The Hats Hackers Wear + Supply Chain Attacks

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/3

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

4 Terms

1
New cards

Authorized attackers, also known as white-hat hackers

are those who act with authorization and seek to discover security vulnerabilities with the intent of correcting them. White-hat hackers may either be employees of the organization or contractors hired to engage in penetration testing

2
New cards

Unauthorized attackers, also known as black-hat hackers

are those with malicious intent. They seek to defeat security controls and compromise the confidentiality, integrity or availability of information and systems for their own, unauthorized purposes.

3
New cards

Semi-authorized attackers, also known as gray-hat hackers

are those who fall somewhere between white- and black-hat hackers. They act without proper authorization, but they do so with the intent of informing their targets of any security vulnerabilities

4
New cards

Supply chain attacks

Sophisticated attackers may attempt to interfere with an organization’s IT supply chain, including hardware providers, software providers, and service providers. Attacking an organization’s vendors and suppliers provides an indirect mechanism to attack the organization itself