1/19
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No study sessions yet.
White Hat Hacker
An ethical hacker who finds and fixes security flaws
Black Hat Hacker
A hacker who breaks into systems illegally for malicious purposes
Gray Hat Hacker
A hacker who may break into systems without permission but without malicious intent
Script Kiddie
An inexperienced hacker who uses existing tools to attack
Hacktivist
A hacker motivated by political or social causes
Social Engineering
Manipulating people into giving up confidential information
Phishing
Fraudulent emails designed to steal sensitive information
Spear Phishing
Targeted phishing aimed at a specific individual or group
Vishing
Voice phishing using phone calls to trick people
Smishing
Phishing attacks using SMS messages
Malware
Software designed to damage or disrupt systems
Virus
Malware that attaches to legitimate programs and spreads
Worm
Malware that replicates itself to spread without human action
Trojan Horse
Malware disguised as legitimate software.
Ransomware
Malware that encrypts data and demands payment for release
Spyware
Software that secretly gathers user information
Rootkit
Software that hides malicious processes on a system
Physical Security
Protecting physical devices and infrastructure from threats
Access Control
Restricting entry to systems or buildings to authorized users only
Mantrap
A small space with two doors that control access one at a time