1.0 - The Danger

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/13

flashcard set

Earn XP

Description and Tags

InfoAss

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

14 Terms

1
New cards

Evil Twin Hotspots

Another term for rogue wireless hotspots.

2
New cards

Threat Actors

Individuals or groups of individuals who perform cyberattacks.

3
New cards

Cyberattacks

Intentional malicious acts meant to negatively impact another individual or organization.

4
New cards

Amateurs (Script Kiddies)

Have little or no skill. They often use existing tools or instructions found on the internet to launch attacks.

5
New cards

Internet of Things (IoT)

Is all around us and quickly expanding. We are just beginning to reap the benefits of the IoT.

6
New cards

Botnet

These devices formed a "botnet" that was controlled by hackers.

7
New cards

Personally Identifiable Information (PII)

Any information that can be used to positively identify an individual.

8
New cards

Dark Web

Can only be accessed with special software and is used by cybercriminals to shield their activities.

9
New cards

Protected Health Information (PHI)

A subset of PII.

10
New cards

Electronic Medical Records (EMRs)

The medical community creates and maintains electronic medical records that contain PHI.

11
New cards

Personal Security Information (PSI)

Another type of PII. This information includes usernames, passwords, and other security-related information that individuals use to access information or services on the network.

12
New cards

Stuxnet

Worm that infected USB drives. These drives were carried by five Iranian component vendors into a secure facility that they supported.

13
New cards

Step 7 Software

Developed by Siemens for their programmable logic controllers (PLCs).

14
New cards

Cyberwarfare

serious possibility. State-supported hacker warriors can cause disruption and destruction of vital services and resources within an enemy nation.

Explore top flashcards

ap gov
Updated 1003d ago
flashcards Flashcards (55)
Repaso de Español 1
Updated 148d ago
flashcards Flashcards (104)
stems list 30
Updated 1016d ago
flashcards Flashcards (25)
bio-chem
Updated 889d ago
flashcards Flashcards (28)
ap gov
Updated 1003d ago
flashcards Flashcards (55)
Repaso de Español 1
Updated 148d ago
flashcards Flashcards (104)
stems list 30
Updated 1016d ago
flashcards Flashcards (25)
bio-chem
Updated 889d ago
flashcards Flashcards (28)