1/16
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
Cybersecurity
practice of protecting systems, networks and data from digital attacks. Using technologies, processes and policies to safeguard sensitive information.
Hacker
person with advanced computer and network skills, using their abilities to gain unauthorized access to systems.
Attack Vectors
specific path or method a cyber attacker uses to gain unauthorized access to systems.
Hacking
misuse of devices to cause damage or corrupt systems, gather information on users and steal data and documents.
Financial gain through the theft of credit card details or by defrauding financial services
Corporate espionage
To gain notoriety or respect for their hacking talents, and
State-sponsored hacking that aims to steal business information and national intelligence
Four (4) key drives for hacking
Hacktivists
people who aim to raise public attention by leaking sensitive information
Black hat hackers
the “bad guys” of hacking
Discover vulnerabilities to exploit them for financial game or malicious purposes
Can steal sensitive personal info, compromise computer and financial systems, and alter or take down functionality of websites
White hat hackers
“The good guys”
Attempt to prevent the success of black hat hackers through proactive hacking
Use their skills to break into systems to assess the level of network security, AKA ethical hacking
Expose vulnerabilities before black hat hackers can detect them
Hired by organizations to test and discover potential holes in their security defenses
Grey hat hackers
attempt to violate standards without intending to harm or gain financially
Carried out for common good
Exploit a vulnerability publicly
Malware attack
imitates a copy of a certain file or document, results in your computer being corrupted by the virus
Phishing hack
sends fragile emails that look like from a legit source to get sensitive information or login credentials. if through social media, it is called clickbait
Man-in-the-middle attack
hacker gains info access between the end-user device and the website server. Hackers secretly use the IP address which is accessing the server. Usually in unsecured wifi network
Password attack
hackers will try any possible combination of password to gain your login credentials. Usually your birthday as the password
firewall
virtual wall between your device and the internet.
Honeypot
a decoy system / network that is designed to lure and trap cyber attackers. Contains no real information, and is isolated from the actual network
Alpha numeric passwords
Mix of upper/lowercase letters, numbers and special characters, more than 8 characters
Anti-virus
it detects, prevents, and removes malicious software (malware), that safeguards devices.