1/11
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Cybercrime/Computer Crime
Internet-based illegal acts, such as distributing malicious software or committing identity theft.
Cyberwarfare
An attack whose goal ranges from disabling a government’s computer network to crippling a country.
Cyber Extortionist/Threat Actor/Cybercriminal
An individual who threatens to expose confidential information, exploit a security flaw, or launch an attack. General and common term used to describe individuals who launch attacks against other users and their computers. Cyber-related tasks for financial gain.
Script Kiddies
Individuals who want to attack computers with little knowledge of the tools being used or the attack being used.
Cracker
Someone who accesses a computer or network illegally that has the intent of destroying data, stealing information, or other malicious action.
Digital/Cyber Forensics
The discovery, collection, and analysis of evidence found on computers and networks.
Digital Forensics Examiner
Knowledge of the law technical experience with many types of hardware and software products.
DoS Attack
Type of attack, usually on a server, that is meant to overload the server with network traffic so that it cannot provide necessary services.
Spoofing
A technique intruders use to make their network or Internet transmission appear legitimate.
Botnet
Zombie army; is a group comprised of computers or mobile devices connected to a network that are used to attack other networks.
Bot
Program that performs a repetitive task on a network.
Zombie
A compromised computer or device.