats denoted by key size, 1, 256 or 512
  •  
  • Spear phishing - Spear phishing describes any highly targeted phishing attack. Spear phishers send e-mail that appears genuine to all the employees or members within a certain company, government agency, organization, or group. Spear phishing also describes scams that target people who use a certain product or Web site. Essentially, scam artists will use any information they can to personalize a phishing scam, directed to as specific a group as possible
  •  
  • SQL Injection - an attack process whereby the attackers injects SQL commands through input buffer fields like username and password fields. This attack can corrupt data or lead to full system compromise