1/10
Flashcards covering key vocabulary and concepts related to information literacy and hacking ethics in IT.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Information Literacy
Crucial for effective decision-making in IT, involving identifying, finding, evaluating, applying, and acknowledging information.
Ethical Hacking
Using IT skills under authorized settings to identify and fix security vulnerabilities.
White Hat Hackers
Ethical hackers who use their skills for ethical purposes, authorized to penetrate networks and uncover vulnerabilities.
Black Hat Hackers
Individuals who illegally penetrate systems to steal, alter, or destroy data for personal or financial gain.
Grey Hat Hackers
Hackers who break into systems without permission to expose vulnerabilities but without malicious intent.
Red Hat Hackers
Hackers who actively seek to disrupt black hat hackers by attacking their computer systems.
Hacktivists
Hackers who use their skills to promote a political agenda or social change.
State-Sponsored Hackers
Hackers employed by governments to penetrate information systems of other countries.
POPIA (Protection of Personal Information Act)
South African law governing personal data handling and security, critical for ethical hackers' compliance.
ECTA (Electronic Communications and Transactions Act)
South African law outlining legality around electronic communications, setting boundaries for ethical hacking.
Cybercrimes Act
South African law criminalizing unlawful data access and interference, delineating legal ethical hacking activities.