1/13
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
what is a hacker
unorthodox problem solver and programmer
when were the first “hacks”
1960s
when did hacking become more widespread
1980s
when did hacking become for profit
1990s
when did malware become a tool for hackers
2000’s
what are phone phreaks
hackers in communities, sharing creative ideas
what are the five phases of hacking
reccon, scan, gain access, maintain access, cover tracks
what is a hacktivist
a person who gains unauthorized access to computer files or networks for politics
what is espionage
the act or practice of spying
what is cyber espionage
intentional use of computers to gain access to sensitive info
what is nation state hacking
a person or group acting as a cyber-agent on behalf of a national government
what is advanced persistent threats (ATP)
hacking method with intent to persistency target a specific entity
what are cyber weapons
malware intended to do work of a traditional weapon
what is stuxnet
cyber weapon designed to burrod into Iran’s nuclear facility in Natanz