1/6
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
what is REvil ransomware?
russian ransomware-as-a-service operation
earned lots of money attacking multiple cities, dental companies, travelex, celebrity law firm, giant acer, etc.
types of hackers by motivation:
white hat, black hat, grey hat, hacktivist, cyber terrorist
types of hackers by skill level, what is the difference between them?
novice, intermediate, expert
novice uses tools without understanding, intermediate uses tools with understanding, experts create and horde tools
types of hackers by organizational structure and which group carries out the majority of attacks?
individual hackers, organized groups, disorganized groups, state-sponsored groups, vigilantes/whistleblowers
organized groups carry out majority of attacks
what are the three “tools of the trade” for hacking?
social engineering, software (e.g., malware on a USB), and technical hacks (e.g., SQL)
4 steps to social engineering attack
research target
develop rapport and trust
exploit trust
use info
what are the two canadian laws relevant to hacking? which one focuses on the person, which one focuses on the damage
s.342.1: unauthorized use of a computer (focuses on the person)
s.430: mischief to data (focuses on the damage)