1/13
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No study sessions yet.
Evil Twin Hotspots
Another term for rogue wireless hotspots.
Threat Actors
Individuals or groups of individuals who perform cyberattacks.
Cyberattacks
Intentional malicious acts meant to negatively impact another individual or organization.
Amateurs (Script Kiddies)
Have little or no skill. They often use existing tools or instructions found on the internet to launch attacks.
Internet of Things (IoT)
Is all around us and quickly expanding. We are just beginning to reap the benefits of the IoT.
Botnet
These devices formed a "botnet" that was controlled by hackers.
Personally Identifiable Information (PII)
Any information that can be used to positively identify an individual.
Dark Web
Can only be accessed with special software and is used by cybercriminals to shield their activities.
Protected Health Information (PHI)
A subset of PII.
Electronic Medical Records (EMRs)
The medical community creates and maintains electronic medical records that contain PHI.
Personal Security Information (PSI)
Another type of PII. This information includes usernames, passwords, and other security-related information that individuals use to access information or services on the network.
Stuxnet
Worm that infected USB drives. These drives were carried by five Iranian component vendors into a secure facility that they supported.
Step 7 Software
Developed by Siemens for their programmable logic controllers (PLCs).
Cyberwarfare
serious possibility. State-supported hacker warriors can cause disruption and destruction of vital services and resources within an enemy nation.