Information Security

Glossary

Last modified 2/6/2025

This glossary provides Illinois State University (ISU) students, faculty, and staff with definitions of common scams, cyber threats, and fraud tactics that criminals use to steal information, money, and personal data.

Understanding these terms will help protect the Redbird community from scams targeting university members.


A - D

Artificial Intelligence (AI) Scams

Scammers use AI for voice and video cloning to trick victims into believing they are speaking with a trusted individual.

Brute-Force Attack

A hacking method that systematically guesses passwords by trying all possible combinations until the correct one is found.

Catfishing

Creating a fake online profile to deceive someone, usually for a romance scam or financial fraud.

Clickbait

A deceptive online link designed to lure users into clicking—potentially exposing them to scams, malware, or phishing attempts.

Cloning (Cell Phone Fraud)

Intercepting a cellphone’s unique ID and copying it onto another device, allowing scammers to make calls or use data at the real owner’s expense.

Crypto Scam

Scammers pose as financial experts or celebrities, promising large profits from cryptocurrency investments. The numbers shown on fake investment platforms may appear real, but the profits are fraudulent.

Drive-By Download

Malware that installs on your device just by visiting a compromised website, without clicking or downloading anything.


E - G

Graverobbing

Stealing the identity of a deceased person to open fraudulent accounts, take out loans, or obtain services in their name.

Grandparent Scam

A fraudster impersonates a relative in distress, claiming they need urgent financial help for bail, medical bills, or travel. They often use personal details from social media to make the deception more convincing.


H - L

Identity Theft

When a scammer steals your personal information to open accounts, apply for loans, or receive government benefits in your name—often leaving you with debt and credit damage.

Keylogger

Malicious software that secretly records what you type, allowing hackers to steal passwords, banking details, and sensitive information.


M - P

Malware

Short for "malicious software," malware includes viruses, spyware, and ransomware designed to steal or damage data.

Malvertising

Ads that appear legitimate but secretly contain malware—activated when clicked.

Man-in-the-Middle Attack

A cyberattack where hackers secretly intercept online communications (such as banking transactions) to steal or manipulate sensitive data.

Money Mule Scam

Scammers trick individuals into transferring stolen money—often unknowingly—by posing as employers, romantic partners, or charities.

Peer-to-Peer (P2P) Payment Scams

Apps like Venmo, Zelle, and Cash App make it easy to send money—but if you pay a scammer, the transaction is usually irreversible.

Pharming

A hacker redirects you to a fake website, even if you correctly type the real website’s address. The goal is to steal your login credentials or financial information.

Phishing

Deceptive emails, texts, or messages pretending to be from banks, ISU, or trusted organizations to trick victims into revealing passwords, credit card details, or personal information.


Resources


https://www.fcc.gov/scam-glossary

How to Stay Safe

  • Verify before you trust: Be skeptical of urgent requests for money, unexpected links, or too-good-to-be-true job offers.
  • Use strong passwords & MFA: Enable Multi-Factor Authentication (MFA) in every app you can and never reuse passwords.
  • Secure your devices: Keep your software updated, and use antivirus protection.
  • Think before you click: Be cautious of unsolicited emails, messages, and links—even if they look official.

Report Scams & Get Help