Lecture 12: Units of Measurement and Cyber Security Basics

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/16

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

17 Terms

1
New cards

Cybersecurity

practice of protecting systems, networks and data from digital attacks. Using technologies, processes and policies to safeguard sensitive information.

2
New cards

Hacker

person with advanced computer and network skills, using their abilities to gain unauthorized access to systems.

3
New cards

Attack Vectors

specific path or method a cyber attacker uses to gain unauthorized access to systems.

4
New cards

Hacking

misuse of devices to cause damage or corrupt systems, gather information on users and steal data and documents.

5
New cards
  1. Financial gain through the theft of credit card details or by defrauding financial services

  2. Corporate espionage

  3. To gain notoriety or respect for their hacking talents, and

  4. State-sponsored hacking that aims to steal business information and national intelligence

Four (4) key drives for hacking

6
New cards

Hacktivists

people who aim to raise public attention by leaking sensitive information

7
New cards

Black hat hackers

  • the “bad guys” of hacking

  • Discover vulnerabilities to exploit them for financial game or malicious purposes

  • Can steal sensitive personal info, compromise computer and financial systems, and alter or take down functionality of websites

8
New cards

White hat hackers

  • “The good guys”

  • Attempt to prevent the success of black hat hackers through proactive hacking

  • Use their skills to break into systems to assess the level of network security, AKA ethical hacking

  • Expose vulnerabilities before black hat hackers can detect them

  • Hired by organizations to test and discover potential holes in their security defenses

9
New cards

Grey hat hackers

  • attempt to violate standards without intending to harm or gain financially

  • Carried out for common good

  • Exploit a vulnerability publicly

10
New cards

Malware attack

imitates a copy of a certain file or document, results in your computer being corrupted by the virus

11
New cards

Phishing hack

 sends fragile emails that look like from a legit source to get sensitive information or login credentials. if through social media, it is called clickbait

12
New cards

Man-in-the-middle attack

hacker gains info access between the end-user device and the website server. Hackers secretly use the IP address which is accessing the server. Usually in unsecured wifi network

13
New cards

Password attack

 hackers will try any possible combination of password to gain your login credentials. Usually your birthday as the password

14
New cards

firewall

virtual wall between your device and the internet.

15
New cards

Honeypot

a decoy system / network that is designed to lure and trap cyber attackers. Contains no real information, and is isolated from the actual network

16
New cards

Alpha numeric passwords

Mix of upper/lowercase letters, numbers and special characters, more than 8 characters

17
New cards

Anti-virus

it detects, prevents, and removes malicious software (malware), that safeguards devices.