hacking concepts

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/13

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

14 Terms

1
New cards

what is a hacker

unorthodox problem solver and programmer

2
New cards

when were the first “hacks”

1960s

3
New cards

when did hacking become more widespread

1980s

4
New cards

when did hacking become for profit

1990s

5
New cards

when did malware become a tool for hackers

2000’s

6
New cards

what are phone phreaks

hackers in communities, sharing creative ideas

7
New cards

what are the five phases of hacking

reccon, scan, gain access, maintain access, cover tracks

8
New cards

what is a hacktivist

a person who gains unauthorized access to computer files or networks for politics

9
New cards

what is espionage

the act or practice of spying

10
New cards

what is cyber espionage

intentional use of computers to gain access to sensitive info

11
New cards

what is nation state hacking

a person or group acting as a cyber-agent on behalf of a national government

12
New cards

what is advanced persistent threats (ATP)

hacking method with intent to persistency target a specific entity

13
New cards

what are cyber weapons

malware intended to do work of a traditional weapon

14
New cards

what is stuxnet

cyber weapon designed to burrod into Iran’s nuclear facility in Natanz